{"id":3511,"date":"2024-06-13T11:40:31","date_gmt":"2024-06-13T03:40:31","guid":{"rendered":"https:\/\/firmussec.com\/sg\/?page_id=3511"},"modified":"2024-06-13T11:58:50","modified_gmt":"2024-06-13T03:58:50","slug":"vulnerability-management","status":"publish","type":"page","link":"https:\/\/firmussec.com\/sg\/centurion\/vulnerability-management\/","title":{"rendered":"Vulnerability Management (VMS)"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:5%;--awb-padding-bottom:3%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 1160px + 80px );margin-left: calc(-80px \/ 2 );margin-right: calc(-80px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:40px;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-font-size:16px;--awb-line-height:1.2;--awb-letter-spacing:0.015em;--awb-text-transform:none;--awb-text-color:#14452f;--awb-text-font-family:&quot;Montserrat&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Centurion Managed Services<\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:30;line-height:1.25;\">Proactively Reduce Identify and Remediate Vulnerabilities in Your Environment<\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_5 2_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:40px;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-2 fusion-text-no-margin\" style=\"--awb-text-color:hsla(var(--awb-color8-h),var(--awb-color8-s),var(--awb-color8-l),calc(var(--awb-color8-a) - 20%));--awb-margin-bottom:10px;\"><p>Includes conducting regular vulnerability assessments. The assessments are designed to identify known and unknown vulnerabilities to be assigned based on severity levels and then patched.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:40px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"2000\" height=\"500\" title=\"Untitled design (47)\" src=\"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2024\/06\/Untitled-design-47.png\" data-orig-src=\"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2024\/06\/Untitled-design-47.png\" alt class=\"lazyload img-responsive wp-image-3512\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%272000%27%20height%3D%27500%27%20viewBox%3D%270%200%202000%20500%27%3E%3Crect%20width%3D%272000%27%20height%3D%27500%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2024\/06\/Untitled-design-47-200x50.png 200w, https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2024\/06\/Untitled-design-47-400x100.png 400w, https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2024\/06\/Untitled-design-47-600x150.png 600w, https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2024\/06\/Untitled-design-47-800x200.png 800w, https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2024\/06\/Untitled-design-47-1200x300.png 1200w, https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2024\/06\/Untitled-design-47.png 2000w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:40px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><p>Centurion Vulnerability Management Service empowers your organization by proactively identify, prioritize, and mitigate security risks across your infrastructure. With cutting-edge technology and expert analysis, we deliver comprehensive vulnerability assessments tailored to your unique environment. Centurion Vulnerability Management Service provides real-time insights into your network, applications, and endpoints, enabling us to swiftly address potential threats before they escalate.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:40px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:5%;--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:30;line-height:1.25;\">Centurion VMS Methodology<\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-stretch fusion-column-inner-bg-wrapper fusion-column-liftup-border\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-inner-bg-size:cover;--awb-inner-bg-box-shadow:0px 0px 35px 0px rgba(0,255,60,0.3);;--awb-border-radius:7px 7px 7px 7px;--awb-liftup-border-radius:7px 7px 7px 7px;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:40px;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><span class=\"fusion-column-inner-bg hover-type-liftup\"><span class=\"fusion-column-anchor\"><span class=\"fusion-column-inner-bg-image\"><\/span><\/span><\/span><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><i class=\"fb-icon-element-1 fb-icon-element fontawesome-icon fa-chart-area fas circle-yes\" style=\"--awb-iconcolor:#14452f;--awb-iconcolor-hover:#14452f;--awb-circlecolor:#ffffff;--awb-circlecolor-hover:#ffffff;--awb-circlebordercolor-hover:var(--awb-color8);--awb-circlebordersize:0px;--awb-font-size:35.2px;--awb-width:70.4px;--awb-height:70.4px;--awb-line-height:70.4px;--awb-margin-top:0;--awb-margin-right:0;--awb-margin-bottom:0;--awb-margin-left:0;--awb-align-self:center;\"><\/i><div class=\"fusion-text fusion-text-4\" style=\"--awb-font-size:24px;--awb-text-color:#14452f;--awb-text-font-family:&quot;Montserrat&quot;;--awb-text-font-style:normal;--awb-text-font-weight:500;\"><p style=\"text-align: center;\">Analyze<\/p>\n<\/div><div class=\"fusion-text fusion-text-5\"><p style=\"text-align: center;\">Analysing your digital infrastructure, including networks, systems, and applications. Through comprehensive scanning and testing, we identify potential vulnerabilities that could be exploited by cyber threats<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-stretch fusion-column-inner-bg-wrapper fusion-column-liftup-border\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-inner-bg-size:cover;--awb-inner-bg-box-shadow:0px 0px 35px 0px rgba(0,255,60,0.3);;--awb-border-radius:7px 7px 7px 7px;--awb-liftup-border-radius:7px 7px 7px 7px;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:40px;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><span class=\"fusion-column-inner-bg hover-type-liftup\"><span class=\"fusion-column-anchor\"><span class=\"fusion-column-inner-bg-image\"><\/span><\/span><\/span><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><i class=\"fb-icon-element-2 fb-icon-element fontawesome-icon fa-th fas circle-yes\" style=\"--awb-iconcolor:#14452f;--awb-iconcolor-hover:#14452f;--awb-circlecolor:#ffffff;--awb-circlecolor-hover:#ffffff;--awb-circlebordercolor-hover:var(--awb-color8);--awb-circlebordersize:0px;--awb-font-size:35.2px;--awb-width:70.4px;--awb-height:70.4px;--awb-line-height:70.4px;--awb-margin-top:0;--awb-margin-right:0;--awb-margin-bottom:0;--awb-margin-left:0;--awb-align-self:center;\"><\/i><div class=\"fusion-text fusion-text-6\" style=\"--awb-font-size:24px;--awb-text-color:#14452f;--awb-text-font-family:&quot;Montserrat&quot;;--awb-text-font-style:normal;--awb-text-font-weight:500;\"><p style=\"text-align: center;\">Build<\/p>\n<\/div><div class=\"fusion-text fusion-text-7\"><p style=\"text-align: center;\">Building on the insights gathered during the analysis phase, we develop a customized vulnerability assessment plan tailored to your organization\u2019s specific needs and requirements<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-stretch fusion-column-inner-bg-wrapper fusion-column-liftup-border\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-inner-bg-size:cover;--awb-inner-bg-box-shadow:0px 0px 35px 0px rgba(0,255,60,0.3);;--awb-border-radius:7px 7px 7px 7px;--awb-liftup-border-radius:7px 7px 7px 7px;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:40px;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><span class=\"fusion-column-inner-bg hover-type-liftup\"><span class=\"fusion-column-anchor\"><span class=\"fusion-column-inner-bg-image\"><\/span><\/span><\/span><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><i class=\"fb-icon-element-3 fb-icon-element fontawesome-icon fa-tasks fas circle-yes\" style=\"--awb-iconcolor:#14452f;--awb-iconcolor-hover:#14452f;--awb-circlecolor:#ffffff;--awb-circlecolor-hover:#ffffff;--awb-circlebordercolor-hover:var(--awb-color8);--awb-circlebordersize:0px;--awb-font-size:35.2px;--awb-width:70.4px;--awb-height:70.4px;--awb-line-height:70.4px;--awb-margin-top:0;--awb-margin-right:0;--awb-margin-bottom:0;--awb-margin-left:0;--awb-align-self:center;\"><\/i><div class=\"fusion-text fusion-text-8\" style=\"--awb-font-size:24px;--awb-text-color:#14452f;--awb-text-font-family:&quot;Montserrat&quot;;--awb-text-font-style:normal;--awb-text-font-weight:500;\"><p style=\"text-align: center;\">Manage<\/p>\n<\/div><div class=\"fusion-text fusion-text-9\"><p style=\"text-align: center;\">Involves executing the vulnerability assessment plan in a systematic manner, ensuring thorough coverage of your entire digital footprint. Our team of experts oversees the process, coordinating scanning activities, analyzing results, and prioritizing vulnerabilities based on risk level and potential impact<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_6 1_6 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:40px;--awb-width-medium:16.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-stretch fusion-column-inner-bg-wrapper fusion-column-liftup-border\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-inner-bg-size:cover;--awb-inner-bg-box-shadow:0px 0px 35px 0px rgba(0,255,60,0.3);;--awb-border-radius:7px 7px 7px 7px;--awb-liftup-border-radius:7px 7px 7px 7px;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:40px;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><span class=\"fusion-column-inner-bg hover-type-liftup\"><span class=\"fusion-column-anchor\"><span class=\"fusion-column-inner-bg-image\"><\/span><\/span><\/span><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><i class=\"fb-icon-element-4 fb-icon-element fontawesome-icon fa-calendar-check fas circle-yes\" style=\"--awb-iconcolor:#14452f;--awb-iconcolor-hover:#14452f;--awb-circlecolor:#ffffff;--awb-circlecolor-hover:#ffffff;--awb-circlebordercolor-hover:var(--awb-color8);--awb-circlebordersize:0px;--awb-font-size:35.2px;--awb-width:70.4px;--awb-height:70.4px;--awb-line-height:70.4px;--awb-margin-top:0;--awb-margin-right:0;--awb-margin-bottom:0;--awb-margin-left:0;--awb-align-self:center;\"><\/i><div class=\"fusion-text fusion-text-10\" style=\"--awb-font-size:24px;--awb-text-color:#14452f;--awb-text-font-family:&quot;Montserrat&quot;;--awb-text-font-style:normal;--awb-text-font-weight:500;\"><p style=\"text-align: center;\">Maintain<\/p>\n<\/div><div class=\"fusion-text fusion-text-11\"><p style=\"text-align: center;\">Establishing robust practices for maintaining the security of your digital assets, including regular scanning, patch management, and configuration updates.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-bg-size:cover;--awb-box-shadow:0px 0px 35px 0px rgba(0,255,60,0.3);;--awb-border-radius:7px 7px 7px 7px;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:40px;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><i class=\"fb-icon-element-5 fb-icon-element fontawesome-icon fa-check-circle fas circle-yes\" style=\"--awb-iconcolor:#14452f;--awb-iconcolor-hover:#14452f;--awb-circlecolor:#ffffff;--awb-circlecolor-hover:#ffffff;--awb-circlebordercolor-hover:var(--awb-color8);--awb-circlebordersize:0px;--awb-font-size:35.2px;--awb-width:70.4px;--awb-height:70.4px;--awb-line-height:70.4px;--awb-margin-top:0;--awb-margin-right:0;--awb-margin-bottom:0;--awb-margin-left:0;--awb-align-self:center;\"><\/i><div class=\"fusion-text fusion-text-12\" style=\"--awb-font-size:24px;--awb-text-color:#14452f;--awb-text-font-family:&quot;Montserrat&quot;;--awb-text-font-style:normal;--awb-text-font-weight:500;\"><p style=\"text-align: center;\">Deliver<\/p>\n<\/div><div class=\"fusion-text fusion-text-13\"><p style=\"text-align: center;\">Detailed reports provide you with a clear understanding of your organization\u2019s security posture and recommended remediation steps. We work closely with your team to ensure that these recommendations are implemented effectively to strengthen your defenses and mitigate cyber risks.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_6 1_6 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:40px;--awb-width-medium:16.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1206.4px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_6 1_6 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:11.52%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:11.52%;--awb-width-medium:16.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:11.52%;--awb-spacing-left-medium:11.52%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:5%;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:5%;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:2%;--awb-font-size:35px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:35;line-height:1.25;\"><p style=\"text-align: center;\">Proactively Discover, Analyze and Patch Current and Potential Vulnerabilities<\/p><\/h2><\/div><div class=\"fusion-text fusion-text-14\" style=\"--awb-font-size:16px;\"><p style=\"text-align: center;\">Strengthen your defenses and unlock the power of synergy with Centurion, where 1+1 equals more than just 2.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_6 1_6 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:11.52%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:11.52%;--awb-width-medium:16.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:11.52%;--awb-spacing-left-medium:11.52%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-15 fusion_builder_column_1_4 1_4 fusion-flex-column fusion-flex-align-self-stretch fusion-column-inner-bg-wrapper fusion-column-liftup-border\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-inner-bg-size:cover;--awb-inner-bg-box-shadow:0px 0px 35px 0px rgba(0,255,60,0.3);;--awb-border-radius:7px 7px 7px 7px;--awb-liftup-border-radius:7px 7px 7px 7px;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:7.68%;--awb-width-medium:25%;--awb-order-medium:0;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><span class=\"fusion-column-inner-bg hover-type-liftup\"><span class=\"fusion-column-anchor\"><span class=\"fusion-column-inner-bg-image\"><\/span><\/span><\/span><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-15\" style=\"--awb-font-size:24px;--awb-line-height:1;--awb-text-color:#14452f;--awb-text-font-family:&quot;Montserrat&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Continuous Asset Discovery<\/p>\n<\/div><div class=\"fusion-text fusion-text-16\"><p>Constantly identifies and monitors all assets within your network, ensuring comprehensive visibility and reducing the risk of oversight or shadow IT.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-16 fusion_builder_column_1_4 1_4 fusion-flex-column fusion-flex-align-self-stretch fusion-column-inner-bg-wrapper fusion-column-liftup-border\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-inner-bg-size:cover;--awb-inner-bg-box-shadow:0px 0px 35px 0px rgba(0,255,60,0.3);;--awb-border-radius:7px 7px 7px 7px;--awb-liftup-border-radius:7px 7px 7px 7px;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:7.68%;--awb-width-medium:25%;--awb-order-medium:0;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><span class=\"fusion-column-inner-bg hover-type-liftup\"><span class=\"fusion-column-anchor\"><span class=\"fusion-column-inner-bg-image\"><\/span><\/span><\/span><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-17\" style=\"--awb-font-size:24px;--awb-line-height:1;--awb-text-color:#14452f;--awb-text-font-family:&quot;Montserrat&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Continuous Vulnerability & Risk Analysis<\/p>\n<\/div><div class=\"fusion-text fusion-text-18\"><p>Regularly assesses and analyzes vulnerabilities and associated risks within your infrastructure, enabling proactive mitigation strategies to be implemented swiftly.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-17 fusion_builder_column_1_4 1_4 fusion-flex-column fusion-flex-align-self-stretch fusion-column-inner-bg-wrapper fusion-column-liftup-border\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-inner-bg-size:cover;--awb-inner-bg-box-shadow:0px 0px 35px 0px rgba(0,255,60,0.3);;--awb-border-radius:7px 7px 7px 7px;--awb-liftup-border-radius:7px 7px 7px 7px;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:7.68%;--awb-width-medium:25%;--awb-order-medium:0;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><span class=\"fusion-column-inner-bg hover-type-liftup\"><span class=\"fusion-column-anchor\"><span class=\"fusion-column-inner-bg-image\"><\/span><\/span><\/span><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-19 fusion-text-no-margin\" style=\"--awb-font-size:24px;--awb-line-height:1;--awb-text-color:#14452f;--awb-margin-bottom:18%;--awb-text-font-family:&quot;Montserrat&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Remediation Tracking<\/p>\n<\/div><div class=\"fusion-text fusion-text-20\"><p>Tracks the progress and effectiveness of vulnerability remediation efforts, providing transparency and accountability to ensure timely resolution of identified issues.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-18 fusion_builder_column_1_4 1_4 fusion-flex-column fusion-flex-align-self-stretch fusion-column-inner-bg-wrapper fusion-column-liftup-border\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-inner-bg-size:cover;--awb-inner-bg-box-shadow:0px 0px 35px 0px rgba(0,255,60,0.3);;--awb-border-radius:7px 7px 7px 7px;--awb-liftup-border-radius:7px 7px 7px 7px;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:7.68%;--awb-width-medium:25%;--awb-order-medium:0;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><span class=\"fusion-column-inner-bg hover-type-liftup\"><span class=\"fusion-column-anchor\"><span class=\"fusion-column-inner-bg-image\"><\/span><\/span><\/span><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-21\" style=\"--awb-font-size:24px;--awb-line-height:1;--awb-text-color:#14452f;--awb-text-font-family:&quot;Montserrat&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Platform Management<\/p>\n<\/div><div class=\"fusion-text fusion-text-22\"><p>Manages the underlying infrastructure and tools used for vulnerability management, ensuring optimal performance, scalability, and integration with existing systems.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:5%;--awb-padding-bottom:3%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1206.4px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-19 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-three\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.3;\">Explore Centurion Services<\/h3><\/div><div class=\"fusion-text fusion-text-23\"><p>Let us help you make informed decisions and set your business up for success through Centurion services.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-20 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-2 fusion-columns-total-3 fusion-content-boxes-1 content-boxes-icon-with-title content-left\" style=\"--awb-body-color:var(--awb-color7);--awb-title-color:var(--awb-color7);--awb-iconcolor:#14452f;--awb-hover-accent-color:#00ff3c;--awb-circle-hover-accent-color:transparent;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:#14452f;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon link-type-text icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/firmussec.com\/sg\/managed-detection-and-response\/\" target=\"_self\"><div class=\"icon\"><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 24px;line-height:normal;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-crosshairs fas circle-no\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:16px;--fontSize:16;line-height:1.5;\">Managed Detection and Response (MDR)<\/p><\/a><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:#14452f;\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon link-type-text icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/firmussec.com\/sg\/vulnerability-management\/\" target=\"_self\"><div class=\"icon\"><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 24px;line-height:normal;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-cubes fas circle-no\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:16px;--fontSize:16;line-height:1.5;\">Vulnerability Management (VMS)<\/p><\/a><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-iconcolor:#14452f;\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row content-box-column-last\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon link-type-text icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/firmussec.com\/sg\/exposure-digital-risk-management\/\" target=\"_self\"><div class=\"icon\"><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 24px;line-height:normal;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-chart-area fas circle-no\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:16px;--fontSize:16;line-height:1.5;\">Exposure &amp; Digital Risk Management (EMS)<\/p><\/a><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:center top;--awb-background-blend-mode:screen;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-background-color:var(--awb-color8);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-end fusion-flex-content-wrap\" style=\"max-width:calc( 1160px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-21 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-padding-top:10%;--awb-padding-bottom:10%;--awb-padding-top-medium:0px;--awb-padding-bottom-medium:50px;--awb-padding-top-small:0px;--awb-padding-bottom-small:50px;--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:50%;--awb-order-medium:1;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:1;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"0.8\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color1);\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.25;\">Talk To Us<\/h2><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-24\" style=\"--awb-line-height:var(--awb-typography5-line-height);--awb-letter-spacing:var(--awb-typography5-letter-spacing);--awb-text-transform:var(--awb-typography5-text-transform);--awb-text-color:var(--awb-color1);--awb-text-font-family:var(--awb-typography5-font-family);--awb-text-font-weight:var(--awb-typography5-font-weight);--awb-text-font-style:var(--awb-typography5-font-style);\"><p>Penetration testing, cyber security strategy, proof-of-value, or just some information? Our domain experts provide bespoke cyber security offerings to solve your digital transformation challenges.<\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/firmussec.com\/sg\/contact\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Contact Us<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-22 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-center fusion-no-small-visibility fusion-no-medium-visibility fusion-animated\" style=\"--awb-bg-position:right top;--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"0.8\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper lazyload fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column fusion-column-has-bg-image\" data-bg-url=\"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2022\/12\/Blade-red-firmus.png\" data-bg=\"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2022\/12\/Blade-red-firmus.png\"><ul style=\"--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;--awb-circlecolor:var(--awb-color5);--awb-circle-yes-font-size:14.08px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-home fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><span style=\"color: #ffffff;\"><strong>FIRMUS PTE LTD<\/strong><\/span><br \/>\n<span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/goo.gl\/maps\/1nEeYgLRboDZpApp8\" target=\"_blank\" rel=\"noopener\">20 McCallum Street #19-01,<br \/>\nTokio Marine Centre,<br \/>\nSingapore 069046.<\/a><\/span><\/p>\n<\/div><\/li><\/ul><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-23 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-stretch fusion-no-large-visibility fusion-animated\" style=\"--awb-bg-position:right top;--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"0.8\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper lazyload fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column fusion-empty-column-bg-image fusion-column-has-bg-image\" data-bg-url=\"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2022\/12\/Blade-red-3.png\" data-bg=\"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2022\/12\/Blade-red-3.png\"><img decoding=\"async\" class=\"fusion-empty-dims-img-placeholder\" aria-label=\"Blade-red\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271200%27%20height%3D%27575%27%20viewBox%3D%270%200%201200%20575%27%3E%3Crect%20width%3D%271200%27%20height%3D%27575%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\"><\/div><\/div><\/div><\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":3512,"parent":3497,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-3511","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vulnerability Management (VMS) - Penetration Testing Singapore | Top Pentest Services Expert<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/firmussec.com\/sg\/centurion\/vulnerability-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Management (VMS) - Penetration Testing Singapore | Top Pentest Services Expert\" \/>\n<meta property=\"og:url\" content=\"https:\/\/firmussec.com\/sg\/centurion\/vulnerability-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Penetration Testing Singapore | Top Pentest Services Expert\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/FIRMUSsec\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-13T03:58:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2024\/06\/Untitled-design-47.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/centurion\\\/vulnerability-management\\\/\",\"url\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/centurion\\\/vulnerability-management\\\/\",\"name\":\"Vulnerability Management (VMS) - Penetration Testing Singapore | Top Pentest Services Expert\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/centurion\\\/vulnerability-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/centurion\\\/vulnerability-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Untitled-design-47.png\",\"datePublished\":\"2024-06-13T03:40:31+00:00\",\"dateModified\":\"2024-06-13T03:58:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/centurion\\\/vulnerability-management\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/firmussec.com\\\/sg\\\/centurion\\\/vulnerability-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/centurion\\\/vulnerability-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Untitled-design-47.png\",\"contentUrl\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Untitled-design-47.png\",\"width\":2000,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/centurion\\\/vulnerability-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Centurion Managed Services\",\"item\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/centurion\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Vulnerability Management (VMS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/#website\",\"url\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/\",\"name\":\"Penetration Testing Singapore | Top Pentest Services Expert\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/#organization\",\"name\":\"Penetration Testing Singapore | Top Pentest Services Expert\",\"url\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/dev\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/FIRMUS_Red-1.png\",\"contentUrl\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/dev\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/FIRMUS_Red-1.png\",\"width\":1244,\"height\":281,\"caption\":\"Penetration Testing Singapore | Top Pentest Services Expert\"},\"image\":{\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/FIRMUSsec\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/firmus-security\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Management (VMS) - Penetration Testing Singapore | Top Pentest Services Expert","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/firmussec.com\/sg\/centurion\/vulnerability-management\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Management (VMS) - Penetration Testing Singapore | Top Pentest Services Expert","og_url":"https:\/\/firmussec.com\/sg\/centurion\/vulnerability-management\/","og_site_name":"Penetration Testing Singapore | Top Pentest Services Expert","article_publisher":"https:\/\/www.facebook.com\/FIRMUSsec\/","article_modified_time":"2024-06-13T03:58:50+00:00","og_image":[{"width":2000,"height":500,"url":"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2024\/06\/Untitled-design-47.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/firmussec.com\/sg\/centurion\/vulnerability-management\/","url":"https:\/\/firmussec.com\/sg\/centurion\/vulnerability-management\/","name":"Vulnerability Management (VMS) - Penetration Testing Singapore | Top Pentest Services Expert","isPartOf":{"@id":"https:\/\/firmussec.com\/sg\/#website"},"primaryImageOfPage":{"@id":"https:\/\/firmussec.com\/sg\/centurion\/vulnerability-management\/#primaryimage"},"image":{"@id":"https:\/\/firmussec.com\/sg\/centurion\/vulnerability-management\/#primaryimage"},"thumbnailUrl":"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2024\/06\/Untitled-design-47.png","datePublished":"2024-06-13T03:40:31+00:00","dateModified":"2024-06-13T03:58:50+00:00","breadcrumb":{"@id":"https:\/\/firmussec.com\/sg\/centurion\/vulnerability-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/firmussec.com\/sg\/centurion\/vulnerability-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/firmussec.com\/sg\/centurion\/vulnerability-management\/#primaryimage","url":"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2024\/06\/Untitled-design-47.png","contentUrl":"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2024\/06\/Untitled-design-47.png","width":2000,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/firmussec.com\/sg\/centurion\/vulnerability-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/firmussec.com\/sg\/"},{"@type":"ListItem","position":2,"name":"Centurion Managed Services","item":"https:\/\/firmussec.com\/sg\/centurion\/"},{"@type":"ListItem","position":3,"name":"Vulnerability Management (VMS)"}]},{"@type":"WebSite","@id":"https:\/\/firmussec.com\/sg\/#website","url":"https:\/\/firmussec.com\/sg\/","name":"Penetration Testing Singapore | Top Pentest Services Expert","description":"","publisher":{"@id":"https:\/\/firmussec.com\/sg\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/firmussec.com\/sg\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/firmussec.com\/sg\/#organization","name":"Penetration Testing Singapore | Top Pentest Services Expert","url":"https:\/\/firmussec.com\/sg\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/firmussec.com\/sg\/#\/schema\/logo\/image\/","url":"https:\/\/firmussec.com\/sg\/dev\/wp-content\/uploads\/2022\/12\/FIRMUS_Red-1.png","contentUrl":"https:\/\/firmussec.com\/sg\/dev\/wp-content\/uploads\/2022\/12\/FIRMUS_Red-1.png","width":1244,"height":281,"caption":"Penetration Testing Singapore | Top Pentest Services Expert"},"image":{"@id":"https:\/\/firmussec.com\/sg\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/FIRMUSsec\/","https:\/\/www.linkedin.com\/company\/firmus-security\/"]}]}},"_links":{"self":[{"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/pages\/3511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/comments?post=3511"}],"version-history":[{"count":8,"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/pages\/3511\/revisions"}],"predecessor-version":[{"id":3559,"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/pages\/3511\/revisions\/3559"}],"up":[{"embeddable":true,"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/pages\/3497"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/media\/3512"}],"wp:attachment":[{"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/media?parent=3511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}