{"id":21099,"date":"2020-06-18T08:54:18","date_gmt":"2020-06-18T08:54:18","guid":{"rendered":"https:\/\/lmtech.asia\/lmt\/?p=21099"},"modified":"2020-06-25T02:46:56","modified_gmt":"2020-06-25T02:46:56","slug":"company-security","status":"publish","type":"post","link":"https:\/\/lmtech.asia\/lmt\/company-security\/","title":{"rendered":"\u1000\u102d\u102f\u101a\u1037\u103a Company Security \u1000\u102d\u102f\u1000\u1031\u102c\u1004\u103a\u1038\u1021\u1031\u102c\u1004\u103a\u101c\u102f\u1015\u103a\u1011\u102c\u1038\u101e\u1004\u1037\u103a\u101c\u102c\u1038?"},"content":{"rendered":"<p>\u101c\u1000\u103a\u101b\u103e\u102d\u1021\u1001\u103b\u102d\u1014\u103a\u1019\u103e\u102c Digital Transformation \u1000\u102d\u102f\u1026\u1038\u1010\u100a\u103a\u101c\u102c\u1010\u102c\u1014\u1032\u1037 \u1021\u1019\u103b\u103e \u1019\u102d\u1019\u102d\u1010\u102d\u102f\u1037\u1019\u103e\u102c\u101b\u103e\u102d\u1010\u1032\u1037 \u1021\u101b\u1031\u1038\u1000\u103c\u102e\u1038\u1010\u1032\u1037 Data \u1010\u103d\u1031\u1000 Digital Format \u1021\u1014\u1031\u1016\u103c\u1004\u103a\u1037 Cloud \u1015\u1031\u102b\u103a \u104a \u101b\u102f\u1036\u1038\u1010\u103d\u1004\u103a\u1038 Computer \u1019\u103b\u102c\u1038\u104a Server \u1019\u103b\u102c\u1038\u1010\u103d\u1004\u103a \u101e\u102d\u1019\u103a\u1038\u1006\u100a\u103a\u1038\u101c\u102c\u1000\u103c\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<p>Digital Format \u1016\u103c\u1005\u103a\u101e\u103d\u102c\u1038\u101e\u100a\u103a\u1014\u103e\u1004\u1037\u103a\u1021\u1019\u103b\u103e Malware \u1010\u103d\u1031\u101b\u1032\u1037 \u1021\u1014\u1039\u1010\u101b\u102c\u101a\u103a\u104a Hacker \u1010\u103d\u1031\u101b\u1032\u1037\u1021\u1014\u1039\u1010\u101b\u102c\u101a\u103a\u1010\u103d\u1031\u1014\u1032\u1037\u00a0 \u101b\u1004\u103a\u1006\u102d\u102f\u1004\u103a\u101b\u1015\u102b\u1010\u1031\u102c\u1037\u1010\u101a\u103a\u104b \u1006\u1000\u103a\u101e\u103d\u101a\u103a\u101b\u1031\u1038\u1000 \u1019\u103c\u1014\u103a\u1006\u1014\u103a\u1019\u103e\u102f\u1000\u102d\u102f \u1015\u1031\u1038\u1014\u102d\u102f\u1004\u103a\u101e\u1031\u102c\u103a\u101c\u100a\u103a\u1038 Security\u00a0 \u1015\u102d\u102f\u1004\u103a\u1038\u1019\u103e\u102c\u1021\u1013\u102d\u1000 Challenge \u1010\u1005\u103a\u1001\u102f\u1016\u103c\u1005\u103a\u101c\u102c\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<p>\u1012\u102b\u1000\u103c\u1031\u102c\u1004\u103a\u1037 Data \u1010\u103d\u1031\u1000 \u1021\u101b\u1031\u1038\u1000\u103c\u102e\u1038\u101c\u102c\u1010\u102c\u1014\u103e\u1004\u1037\u103a \u1021\u1019\u103b\u103e Security Solution \u1019\u103b\u102c\u1038 Devices \u1019\u103b\u102c\u1038\u1000\u102d\u102f \u1040\u101a\u103a\u101a\u1030\u101e\u102f\u1036\u1038\u1005\u103d\u1032\u101b\u1015\u102b\u1010\u1031\u102c\u1037\u1010\u101a\u103a\u104b \u101c\u1000\u103a\u101b\u103e\u102d\u1021\u1001\u103b\u102d\u1014\u103a\u1019\u103e\u102c Enterprise Company \u1010\u103d\u1031\u1019\u103e\u102c \u101e\u102c\u1019\u1000\u1015\u1032 SME \u1019\u103b\u102c\u1038\u1021\u1005 Security \u1000\u1031\u102c\u1004\u103a\u1038\u1021\u1031\u102c\u1004\u103a\u101c\u102f\u1015\u103a\u1011\u102c\u1038\u101e\u1004\u1037\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<p>\u1014\u1031\u102c\u1000\u103a\u1015\u103c\u103f\u1014\u102c\u1010\u1005\u103a\u1001\u102f\u1000\u1010\u1031\u102c\u1037\u00a0 Security Solution \u1019\u103b\u102c\u1038\u104a Security Devices \u1019\u103b\u102c\u1038\u101e\u100a\u103a \u1005\u103b\u1031\u1038\u1021\u101c\u103d\u1014\u103a\u1000\u103c\u102e\u1038\u1014\u1031\u1015\u102b\u1010\u101a\u103a\u104b \u00a0\u1012\u102b\u1000\u1010\u1031\u102c\u1037 \u1005\u1009\u103a\u1038\u1005\u102c\u1038\u1000\u103c\u100a\u1037\u103a\u101b\u1004\u103a \u101b\u103e\u1004\u103a\u1038\u101b\u103e\u1004\u103a\u1038\u101c\u1031\u1038\u1015\u102b\u104b Software \u1010\u1005\u103a\u1001\u102f\u1016\u103c\u1005\u103a\u101c\u102c\u1021\u1031\u102c\u1004\u103a\u00a0 \u101b\u1031\u1038\u1010\u102c\u1014\u1032\u1037 \u1021\u1032\u1037\u1012\u102e Software \u1000\u102d\u102f\u101c\u100a\u103a\u1038 Security \u1000\u1031\u102c\u1004\u103a\u1038\u1021\u1031\u102c\u1004\u103a\u101c\u102f\u1015\u103a\u1010\u102c \u1018\u101a\u103a\u101f\u102c \u1015\u102d\u102f\u1001\u1000\u103a\u1019\u101c\u1032\u1006\u102d\u102f\u1010\u102c \u1015\u103c\u1031\u102c\u1016\u102d\u102f\u1037 \u1019\u101c\u102d\u102f\u1015\u102b\u1018\u1030\u1038\u104b<\/p>\n<p>\u1012\u102b\u1015\u1031\u1019\u1032\u1037 \u101c\u1000\u103a\u101b\u103e\u102d\u1021\u1001\u103b\u102d\u1014\u103a\u1019\u103e\u102c Company \u1019\u103e\u102c 60% \u1011\u1000\u103a\u1015\u102d\u102f\u1010\u1032\u1037 IT \u1021\u101e\u102f\u1036\u1038\u1005\u101b\u102d\u1010\u103a\u1010\u103d\u1031\u101f\u102c \u1019\u102d\u1019\u102d Business \u1021\u1010\u103d\u1000\u103a \u1010\u102d\u102f\u1000\u103a\u101b\u102d\u102f\u1000\u103a\u1019\u101f\u102f\u1010\u103a\u1015\u1032 Software \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u1016\u102d\u102f\u1037 Infrastructure, Security \u1021\u1015\u102d\u102f\u1004\u103a\u1038\u1010\u103d\u1031\u1019\u103e\u102c \u1019\u103b\u102c\u1038\u1014\u1031\u1015\u102b\u1010\u101a\u103a\u104b\u200b<\/p>\n<p>\u1012\u102b\u1000\u103c\u1031\u102c\u1004\u103a\u1037 IT \u1015\u102d\u102f\u1004\u103a\u1038\u1019\u103e\u102c \u1010\u1010\u103a\u1000\u103b\u103d\u1019\u103a\u1038\u1014\u102c\u1038\u101c\u100a\u103a\u1010\u1032\u1037 Technician \u1010\u103d\u1031\u1014\u1032\u1037\u1021\u101b\u1004\u103a \u1006\u103d\u1031\u1038\u1014\u103d\u1031\u1038\u1010\u102d\u102f\u1004\u103a\u1015\u1004\u103a\u1015\u103c\u102e\u1038\u1019\u103e \u101c\u102f\u1015\u103a\u1006\u1031\u102c\u1004\u103a\u1000\u103c\u1016\u102d\u102f\u1037\u1010\u1031\u102c\u1037 \u1021\u1000\u103c\u1036\u1015\u103c\u102f\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<p>Security \u1000\u1021\u101c\u103d\u1014\u103a\u1021\u101b\u1031\u1038\u1000\u103c\u102e\u1038\u101c\u102c\u1010\u1032\u1037\u1021\u1010\u103d\u1000\u103a \u1018\u101a\u103a Sector \u1016\u103c\u1005\u103a\u1016\u103c\u1005\u103a Security \u1000\u102d\u102f\u1000\u1031\u102c\u1004\u103a\u1038\u1021\u1031\u102c\u1004\u103a \u1021\u1014\u100a\u103a\u1038\u1006\u102f\u1036\u1038\u1010\u1031\u102c\u1037 End Point Security \u101c\u1031\u102c\u1000\u103a\u101e\u102f\u1036\u1038\u101e\u1004\u1037\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n<p>\u1000\u102d\u102f\u101a\u103a\u1037\u101c\u102f\u1015\u103a\u1004\u1014\u103a\u1038\u1000 SME Level \u1010\u1005\u103a\u1001\u102f\u1016\u103c\u1005\u103a\u1015\u103c\u102e\u1038 \u101c\u1000\u103a\u101b\u103e\u102d\u1021\u1001\u103b\u102d\u1014\u103a\u1011\u102d Digital \u1005\u1014\u1005\u103a\u1019\u103b\u102c\u1038\u1000\u102d\u102f \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u1015\u1031\u1019\u101a\u103a\u1037\u00a0 Firewall \u1010\u103d\u1031\u1019\u101b\u103e\u102d\u101e\u1031\u1038\u101b\u1004\u103a\u1010\u1031\u102c\u1004\u103a\u1019\u103e Endpoint Security Solution \u1010\u1005\u103a\u1001\u102f\u101c\u1031\u102c\u1000\u103a\u1010\u1031\u102c\u1037 \u101b\u103e\u102d\u101e\u1004\u103a\u1037\u1015\u102b\u1010\u101a\u103a\u104b\u00a0 \u1000\u103c\u102d\u102f\u1010\u1004\u103a\u1000\u102c\u1000\u103d\u101a\u103a\u1001\u103c\u1004\u103a\u1038\u101f\u102c \u1000\u102f\u101e\u1001\u103c\u1004\u103a\u1038\u1011\u1000\u103a \u1021\u1019\u103b\u102c\u1038\u1000\u103c\u102e\u1038 \u1015\u102d\u102f\u1000\u1031\u102c\u1004\u103a\u1038\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u101c\u1000\u103a\u101b\u103e\u102d\u1021\u1001\u103b\u102d\u1014\u103a\u1019\u103e\u102c Digital Transformation \u1000\u102d\u102f\u1026\u1038\u1010\u100a\u103a\u101c\u102c\u1010\u102c\u1014\u1032\u1037 \u1021\u1019\u103b\u103e \u1019\u102d\u1019\u102d\u1010\u102d\u102f\u1037\u1019\u103e\u102c\u101b\u103e\u102d\u1010\u1032\u1037 \u1021\u101b\u1031\u1038\u1000\u103c\u102e\u1038\u1010\u1032\u1037 Data \u1019\u103b\u102c\u1038\u101e\u100a\u103a\u101c\u100a\u103a\u1038 Digital Format \u1019\u103b\u102c\u1038\u1016\u103c\u1004\u1037\u103a Cloud \u1015\u1031\u102b\u103a\u1010\u103d\u1004\u103a\u101c\u100a\u103a\u1038\u1000\u1031\u102c\u1004\u103a\u1038\u104a \u101b\u102f\u1036\u1038\u1010\u103d\u1004\u103a\u1038 Computer \u1019\u103b\u102c\u1038 Server \u1019\u103b\u102c\u1038\u1010\u103d\u1004\u103a\u101c\u100a\u103a\u1038\u1000\u1031\u102c\u1004\u103a\u1038 \u101e\u102d\u1019\u103a\u1038\u1006\u100a\u103a\u1038\u101c\u1031\u1037\u101b\u103e\u102d\u101c\u102c\u1015\u102b\u1010\u101a\u103a\u104b&#8230;&#8230;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":21100,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[83],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u1000\u102d\u102f\u101a\u1037\u103a Company Security \u1000\u102d\u102f\u1000\u1031\u102c\u1004\u103a\u1038\u1021\u1031\u102c\u1004\u103a\u101c\u102f\u1015\u103a\u1011\u102c\u1038\u101e\u1004\u1037\u103a\u101c\u102c\u1038? - Legend Myanmar Technology<\/title>\n<meta name=\"description\" content=\"\u101c\u1000\u103a\u101b\u103e\u102d\u1021\u1001\u103b\u102d\u1014\u103a\u1019\u103e\u102c Digital Transformation \u1000\u102d\u102f\u1026\u1038\u1010\u100a\u103a\u101c\u102c\u1010\u102c\u1014\u1032\u1037 \u1021\u1019\u103b\u103e \u1019\u102d\u1019\u102d\u1010\u102d\u102f\u1037\u1019\u103e\u102c\u101b\u103e\u102d\u1010\u1032\u1037 \u1021\u101b\u1031\u1038\u1000\u103c\u102e\u1038\u1010\u1032\u1037 Data \u1010\u103d\u1031\u1000 Digital Format \u1021\u1014\u1031\u1016\u103c\u1004\u103a\u1037 Cloud \u1015\u1031\u102b\u103a \u104a \u101b\u102f\u1036\u1038\u1010\u103d\u1004\u103a\u1038 Computer \u1019\u103b\u102c\u1038\u104a Server \u1019\u103b\u102c\u1038\u1010\u103d\u1004\u103a \u101e\u102d\u1019\u103a\u1038\u1006\u100a\u103a\u1038\u101c\u102c\u1000\u103c\u1015\u102b\u1010\u101a\u103a\u104b\" \/>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lmtech.asia\/lmt\/company-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u1000\u102d\u102f\u101a\u1037\u103a Company Security \u1000\u102d\u102f\u1000\u1031\u102c\u1004\u103a\u1038\u1021\u1031\u102c\u1004\u103a\u101c\u102f\u1015\u103a\u1011\u102c\u1038\u101e\u1004\u1037\u103a\u101c\u102c\u1038? - Legend Myanmar Technology\" \/>\n<meta property=\"og:description\" content=\"\u101c\u1000\u103a\u101b\u103e\u102d\u1021\u1001\u103b\u102d\u1014\u103a\u1019\u103e\u102c Digital Transformation \u1000\u102d\u102f\u1026\u1038\u1010\u100a\u103a\u101c\u102c\u1010\u102c\u1014\u1032\u1037 \u1021\u1019\u103b\u103e \u1019\u102d\u1019\u102d\u1010\u102d\u102f\u1037\u1019\u103e\u102c\u101b\u103e\u102d\u1010\u1032\u1037 \u1021\u101b\u1031\u1038\u1000\u103c\u102e\u1038\u1010\u1032\u1037 Data \u1010\u103d\u1031\u1000 Digital Format \u1021\u1014\u1031\u1016\u103c\u1004\u103a\u1037 Cloud \u1015\u1031\u102b\u103a \u104a \u101b\u102f\u1036\u1038\u1010\u103d\u1004\u103a\u1038 Computer \u1019\u103b\u102c\u1038\u104a Server \u1019\u103b\u102c\u1038\u1010\u103d\u1004\u103a \u101e\u102d\u1019\u103a\u1038\u1006\u100a\u103a\u1038\u101c\u102c\u1000\u103c\u1015\u102b\u1010\u101a\u103a\u104b\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lmtech.asia\/lmt\/company-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Legend Myanmar Technology\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-18T08:54:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-25T02:46:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lmtech.asia\/lmt\/wp-content\/uploads\/2020\/06\/Internet-Access-Management-6-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lmtech.asia\/lmt\/#website\",\"url\":\"https:\/\/lmtech.asia\/lmt\/\",\"name\":\"Legend Myanmar Technology\",\"description\":\"LMT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/lmtech.asia\/lmt\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lmtech.asia\/lmt\/company-security\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/lmtech.asia\/lmt\/wp-content\/uploads\/2020\/06\/Internet-Access-Management-6.png\",\"width\":1920,\"height\":1080,\"caption\":\"Endpoint Security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lmtech.asia\/lmt\/company-security\/#webpage\",\"url\":\"https:\/\/lmtech.asia\/lmt\/company-security\/\",\"name\":\"\\u1000\\u102d\\u102f\\u101a\\u1037\\u103a Company Security \\u1000\\u102d\\u102f\\u1000\\u1031\\u102c\\u1004\\u103a\\u1038\\u1021\\u1031\\u102c\\u1004\\u103a\\u101c\\u102f\\u1015\\u103a\\u1011\\u102c\\u1038\\u101e\\u1004\\u1037\\u103a\\u101c\\u102c\\u1038? - Legend Myanmar Technology\",\"isPartOf\":{\"@id\":\"https:\/\/lmtech.asia\/lmt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lmtech.asia\/lmt\/company-security\/#primaryimage\"},\"datePublished\":\"2020-06-18T08:54:18+00:00\",\"dateModified\":\"2020-06-25T02:46:56+00:00\",\"author\":{\"@id\":\"https:\/\/lmtech.asia\/lmt\/#\/schema\/person\/72cc066d8da28fb4d7b43f30d17971ad\"},\"description\":\"\\u101c\\u1000\\u103a\\u101b\\u103e\\u102d\\u1021\\u1001\\u103b\\u102d\\u1014\\u103a\\u1019\\u103e\\u102c Digital Transformation \\u1000\\u102d\\u102f\\u1026\\u1038\\u1010\\u100a\\u103a\\u101c\\u102c\\u1010\\u102c\\u1014\\u1032\\u1037 \\u1021\\u1019\\u103b\\u103e \\u1019\\u102d\\u1019\\u102d\\u1010\\u102d\\u102f\\u1037\\u1019\\u103e\\u102c\\u101b\\u103e\\u102d\\u1010\\u1032\\u1037 \\u1021\\u101b\\u1031\\u1038\\u1000\\u103c\\u102e\\u1038\\u1010\\u1032\\u1037 Data \\u1010\\u103d\\u1031\\u1000 Digital Format \\u1021\\u1014\\u1031\\u1016\\u103c\\u1004\\u103a\\u1037 Cloud \\u1015\\u1031\\u102b\\u103a \\u104a \\u101b\\u102f\\u1036\\u1038\\u1010\\u103d\\u1004\\u103a\\u1038 Computer \\u1019\\u103b\\u102c\\u1038\\u104a Server \\u1019\\u103b\\u102c\\u1038\\u1010\\u103d\\u1004\\u103a \\u101e\\u102d\\u1019\\u103a\\u1038\\u1006\\u100a\\u103a\\u1038\\u101c\\u102c\\u1000\\u103c\\u1015\\u102b\\u1010\\u101a\\u103a\\u104b\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lmtech.asia\/lmt\/company-security\/\"]}]},{\"@type\":[\"Person\"],\"@id\":\"https:\/\/lmtech.asia\/lmt\/#\/schema\/person\/72cc066d8da28fb4d7b43f30d17971ad\",\"name\":\"legend\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lmtech.asia\/lmt\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/62dbac6f3bf15f4bac338d34b62deb21?s=96&d=mm&r=g\",\"caption\":\"legend\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/posts\/21099"}],"collection":[{"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/comments?post=21099"}],"version-history":[{"count":6,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/posts\/21099\/revisions"}],"predecessor-version":[{"id":21164,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/posts\/21099\/revisions\/21164"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/media\/21100"}],"wp:attachment":[{"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/media?parent=21099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/categories?post=21099"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/tags?post=21099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}