{"id":5344,"date":"2022-08-18T11:15:19","date_gmt":"2022-08-18T11:15:19","guid":{"rendered":"https:\/\/www.allieddigital.net\/row\/?page_id=5344"},"modified":"2025-10-28T10:02:28","modified_gmt":"2025-10-28T10:02:28","slug":"aim360-degrees","status":"publish","type":"page","link":"https:\/\/www.allieddigital.net\/row\/cyber-security-networking\/aim360-degrees\/","title":{"rendered":"AIM360 Degrees"},"content":{"rendered":"[vc_row][vc_column][vc_column_text]\n<div>\n<div>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content\" equal_height=\"yes\" content_placement=\"middle\" css=\".vc_custom_1598088635227{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;}\"][vc_column css_animation=\"fadeIn\" width=\"1\/2\" css=\".vc_custom_1660821228016{background-image: url(https:\/\/www.allieddigital.net\/row\/wp-content\/uploads\/2022\/08\/360banner.png?id=5345) !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}\"]<div class=\"ult-spacer spacer-69e644fee3acb\" data-id=\"69e644fee3acb\" data-height=\"750\" data-height-mobile=\"250\" data-height-tab=\"700\" data-height-tab-portrait=\"700\" data-height-mobile-landscape=\"250\" style=\"clear:both;display:block;\"><\/div>[\/vc_column][vc_column width=\"1\/2\" el_class=\"serv-sub-sec1\"]<div class=\"ult-spacer spacer-69e644fee3aee\" data-id=\"69e644fee3aee\" data-height=\"20\" data-height-mobile=\"20\" data-height-tab=\"20\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div>[vc_custom_heading text=\"AlliedSecure\" font_container=\"tag:h1|font_size:42|text_align:left|color:%233253c7\" use_theme_fonts=\"yes\" css_animation=\"fadeInUp\" el_class=\"underlinetext\"][vc_custom_heading text=\"AIM360 Degrees\" font_container=\"tag:h1|font_size:42|text_align:left|color:%233253c7\" use_theme_fonts=\"yes\" css_animation=\"fadeInUp\"]<div class=\"ult-spacer spacer-69e644fee3b03\" data-id=\"69e644fee3b03\" data-height=\"20\" data-height-mobile=\"0\" data-height-tab=\"20\" data-height-tab-portrait=\"20\" data-height-mobile-landscape=\"0\" style=\"clear:both;display:block;\"><\/div>[vc_column_text css_animation=\"fadeInUp\" el_class=\"sub-heading\"]\n<ul>\n<li style=\"font-size: 22px;\">Requirement<\/li>\n<li style=\"font-size: 22px;\">Solution<\/li>\n<li style=\"font-size: 22px;\">Value Addition<\/li>\n<\/ul>\n[\/vc_column_text]<div class=\"ult-spacer spacer-69e644fee3b16\" data-id=\"69e644fee3b16\" data-height=\"20\" data-height-mobile=\"0\" data-height-tab=\"20\" data-height-tab-portrait=\"20\" data-height-mobile-landscape=\"0\" style=\"clear:both;display:block;\"><\/div>[vc_single_image image=\"5348\" img_size=\"medium\" alignment=\"center\"][\/vc_column][\/vc_row][vc_row equal_height=\"yes\" content_placement=\"middle\" css=\".vc_custom_1597730851435{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;background-color: #ffffff !important;}\"][vc_column css=\".vc_custom_1596905812883{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\"][vc_row_inner equal_height=\"yes\" el_class=\"digital-icons\"][vc_column_inner offset=\"vc_col-xs-12\"][vc_custom_heading text=\"Cyber security solutions and services\" font_container=\"tag:h2|font_size:30|text_align:left|color:%233253c7\" use_theme_fonts=\"yes\"]<div class=\"ult-spacer spacer-69e644fee3b27\" data-id=\"69e644fee3b27\" data-height=\"40\" data-height-mobile=\"30\" data-height-tab=\"40\" data-height-tab-portrait=\"40\" data-height-mobile-landscape=\"30\" style=\"clear:both;display:block;\"><\/div>[vc_column_text]\n<table style=\"border: 1px solid #ccc;\" border=\"0\" width=\"100%\" cellspacing=\"1\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td bgcolor=\"#3253c7\">\n<div class=\"style1\" align=\"center\">Assess<\/div>\n<\/td>\n<td bgcolor=\"#3253c7\">\n<div class=\"style1\" align=\"center\">Implement<\/div>\n<\/td>\n<td colspan=\"3\" bgcolor=\"#3253c7\">\n<div class=\"style1\" align=\"center\">Manage<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td bgcolor=\"#efefef\" width=\"32%\">\n<div align=\"center\">Security Architecture\/<br \/>\nCompliance Audit<\/div>\n<\/td>\n<td bgcolor=\"#efefef\">\n<div align=\"center\">Data Protection<\/div>\n<\/td>\n<td bgcolor=\"#efefef\">\n<div align=\"center\">Managed Security Service<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td bgcolor=\"#FFFFFF\">\n<div align=\"center\">Dark Web Analysis<\/div>\n<\/td>\n<td bgcolor=\"#FFFFFF\">\n<div align=\"center\">Identity Management<\/div>\n<\/td>\n<td bgcolor=\"#FFFFFF\">\n<div align=\"center\">Threat Management<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td bgcolor=\"#efefef\">\n<div align=\"center\">Breach Attack Simulation<\/div>\n<\/td>\n<td bgcolor=\"#efefef\">\n<div align=\"center\">Application Security<\/div>\n<\/td>\n<td bgcolor=\"#efefef\">\n<div align=\"center\">Social Media and Brand Protection<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td bgcolor=\"#FFFFFF\">\n<div align=\"center\">Vulnerability Analysis\/<br \/>\nPenetration Testing<\/div>\n<\/td>\n<td bgcolor=\"#FFFFFF\">\n<div align=\"center\">Network Security<\/div>\n<\/td>\n<td bgcolor=\"#FFFFFF\">\n<div align=\"center\">Dynamic Deception<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td bgcolor=\"#efefef\">\n<div align=\"center\">Red\/Blue Team Simulation<\/div>\n<\/td>\n<td bgcolor=\"#efefef\">\n<div align=\"center\">Endpoint Security<\/div>\n<\/td>\n<td bgcolor=\"#efefef\">\n<div align=\"center\">SOC Tools<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td bgcolor=\"#FFFFFF\">\n<div align=\"center\"><\/div>\n<\/td>\n<td bgcolor=\"#FFFFFF\">\n<div align=\"center\">Email Protection<\/div>\n<\/td>\n<td bgcolor=\"#FFFFFF\">\n<div align=\"center\">Advanced Incident Response<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td bgcolor=\"#EFEFEF\">\n<div align=\"center\"><\/div>\n<\/td>\n<td bgcolor=\"#EFEFEF\">\n<div align=\"center\">Cloud Security<\/div>\n<\/td>\n<td bgcolor=\"#EFEFEF\">\n<div align=\"center\">Cyber Forensics Analysis<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td bgcolor=\"#FFFFFF\">\n<div align=\"center\"><\/div>\n<\/td>\n<td bgcolor=\"#FFFFFF\">\n<div align=\"center\">IOT Security<\/div>\n<\/td>\n<td bgcolor=\"#FFFFFF\">\n<div align=\"center\"><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n[\/vc_column_text]<div class=\"ult-spacer spacer-69e644fee3b37\" data-id=\"69e644fee3b37\" data-height=\"40\" data-height-mobile=\"30\" data-height-tab=\"40\" data-height-tab-portrait=\"40\" data-height-mobile-landscape=\"30\" style=\"clear:both;display:block;\"><\/div>[vc_custom_heading text=\"SOC Models\" font_container=\"tag:h2|font_size:30|text_align:left|color:%233253c7\" use_theme_fonts=\"yes\"]<div class=\"ult-spacer spacer-69e644fee3b44\" data-id=\"69e644fee3b44\" data-height=\"40\" data-height-mobile=\"30\" data-height-tab=\"40\" data-height-tab-portrait=\"40\" data-height-mobile-landscape=\"30\" style=\"clear:both;display:block;\"><\/div>[vc_single_image image=\"5349\" img_size=\"large\"]<div class=\"ult-spacer spacer-69e644fee3b51\" data-id=\"69e644fee3b51\" data-height=\"40\" data-height-mobile=\"30\" data-height-tab=\"40\" data-height-tab-portrait=\"40\" data-height-mobile-landscape=\"30\" style=\"clear:both;display:block;\"><\/div>[vc_custom_heading text=\"Managed Security Service\" font_container=\"tag:h2|font_size:30|text_align:left|color:%233253c7\" use_theme_fonts=\"yes\"]<div class=\"ult-spacer spacer-69e644fee3b5f\" data-id=\"69e644fee3b5f\" data-height=\"40\" data-height-mobile=\"30\" data-height-tab=\"40\" data-height-tab-portrait=\"40\" data-height-mobile-landscape=\"30\" style=\"clear:both;display:block;\"><\/div>[vc_column_text]\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"padding: 0px;\" bgcolor=\"#CCCCCC\">\n<table style=\"border: 1px solid #ccc;\" border=\"0\" width=\"100%\" cellspacing=\"1\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td bgcolor=\"#3253c7\">\n<div class=\"style1\" align=\"center\">\n<div style=\"padding-left: 30px;\" align=\"left\">24x7 x 365 security operations<\/div>\n<\/div>\n<\/td>\n<td bgcolor=\"#3253c7\">\n<div class=\"style1\" align=\"center\">\n<div style=\"padding-left: 30px;\" align=\"left\">Supported security technologies<\/div>\n<\/div>\n<\/td>\n<td colspan=\"3\" bgcolor=\"#3253c7\">\n<div class=\"style1\" align=\"center\">\n<div style=\"padding-left: 30px;\" align=\"left\">ADiTaaS<\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" bgcolor=\"#FFFFFF\">\n<ul>\n<li>SOC Functions\n<ul>\n<li>Event Monitoring<\/li>\n<li>Threat Hunting<\/li>\n<li>Threat Management<\/li>\n<li>Device Configuration &amp; Management<\/li>\n<li>Incident Management<\/li>\n<li>Storage of Events for Forensics Analysis<\/li>\n<li>Availability Monitoring<\/li>\n<li>Daily, Weekly, Monthly &amp; Quarterly reports<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/td>\n<td valign=\"top\" bgcolor=\"#FFFFFF\">\n<ul>\n<li>Next-Gen Firewalls<\/li>\n<li>IPS\/IDS<\/li>\n<li>Application Firewalls<\/li>\n<li>Email Security<\/li>\n<li>Servers<\/li>\n<li>VPN<\/li>\n<li>Anti-Virus\/EDR<\/li>\n<li>Identity &amp; Access Management<\/li>\n<li>Wireless Networks<\/li>\n<li>Databases<\/li>\n<\/ul>\n<\/td>\n<td valign=\"top\" bgcolor=\"#FFFFFF\">\n<ul>\n<li>ADiTaaS\n<ul>\n<li>PINK certified<\/li>\n<li>End to end Service Management<\/li>\n<li>Customer Portal<\/li>\n<li>Ticketing and SLA tracking<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n[\/vc_column_text]<div class=\"ult-spacer spacer-69e644fee3b6b\" data-id=\"69e644fee3b6b\" data-height=\"20\" data-height-mobile=\"20\" data-height-tab=\"20\" data-height-tab-portrait=\"20\" data-height-mobile-landscape=\"20\" style=\"clear:both;display:block;\"><\/div>[vc_custom_heading text=\"Our Partners\" font_container=\"tag:h2|font_size:30|text_align:left|color:%233253c7\" use_theme_fonts=\"yes\"][vc_single_image image=\"5648\" img_size=\"large\"]<div class=\"ult-spacer spacer-69e644fee3b77\" data-id=\"69e644fee3b77\" data-height=\"20\" data-height-mobile=\"20\" data-height-tab=\"20\" data-height-tab-portrait=\"20\" data-height-mobile-landscape=\"20\" style=\"clear:both;display:block;\"><\/div>[vc_custom_heading text=\"Compliant Infrastructure\" font_container=\"tag:h2|font_size:30|text_align:left|color:%233253c7\" use_theme_fonts=\"yes\"]<div class=\"ult-spacer spacer-69e644fee3b83\" data-id=\"69e644fee3b83\" data-height=\"20\" data-height-mobile=\"20\" data-height-tab=\"20\" data-height-tab-portrait=\"20\" data-height-mobile-landscape=\"20\" style=\"clear:both;display:block;\"><\/div>[vc_single_image image=\"5347\" img_size=\"large\"]<div class=\"ult-spacer spacer-69e644fee3b8f\" data-id=\"69e644fee3b8f\" data-height=\"20\" data-height-mobile=\"20\" data-height-tab=\"20\" data-height-tab-portrait=\"20\" data-height-mobile-landscape=\"20\" style=\"clear:both;display:block;\"><\/div>[vc_custom_heading text=\"Cyber Threat Management\" font_container=\"tag:h2|font_size:30|text_align:left|color:%233253c7\" use_theme_fonts=\"yes\"][vc_column_text]<b>Threat Hunting and Management<\/b><\/p>\n<ul>\n<li>With access to research capabilities, know-how and threat intelligence repositories, our team can accurately identify external threats, prevent attacks, and ensure resilience.<\/li>\n<li>Continuously monitor Open, Deep and Dark web sites, as well as closed forums, social networks and messaging platforms and harvest data based on the organization\u2019s predefined threat hunting requirements.<\/li>\n<\/ul>\n[\/vc_column_text]<div class=\"ult-spacer spacer-69e644fee3b9a\" data-id=\"69e644fee3b9a\" data-height=\"20\" data-height-mobile=\"20\" data-height-tab=\"20\" data-height-tab-portrait=\"20\" data-height-mobile-landscape=\"20\" style=\"clear:both;display:block;\"><\/div>[vc_custom_heading text=\"Dynamic Deception\" font_container=\"tag:h2|font_size:30|text_align:left|color:%233253c7\" use_theme_fonts=\"yes\"][vc_column_text]<b>Use Deception Techniques to Protect<\/b><\/p>\n<ul>\n<li>Use deceiving traps and lures designed to attract an attacker into engaging and getting away from production assets.<\/li>\n<li>Project decoy throughout the network along with endpoint credentials, mapped shares, deception data or applications that will breadcrumb the attacker back to an engagement server that will alert on the presence of an attacker.<\/li>\n<li>By laying a maze of decoys, lures, and mis-directions security teams can accurately and efficiently detect early reconnaissance, lateral movement, and credential theft, improving detection time and reducing attacker dwell time.<\/li>\n<\/ul>\n[\/vc_column_text]<div class=\"ult-spacer spacer-69e644fee3ba6\" data-id=\"69e644fee3ba6\" data-height=\"20\" data-height-mobile=\"20\" data-height-tab=\"20\" data-height-tab-portrait=\"20\" data-height-mobile-landscape=\"20\" style=\"clear:both;display:block;\"><\/div>[vc_custom_heading text=\"Security Incident Response and Forensics\" font_container=\"tag:h2|font_size:30|text_align:left|color:%233253c7\" use_theme_fonts=\"yes\"][vc_column_text]<b>Engagement Models<\/b><\/p>\n<ul>\n<li>Onsite Incident Response (Rapid Response Team).<\/li>\n<li>Remote Incident Support.<\/li>\n<li>Onsite\/Remote Digital Forensics.<\/li>\n<li>Long term staffing contracts.<\/li>\n<\/ul>\n<p><b>Summary of Service and Deliverables<\/b><\/p>\n<ul>\n<li>Incident Handling based on Industry Best CERT processes.<\/li>\n<li>Incident Preparation &amp; Digital Forensics.<\/li>\n<li>Reverse Engineering &amp; Malware Analysis.<\/li>\n<li>Lessons Learned document &amp; Incident Reports.<\/li>\n<li>Support to Law Enforcement Agencies.<\/li>\n<li>Security Remediation Support.<\/li>\n<li>Create\/Enhance Incident Handling Processes.<\/li>\n<li>Creating Incident Scenarios and Response Plan<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner]<div class=\"ult-spacer spacer-69e644fee3bb8\" data-id=\"69e644fee3bb8\" data-height=\"60\" data-height-mobile=\"30\" data-height-tab=\"60\" data-height-tab-portrait=\"60\" data-height-mobile-landscape=\"30\" style=\"clear:both;display:block;\"><\/div>[vc_custom_heading text=\"Please share your details with us and we will reach out to you.\" font_container=\"tag:h3|font_size:30|text_align:left|color:%233253c7\" use_theme_fonts=\"yes\" css_animation=\"fadeInUp\"]<div class=\"ult-spacer spacer-69e644fee3bc4\" data-id=\"69e644fee3bc4\" data-height=\"40\" data-height-mobile=\"20\" data-height-tab=\"40\" data-height-tab-portrait=\"40\" data-height-mobile-landscape=\"20\" style=\"clear:both;display:block;\"><\/div>\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f5352-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"5352\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/row\/wp-json\/wp\/v2\/pages\/5344#wpcf7-f5352-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"5352\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f5352-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7dtx_version\" value=\"5.0.5\" \/>\n<\/fieldset>\n<div class=\"span6\">\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Full Name*\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span>\n\t<\/p>\n<\/div>\n<div class=\"span6\">\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Corporate Email*\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span>\n\t<\/p>\n<\/div>\n<div class=\"span6\">\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"phoneno\"><input class=\"wpcf7-form-control wpcf7-number wpcf7-validates-as-required wpcf7-validates-as-number\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone No.*\" value=\"\" type=\"number\" name=\"phoneno\" \/><\/span>\n\t<\/p>\n<\/div>\n<div class=\"span6\">\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"OrganisationName\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" placeholder=\"Organization Name\" value=\"\" type=\"text\" name=\"OrganisationName\" \/><\/span>\n\t<\/p>\n<\/div>\n<div class=\"span6\">\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"DesignationName\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" placeholder=\"Designation\" value=\"\" type=\"text\" name=\"DesignationName\" \/><\/span>\n\t<\/p>\n<\/div>\n<div class=\"span6\">\n\t<p>&nbsp;\n\t<\/p>\n<\/div>\n<div class=\"span12\">\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"Message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" placeholder=\"Message\" name=\"Message\"><\/textarea><\/span>\n\t<\/p>\n<\/div>\n<div class=\"span12\">\n\t<div id=\"cf7sr-69e644fee4dba\" class=\"cf7sr-g-recaptcha\" data-theme=\"light\" data-type=\"image\" data-size=\"normal\" data-sitekey=\"6LeIOtsZAAAAAOlJGVWulf7rxuG9iDvLfAfraD3c\"><\/div><span class=\"wpcf7-form-control-wrap cf7sr-recaptcha\" data-name=\"cf7sr-recaptcha\"><input type=\"hidden\" name=\"cf7sr-recaptcha\" value=\"\" class=\"wpcf7-form-control\"><\/span>\n\t<\/p>\n<\/div>\n<div class=\"span12\">\n\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Submit\" \/>\n\t<\/p>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<div class=\"ult-spacer spacer-69e644fee4e05\" data-id=\"69e644fee4e05\" data-height=\"40\" data-height-mobile=\"30\" data-height-tab=\"40\" data-height-tab-portrait=\"40\" data-height-mobile-landscape=\"30\" style=\"clear:both;display:block;\"><\/div>[\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]\n<\/div>\n<\/div>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1598088635227{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":5783,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-fullwidth.php","meta":{"footnotes":""},"class_list":["post-5344","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>AIM360 Degrees - Allied Digital Home<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.allieddigital.net\/row\/cyber-security-networking\/aim360-degrees\/\" \/>\r\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.allieddigital.net\\\/row\\\/cyber-security-networking\\\/aim360-degrees\\\/\",\"url\":\"https:\\\/\\\/www.allieddigital.net\\\/row\\\/cyber-security-networking\\\/aim360-degrees\\\/\",\"name\":\"AIM360 Degrees - Allied Digital Home\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.allieddigital.net\\\/row\\\/#website\"},\"datePublished\":\"2022-08-18T11:15:19+00:00\",\"dateModified\":\"2025-10-28T10:02:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.allieddigital.net\\\/row\\\/cyber-security-networking\\\/aim360-degrees\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.allieddigital.net\\\/row\\\/cyber-security-networking\\\/aim360-degrees\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.allieddigital.net\\\/row\\\/cyber-security-networking\\\/aim360-degrees\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.allieddigital.net\\\/row\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security &#038; Networking\",\"item\":\"https:\\\/\\\/www.allieddigital.net\\\/row\\\/cyber-security-networking\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"AIM360 Degrees\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.allieddigital.net\\\/row\\\/#website\",\"url\":\"https:\\\/\\\/www.allieddigital.net\\\/row\\\/\",\"name\":\"Allied Digital Home\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.allieddigital.net\\\/row\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AIM360 Degrees - Allied Digital Home","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.allieddigital.net\/row\/cyber-security-networking\/aim360-degrees\/","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.allieddigital.net\/row\/cyber-security-networking\/aim360-degrees\/","url":"https:\/\/www.allieddigital.net\/row\/cyber-security-networking\/aim360-degrees\/","name":"AIM360 Degrees - Allied Digital Home","isPartOf":{"@id":"https:\/\/www.allieddigital.net\/row\/#website"},"datePublished":"2022-08-18T11:15:19+00:00","dateModified":"2025-10-28T10:02:28+00:00","breadcrumb":{"@id":"https:\/\/www.allieddigital.net\/row\/cyber-security-networking\/aim360-degrees\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.allieddigital.net\/row\/cyber-security-networking\/aim360-degrees\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.allieddigital.net\/row\/cyber-security-networking\/aim360-degrees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.allieddigital.net\/row\/"},{"@type":"ListItem","position":2,"name":"Cyber Security &#038; Networking","item":"https:\/\/www.allieddigital.net\/row\/cyber-security-networking\/"},{"@type":"ListItem","position":3,"name":"AIM360 Degrees"}]},{"@type":"WebSite","@id":"https:\/\/www.allieddigital.net\/row\/#website","url":"https:\/\/www.allieddigital.net\/row\/","name":"Allied Digital Home","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.allieddigital.net\/row\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.allieddigital.net\/row\/wp-json\/wp\/v2\/pages\/5344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.allieddigital.net\/row\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.allieddigital.net\/row\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.allieddigital.net\/row\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.allieddigital.net\/row\/wp-json\/wp\/v2\/comments?post=5344"}],"version-history":[{"count":0,"href":"https:\/\/www.allieddigital.net\/row\/wp-json\/wp\/v2\/pages\/5344\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.allieddigital.net\/row\/wp-json\/wp\/v2\/pages\/5783"}],"wp:attachment":[{"href":"https:\/\/www.allieddigital.net\/row\/wp-json\/wp\/v2\/media?parent=5344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}