{"id":811,"date":"2025-06-17T13:12:48","date_gmt":"2025-06-17T13:12:48","guid":{"rendered":"https:\/\/staging.mintcreative.com\/ideal-test\/?page_id=811"},"modified":"2025-07-22T15:39:38","modified_gmt":"2025-07-22T15:39:38","slug":"perimeter-security","status":"publish","type":"page","link":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/perimeter-security\/","title":{"rendered":"Perimeter Security"},"content":{"rendered":"\n<!-- \/\/ Hero section -->\n<section class=\"secondary-hero secondary-hero--minimal\">\n    <div class=\"container\">\n        <div class=\"row position-relative\">\n            <div class=\"hero-content col-lg-8 offset-lg-2 text-center\">\n                <h1 class=\"secondary-hero__heading h1 text-gradient\">\n                    Perimeter Security                <\/h1>\n\n                                    <h2 class=\"secondary-hero__subheading h2\">\n                        Preventing malicious cyber attacks                     <\/h2>\n                \n                                    <p class=\"secondary-hero__text p-intro mb-0\">\n                        With cyber threats constantly evolving, perimeter security stands as your first and most critical line of defence. Ideal can help you to protect your cyber perimeter, implementing the latest technologies and processes to help you prevent malicious cyber-attacks and data breaches.                     <\/p>\n                \n                                    <div id=\"contact-trigger\" class=\"secondary-hero__btn z-0 btn-wrapper\" data-bs-toggle=\"modal\" data-bs-target=\"#contactModal\" data-subject=\"Perimeter Security enquiry\">\n                        <span class=\"btn btn-color\">\n                            Book a Cyber Security Assessment                         <\/span>\n                        <div class=\"btn-extension\">\n                            <img decoding=\"async\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/themes\/ideal\/images\/_splide-right-arrow.png\" alt=\"\">\n                        <\/div>\n                    <\/div>\n                            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"split-text\" id=\"expertise\">\n    <div class=\"container\">\n        <div class=\"inner-pad\">\n\n                            <div class=\"row\">\n                    <div class=\"col-12 col-xl-6\">\n                        <h2 class=\"split-text__heading h1 text-gradient\">\n                            What\u2019s the core threat to your organisation?                        <\/h2>\n                    <\/div>\n                <\/div>\n            \n            <div class=\"row\">\n                <div class=\"col-12 col-xl-6\">\n                    <div class=\"split-text__left position-relative top-0\">\n                        <p class=\"p-intro\"><span class=\"TextRun SCXW242371749 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242371749 BCX0\">Your organisation <\/span><span class=\"NormalTextRun SCXW242371749 BCX0\">operates<\/span><span class=\"NormalTextRun SCXW242371749 BCX0\"> with <\/span><span class=\"NormalTextRun SCXW242371749 BCX0\">data it is duty bound to protect. You<\/span><span class=\"NormalTextRun SCXW242371749 BCX0\">r customers <\/span><span class=\"NormalTextRun SCXW242371749 BCX0\">place their trust<\/span> <span class=\"NormalTextRun SCXW242371749 BCX0\">in you<\/span><span class=\"NormalTextRun SCXW242371749 BCX0\">, and your<\/span> <span class=\"NormalTextRun SCXW242371749 BCX0\">cyber-<\/span><span class=\"NormalTextRun SCXW242371749 BCX0\">reputation<\/span><span class=\"NormalTextRun SCXW242371749 BCX0\"> is a critical <\/span><span class=\"NormalTextRun SCXW242371749 BCX0\">foundation to<\/span><span class=\"NormalTextRun SCXW242371749 BCX0\"> that trust.<\/span><\/span><\/p>\n                    <\/div>\n                <\/div>\n                <div class=\"col-12 col-xl-6\">\n                    <div class=\"split-text__right\">\n                        <p><span class=\"TextRun SCXW55667226 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW55667226 BCX0\">Ensuring that <\/span><span class=\"NormalTextRun SCXW55667226 BCX0\">inbound and outbound traffic <\/span><span class=\"NormalTextRun SCXW55667226 BCX0\">does<\/span><span class=\"NormalTextRun SCXW55667226 BCX0\">n\u2019<\/span><span class=\"NormalTextRun SCXW55667226 BCX0\">t<\/span> <span class=\"NormalTextRun SCXW55667226 BCX0\">pose<\/span><span class=\"NormalTextRun SCXW55667226 BCX0\"> a threat to your business, and <\/span><span class=\"NormalTextRun SCXW55667226 BCX0\">that malicious actors are unable to compromise your <\/span><span class=\"NormalTextRun SCXW55667226 BCX0\">IT perimeter requires the right security solutions, <\/span><span class=\"NormalTextRun SCXW55667226 BCX0\">configured and <\/span><span class=\"NormalTextRun SCXW55667226 BCX0\">maintained<\/span><span class=\"NormalTextRun SCXW55667226 BCX0\"> to best practices.<\/span><\/span><span class=\"EOP SCXW55667226 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>Ideal can help you to review and develop your existing perimeter security strategy, helping you to expand protections or design and implement strategies.<\/p>\n                    <\/div>\n                <\/div>\n            <\/div>\n\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"banner-image banner-image--s3\">\n    <div class=\"container\">\n        <div class=\"row\">\n            <div class=\"col\">\n                <div class=\"position-relative\">\n                    <img decoding=\"async\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/07\/iStock-2174150395.jpg\" alt=\"Banner Image\" class=\"img-fluid w-100\">\n                                            <span class=\"banner-image__info col-6\">A Broad Range of Perimeter Solutions<\/span>\n                                    <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"split-text\" id=\"expertise\">\n    <div class=\"container\">\n        <div class=\"inner-pad\">\n\n            \n            <div class=\"row\">\n                <div class=\"col-12 col-xl-6\">\n                    <div class=\"split-text__left position-sticky\">\n                        <p class=\"p-intro\"><span class=\"TextRun SCXW84131567 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW84131567 BCX0\">We can help you to choose the right vendor and the right technology. <\/span><span class=\"NormalTextRun SCXW84131567 BCX0\">We\u2019ll<\/span><span class=\"NormalTextRun SCXW84131567 BCX0\"> ensure that your policies and processes meet best practice standards, and we can manage and support your perimeter control s<\/span><span class=\"NormalTextRun SCXW84131567 BCX0\">ecurity<\/span><span class=\"NormalTextRun SCXW84131567 BCX0\">\u00a024\/7\/365, if <\/span><span class=\"NormalTextRun SCXW84131567 BCX0\">that\u2019s<\/span><span class=\"NormalTextRun SCXW84131567 BCX0\"> what you need.<\/span><\/span><\/p>\n                    <\/div>\n                <\/div>\n                <div class=\"col-12 col-xl-6\">\n                    <div class=\"split-text__right\">\n                        <p>Working with your team, we\u2019ll implement an advanced perimeter security solution. This might include:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong><span class=\"TextRun MacChromeBold SCXW192422607 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW192422607 BCX0\">Next Generation Firewalls<\/span><\/span><span class=\"TextRun SCXW192422607 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW192422607 BCX0\">, <\/span><\/span><\/strong><span class=\"TextRun SCXW192422607 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW192422607 BCX0\">offering the most advanced perimeter protection for your infrastructure, users, and data<\/span><\/span><\/li>\n<li><strong>Intrusion Detection &amp; Prevention Systems (IDPS)<\/strong>, deploying IDPS to detect and prevent external threats, analysis of intrusion logs and response procedures<\/li>\n<li><strong>Web Traffic Security<\/strong>, helping you to refine and deploy a robust Web Security Policy to protect against web-based threats and analysing WAF\/Proxy logs<\/li>\n<li><strong>Home Office \/Small Branch Security<\/strong>, integrating with <a href=\"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/sase\/\"><u>SASE<\/u><\/a> where appropriate.<\/li>\n<li><strong><span class=\"TextRun MacChromeBold SCXW115667413 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW115667413 BCX0\">Intelligent Firebreak Devices<\/span><\/span><\/strong><span class=\"TextRun SCXW115667413 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW115667413 BCX0\">, enabling automated isolation of networks and network segments from external access<\/span><\/span><\/li>\n<\/ul>\n                    <\/div>\n                <\/div>\n            <\/div>\n\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n\n<section class=\"case-studies\" style=\"background-color: #f9f9f9\">\n  <div class=\"container\">\n    <div class=\"row\">\n      <div class=\"col-md-8 offset-md-2\">\n        <div class=\"text-center\">\n          <span class=\"pill\">\n            Case studies\n          <\/span>\n          <br \/>\n          <h2 class=\"case-studies__heading text-gradient\">\n            Ideal Cyber Security in action          <\/h2>\n          <p class=\"case-studies__text p-intro m-0\"><\/p>\n        <\/div>\n      <\/div>\n    <\/div>\n    <div class=\"row case-studies__grid\">\n                <div class=\"col-12 col-lg-4\">\n            <div class=\"case-study\">\n              <a class=\"text-decoration-none\" href=\"https:\/\/staging.mintcreative.com\/ideal-test\/case-study\/beggars-group\/\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/Beggars-Group-07-1280x853-1-1024x682.jpg\" class=\"case-study__img wp-post-image\" alt=\"\" srcset=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/Beggars-Group-07-1280x853-1-1024x682.jpg 1024w, https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/Beggars-Group-07-1280x853-1-300x200.jpg 300w, https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/Beggars-Group-07-1280x853-1-768x512.jpg 768w, https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/Beggars-Group-07-1280x853-1.jpg 1280w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/>              <\/a>\n              <div class=\"case-study__info\">\n                <a class=\"text-decoration-none\" href=\"https:\/\/staging.mintcreative.com\/ideal-test\/case-study\/beggars-group\/\">\n                  <h3 class=\"case-study__title\"><span class=\"text-gradient\">Beggars Group<\/span><\/h3>\n                <\/a>\n                <p class=\"case-study__excerpt\">Helping one of the largest independent record labels in the world to consolidate local networks, enhancing collaboration and saving money.<\/p>\n                <a class=\"case-study__text-link text-link--gradient\" href=\"https:\/\/staging.mintcreative.com\/ideal-test\/case-study\/beggars-group\/\">\n                  Read more\n                <\/a>\n              <\/div>\n            <\/div>\n          <\/div>\n                  <div class=\"col-12 col-lg-4\">\n            <div class=\"case-study\">\n              <a class=\"text-decoration-none\" href=\"https:\/\/staging.mintcreative.com\/ideal-test\/case-study\/rouse\/\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/ROUSE-THE-CHALLENGE-01-AdobeStock_872933034.jpg\" class=\"case-study__img wp-post-image\" alt=\"\" srcset=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/ROUSE-THE-CHALLENGE-01-AdobeStock_872933034.jpg 1000w, https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/ROUSE-THE-CHALLENGE-01-AdobeStock_872933034-300x168.jpg 300w, https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/ROUSE-THE-CHALLENGE-01-AdobeStock_872933034-768x430.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/>              <\/a>\n              <div class=\"case-study__info\">\n                <a class=\"text-decoration-none\" href=\"https:\/\/staging.mintcreative.com\/ideal-test\/case-study\/rouse\/\">\n                  <h3 class=\"case-study__title\"><span class=\"text-gradient\">Rouse<\/span><\/h3>\n                <\/a>\n                <p class=\"case-study__excerpt\">Keeping this international law firm secure and connected with 24\/7\/365 support across 12 jurisdictions worldwide.<\/p>\n                <a class=\"case-study__text-link text-link--gradient\" href=\"https:\/\/staging.mintcreative.com\/ideal-test\/case-study\/rouse\/\">\n                  Read more\n                <\/a>\n              <\/div>\n            <\/div>\n          <\/div>\n                  <div class=\"col-12 col-lg-4\">\n            <div class=\"case-study\">\n              <a class=\"text-decoration-none\" href=\"https:\/\/staging.mintcreative.com\/ideal-test\/case-study\/battersea-power-station\/\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/BATTERSEA-POWER-STATION-01-AdobeStock_550910504-1024x684.jpg\" class=\"case-study__img wp-post-image\" alt=\"\" srcset=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/BATTERSEA-POWER-STATION-01-AdobeStock_550910504-1024x684.jpg 1024w, https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/BATTERSEA-POWER-STATION-01-AdobeStock_550910504-300x200.jpg 300w, https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/BATTERSEA-POWER-STATION-01-AdobeStock_550910504-768x513.jpg 768w, https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/BATTERSEA-POWER-STATION-01-AdobeStock_550910504-1536x1026.jpg 1536w, https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/BATTERSEA-POWER-STATION-01-AdobeStock_550910504.jpg 1951w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/>              <\/a>\n              <div class=\"case-study__info\">\n                <a class=\"text-decoration-none\" href=\"https:\/\/staging.mintcreative.com\/ideal-test\/case-study\/battersea-power-station\/\">\n                  <h3 class=\"case-study__title\"><span class=\"text-gradient\">Battersea Power Station<\/span><\/h3>\n                <\/a>\n                <p class=\"case-study__excerpt\">Battersea Power Station is a 42 acre mixed-use development which is home to shops, bars, restaurants, hotels and luxury apartments, leisure and entertainment venues, parks and historical spaces.<\/p>\n                <a class=\"case-study__text-link text-link--gradient\" href=\"https:\/\/staging.mintcreative.com\/ideal-test\/case-study\/battersea-power-station\/\">\n                  Read more\n                <\/a>\n              <\/div>\n            <\/div>\n          <\/div>\n                          <\/div>\n          <div class=\"row\">\n        <div class=\"col text-center\">\n          <div class=\"btn-wrapper\">\n            <a class=\"btn btn-color\" href=\"https:\/\/staging.mintcreative.com\/ideal-test\/case-studies\">\n              View all case studies\n            <\/a>\n            <div class=\"btn-extension\">\n              <img decoding=\"async\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/themes\/ideal\/images\/_splide-right-arrow.png\" alt=\"\">\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n      <\/div>\n<\/section>\n\n\n\n<section class=\"icon-boxes\">\n    <div class=\"container\">\n        <div class=\"row\">\n            <div class=\"col-12\">\n                <h2 class=\"text-gradient\">With Ideal, you can expect:<\/h2>\n            <\/div>\n        <\/div>\n        <div class=\"row\">\n                            <div class=\"col-12 col-lg-4\">\n                    <div class=\"icon-box\">\n                        <div class=\"icon-box__icon\">\n                            <img decoding=\"async\" width=\"53\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/design-icon.png\" alt=\"\">\n                        <\/div>\n                        <div class=\"icon-box__details\">\n                            <h3>Expert design<\/h3>\n                            <p>Enhanced perimeter security tailored to your specific network, legacy technology and user activity.<\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"col-12 col-lg-4\">\n                    <div class=\"icon-box\">\n                        <div class=\"icon-box__icon\">\n                            <img decoding=\"async\" width=\"53\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/installation-icon.png\" alt=\"\">\n                        <\/div>\n                        <div class=\"icon-box__details\">\n                            <h3>Smooth delivery<\/h3>\n                            <p>Working\u00a0 with your team to expertly configure, test and deploy technologies, policies and protocols.<\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"col-12 col-lg-4\">\n                    <div class=\"icon-box\">\n                        <div class=\"icon-box__icon\">\n                            <img decoding=\"async\" width=\"53\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/uploads\/2025\/06\/support-icon.png\" alt=\"\">\n                        <\/div>\n                        <div class=\"icon-box__details\">\n                            <h3>Dependable support<\/h3>\n                            <p>Monitoring and reviewing effectiveness and providing UK-based <a href=\"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/managed-services\/\">Managed Service Support<\/a>\u00a0going forward.<\/p>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                    <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"cta-block\">\n    <div class=\"container\">\n        <div class=\"row\">\n            <div class=\"col\">\n                <div class=\"cta-block__inner\">\n                    <div class=\"cta-block__left-col\">\n                        <img decoding=\"async\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/themes\/ideal\/images\/_support-icon-lg.png\" alt=\"\" width=\"289\" class=\"img-fluid\" \/>\n                    <\/div>\n                    <div class=\"cta-block__right-col\">\n                        <h3>How can we help?<\/h3>\n                        <h2>Book a Cyber Security Assessment<\/h2>\n                        <p class=\"p-intro\">To book a Cyber Security Assessment or consult with one of our Cyber experts, fill in the form and we\u2019ll get right back to you.<\/p>\n\n                                                    <div id=\"contact-trigger\" class=\"btn-wrapper\" data-bs-toggle=\"modal\" data-bs-target=\"#contactModal\" style=\"cursor: pointer;\" data-subject=\"\">\n                                <span class=\"btn-color btn-color--reverse d-inline-block text-center\">\n                                    <span class=\"text-gradient\">Book a Cyber Security Assessment<\/span>\n                                <\/span>\n                                <div class=\"btn-extension\">\n                                    <img decoding=\"async\" src=\"https:\/\/staging.mintcreative.com\/ideal-test\/wp-content\/themes\/ideal\/images\/_btn-arrow-white.png\" alt=\"\">\n                                <\/div>\n                            <\/div>\n                        \n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":0,"parent":646,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"page-full.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-811","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.5 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Perimeter Security - Ideal<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/perimeter-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Perimeter Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/perimeter-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Ideal\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-22T15:39:38+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/expertise\\\/cyber-security\\\/perimeter-security\\\/\",\"url\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/expertise\\\/cyber-security\\\/perimeter-security\\\/\",\"name\":\"Perimeter Security - Ideal\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/#website\"},\"datePublished\":\"2025-06-17T13:12:48+00:00\",\"dateModified\":\"2025-07-22T15:39:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/expertise\\\/cyber-security\\\/perimeter-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/expertise\\\/cyber-security\\\/perimeter-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/expertise\\\/cyber-security\\\/perimeter-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Expertise\",\"item\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/expertise\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Security &amp; AI\",\"item\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/expertise\\\/cyber-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Perimeter Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/#website\",\"url\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/\",\"name\":\"Ideal\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/staging.mintcreative.com\\\/ideal-test\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Perimeter Security - Ideal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/perimeter-security\/","og_locale":"en_US","og_type":"article","og_title":"Perimeter Security","og_url":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/perimeter-security\/","og_site_name":"Ideal","article_modified_time":"2025-07-22T15:39:38+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/perimeter-security\/","url":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/perimeter-security\/","name":"Perimeter Security - Ideal","isPartOf":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/#website"},"datePublished":"2025-06-17T13:12:48+00:00","dateModified":"2025-07-22T15:39:38+00:00","breadcrumb":{"@id":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/perimeter-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/perimeter-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/perimeter-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging.mintcreative.com\/ideal-test\/"},{"@type":"ListItem","position":2,"name":"Expertise","item":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/"},{"@type":"ListItem","position":3,"name":"Cyber Security &amp; AI","item":"https:\/\/staging.mintcreative.com\/ideal-test\/expertise\/cyber-security\/"},{"@type":"ListItem","position":4,"name":"Perimeter Security"}]},{"@type":"WebSite","@id":"https:\/\/staging.mintcreative.com\/ideal-test\/#website","url":"https:\/\/staging.mintcreative.com\/ideal-test\/","name":"Ideal","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.mintcreative.com\/ideal-test\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/pages\/811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/comments?post=811"}],"version-history":[{"count":27,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/pages\/811\/revisions"}],"predecessor-version":[{"id":2716,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/pages\/811\/revisions\/2716"}],"up":[{"embeddable":true,"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/pages\/646"}],"wp:attachment":[{"href":"https:\/\/staging.mintcreative.com\/ideal-test\/wp-json\/wp\/v2\/media?parent=811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}