{"id":12,"date":"2024-08-05T14:34:31","date_gmt":"2024-08-05T14:34:31","guid":{"rendered":"https:\/\/cyber-ats.com\/?page_id=12"},"modified":"2025-01-30T15:26:49","modified_gmt":"2025-01-30T15:26:49","slug":"product","status":"publish","type":"page","link":"https:\/\/cyber-ats.com\/index.php\/product\/","title":{"rendered":"Product"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"12\" class=\"elementor elementor-12\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b38cf27 e-flex e-con-boxed e-con e-parent\" data-id=\"b38cf27\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3d8e359 e-con-full e-flex e-con e-child\" data-id=\"3d8e359\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-022a1d1 elementor-widget elementor-widget-heading\" data-id=\"022a1d1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Type Here...\">ACCESSIBLE <\/span>threat takedown<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6c79721 e-flex e-con-boxed e-con e-parent\" data-id=\"6c79721\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c300858 e-con-full e-flex e-con e-child\" data-id=\"c300858\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-32cf104 e-con-full e-flex e-con e-child\" data-id=\"32cf104\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea2bd08 elementor-widget elementor-widget-text-editor\" data-id=\"ea2bd08\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>CyberATS<\/strong> is your ultimate solution for automated threat takedown. CyberATS simplifies and accelerates the process of eliminating online threats like Phishing, Spear Phishing and other forms of impersonation, helping you safeguard your users or clients effectively and efficiently.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-864f448 e-flex e-con-boxed e-con e-parent\" data-id=\"864f448\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e513c61 e-con-full e-flex e-con e-child\" data-id=\"e513c61\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8c09b3d elementor-widget elementor-widget-image\" data-id=\"8c09b3d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"620\" src=\"https:\/\/cyber-ats.com\/wp-content\/uploads\/2024\/08\/mockup-1024x794.png\" class=\"attachment-large size-large wp-image-108\" alt=\"\" srcset=\"https:\/\/cyber-ats.com\/wp-content\/uploads\/2024\/08\/mockup-1024x794.png 1024w, https:\/\/cyber-ats.com\/wp-content\/uploads\/2024\/08\/mockup-300x232.png 300w, https:\/\/cyber-ats.com\/wp-content\/uploads\/2024\/08\/mockup-768x595.png 768w, https:\/\/cyber-ats.com\/wp-content\/uploads\/2024\/08\/mockup-1536x1190.png 1536w, https:\/\/cyber-ats.com\/wp-content\/uploads\/2024\/08\/mockup-2048x1587.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8864387 e-con-full e-flex e-con e-child\" data-id=\"8864387\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2c3310a elementor-widget elementor-widget-heading\" data-id=\"2c3310a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Choose CyberATS?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f763a92 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"f763a92\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Automated Threat Removal: <\/b>CyberATS is engineered to handle the entire threat removal process from start to finish. Once a malicious URL is identified, our system automatically analyzes the threat, reaches out to the relevant entities to request the malicious content to be removed, then monitors the threat until it is taken down. Simultaneously, CyberATS notifies blocking partners to prevent end-users from accessing the malicious content, further minimizing the risk<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Seamless Integration: <\/b>With both customer and vendor APIs, CyberATS integrates effortlessly into your existing systems. Dedicated dashboards are also available for manual requests<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Complete Process Management: <\/b>CyberATS takes care of everything \u2014 from initial threat analysis to continuous monitoring of the takedown process. All you need to do is submit the malicious URL and CyberATS handles the rest.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aeb1e82 e-con-full e-flex e-con e-child\" data-id=\"aeb1e82\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-49bbdba e-con-full e-flex e-con e-child\" data-id=\"49bbdba\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f70c02b elementor-widget elementor-widget-heading\" data-id=\"f70c02b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vendor-Friendly Business Model<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a22e121 e-con-full e-flex e-con e-child\" data-id=\"a22e121\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-16157a3 e-con-full e-flex e-con e-child\" data-id=\"16157a3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e93792f elementor-widget elementor-widget-text-editor\" data-id=\"e93792f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Token-Based System:<\/strong> CyberATS operates on a straightforward, token-based model. Each takedown consumes one token, allowing you to control costs with precision. Buy tokens in advance and benefit from bulk discounts \u2014 the more tokens you purchase, the lower the price per takedown.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a22e0b5 e-con-full e-flex e-con e-child\" data-id=\"a22e0b5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-50b6596 elementor-widget elementor-widget-text-editor\" data-id=\"50b6596\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Flexible Token Management:<\/strong> Vendors and MSSPs can manage tokens flexibly. Assign a private pool of tokens to specific customers or use a shared pool to cover multiple clients. This allows you to tailor your service offerings to meet the diverse needs of your customers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5de14d6 e-con-full e-flex e-con e-child\" data-id=\"5de14d6\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-82f055c e-con-full e-flex e-con e-child\" data-id=\"82f055c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ec7538 elementor-widget elementor-widget-text-editor\" data-id=\"1ec7538\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Stay in Control:<\/strong> Partnering with CyberATS enables the incorporation of takedowns into your offering, while maintaining control over your branding and pricing you offer to your customers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cedb1ca e-con-full e-flex e-con e-child\" data-id=\"cedb1ca\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d189320 elementor-widget elementor-widget-text-editor\" data-id=\"d189320\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Dedicated Vendor API and Dashboard:<\/strong> Our dedicated API provides vendors with all the tools needed to manage customer accounts, monitor takedown activities, and optimize service delivery<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32684fc e-flex e-con-boxed e-con e-parent\" data-id=\"32684fc\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7390f3c e-con-full e-flex e-con e-child\" data-id=\"7390f3c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d8113ad elementor-widget elementor-widget-heading\" data-id=\"d8113ad\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How It Works<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3fd4b3b e-con-full e-flex e-con e-child\" data-id=\"3fd4b3b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d485c1 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5d485c1\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" data-name=\"Layer 1\" viewBox=\"0 0 500 500\"><defs><style>      .cls-1 {        fill: #0f005e;        font-family: Lato-Light, Lato;        font-size: 423.18px;        font-weight: 300;      }      .cls-2 {        fill: #e1f3ff;        stroke-width: 0px;      }    <\/style><\/defs><circle class=\"cls-2\" cx=\"250\" cy=\"250\" r=\"243\"><\/circle><text class=\"cls-1\" transform=\"translate(109.76 388.29)\"><tspan x=\"0\" y=\"0\">1<\/tspan><\/text><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Submit the Malicious URL:<\/b> Provide the URL of the threat through our intuitive interface or API<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" data-name=\"Layer 1\" viewBox=\"0 0 500 500\"><defs><style>      .cls-1 {        fill: #0f005e;        font-family: Lato-Light, Lato;        font-size: 423.18px;        font-weight: 300;      }      .cls-2 {        fill: #e1f3ff;        stroke-width: 0px;      }    <\/style><\/defs><circle class=\"cls-2\" cx=\"250\" cy=\"250\" r=\"243\"><\/circle><text class=\"cls-1\" transform=\"translate(109.76 388.29)\"><tspan x=\"0\" y=\"0\">2<\/tspan><\/text><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Automated Analysis: <\/b>CyberATS analyzes the threat and identifies the relevant entities responsible for hosting or managing the malicious content.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" data-name=\"Layer 1\" viewBox=\"0 0 500 500\"><defs><style>      .cls-1 {        fill: #0f005e;        font-family: Lato-Light, Lato;        font-size: 423.18px;        font-weight: 300;      }      .cls-2 {        fill: #e1f3ff;        stroke-width: 0px;      }    <\/style><\/defs><circle class=\"cls-2\" cx=\"250\" cy=\"250\" r=\"243\"><\/circle><text class=\"cls-1\" transform=\"translate(109.76 388.29)\"><tspan x=\"0\" y=\"0\">3<\/tspan><\/text><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Entity Outreach:<\/b> Our system automatically contacts web hosting companies, registrars, and other relevant entities to request content removal.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" data-name=\"Layer 1\" viewBox=\"0 0 500 500\"><defs><style>      .cls-1 {        fill: #0f005e;        font-family: Lato-Light, Lato;        font-size: 423.18px;        font-weight: 300;      }      .cls-2 {        fill: #e1f3ff;        stroke-width: 0px;      }    <\/style><\/defs><circle class=\"cls-2\" cx=\"250\" cy=\"250\" r=\"243\"><\/circle><text class=\"cls-1\" transform=\"translate(109.76 388.29)\"><tspan x=\"0\" y=\"0\">4<\/tspan><\/text><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Blocking Partner Notification:<\/b> Simultaneously, CyberATS reaches out to blocking partners to prevent end-users from accessing the malicious content until it is taken down.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" data-name=\"Layer 1\" viewBox=\"0 0 500 500\"><defs><style>      .cls-1 {        fill: #0f005e;        font-family: Lato-Light, Lato;        font-size: 423.18px;        font-weight: 300;      }      .cls-2 {        fill: #e1f3ff;        stroke-width: 0px;      }    <\/style><\/defs><circle class=\"cls-2\" cx=\"250\" cy=\"250\" r=\"243\"><\/circle><text class=\"cls-1\" transform=\"translate(109.76 388.29)\"><tspan x=\"0\" y=\"0\">5<\/tspan><\/text><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Continuous Monitoring:<\/b> CyberATS tracks the status of the takedown, ensuring the threat is removed effectively and promptly.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8babbef e-flex e-con-boxed e-con e-parent\" data-id=\"8babbef\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-69c3870 e-con-full e-flex e-con e-child\" data-id=\"69c3870\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ff2053 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"7ff2053\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-handshake\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M519.2 127.9l-47.6-47.6A56.252 56.252 0 0 0 432 64H205.2c-14.8 0-29.1 5.9-39.6 16.3L118 127.9H0v255.7h64c17.6 0 31.8-14.2 31.9-31.7h9.1l84.6 76.4c30.9 25.1 73.8 25.7 105.6 3.8 12.5 10.8 26 15.9 41.1 15.9 18.2 0 35.3-7.4 48.8-24 22.1 8.7 48.2 2.6 64-16.8l26.2-32.3c5.6-6.9 9.1-14.8 10.9-23h57.9c.1 17.5 14.4 31.7 31.9 31.7h64V127.9H519.2zM48 351.6c-8.8 0-16-7.2-16-16s7.2-16 16-16 16 7.2 16 16c0 8.9-7.2 16-16 16zm390-6.9l-26.1 32.2c-2.8 3.4-7.8 4-11.3 1.2l-23.9-19.4-30 36.5c-6 7.3-15 4.8-18 2.4l-36.8-31.5-15.6 19.2c-13.9 17.1-39.2 19.7-55.3 6.6l-97.3-88H96V175.8h41.9l61.7-61.6c2-.8 3.7-1.5 5.7-2.3H262l-38.7 35.5c-29.4 26.9-31.1 72.3-4.4 101.3 14.8 16.2 61.2 41.2 101.5 4.4l8.2-7.5 108.2 87.8c3.4 2.8 3.9 7.9 1.2 11.3zm106-40.8h-69.2c-2.3-2.8-4.9-5.4-7.7-7.7l-102.7-83.4 12.5-11.4c6.5-6 7-16.1 1-22.6L367 167.1c-6-6.5-16.1-6.9-22.6-1l-55.2 50.6c-9.5 8.7-25.7 9.4-34.6 0-9.3-9.9-8.5-25.1 1.2-33.9l65.6-60.1c7.4-6.8 17-10.5 27-10.5l83.7-.2c2.1 0 4.1.8 5.5 2.3l61.7 61.6H544v128zm48 47.7c-8.8 0-16-7.2-16-16s7.2-16 16-16 16 7.2 16 16c0 8.9-7.2 16-16 16z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-026d7ed elementor-widget elementor-widget-heading\" data-id=\"026d7ed\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Start Protecting Your Clients Today<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e0f4d5 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"2e0f4d5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>CyberATS<\/strong> is exclusively available to MSSPs and security vendors. Elevate your threat management services with the power of automated takedowns. Contact us today to learn more about how CyberATS can enhance your cybersecurity offerings.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>ACCESSIBLE threat takedown CyberATS is your ultimate solution for automated threat takedown. CyberATS simplifies and accelerates the process of eliminating online threats like Phishing, Spear Phishing and other forms of impersonation, helping you safeguard your users or clients effectively and efficiently. Why Choose CyberATS? Automated Threat Removal: CyberATS is engineered to handle the entire threat [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-12","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyber-ats.com\/index.php\/wp-json\/wp\/v2\/pages\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-ats.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-ats.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-ats.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-ats.com\/index.php\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":49,"href":"https:\/\/cyber-ats.com\/index.php\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":275,"href":"https:\/\/cyber-ats.com\/index.php\/wp-json\/wp\/v2\/pages\/12\/revisions\/275"}],"wp:attachment":[{"href":"https:\/\/cyber-ats.com\/index.php\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}