{"id":3105,"date":"2020-07-25T21:54:34","date_gmt":"2020-07-25T21:54:34","guid":{"rendered":"https:\/\/softwarevital.com\/blog\/?page_id=3105"},"modified":"2020-07-25T23:34:29","modified_gmt":"2020-07-25T23:34:29","slug":"service-categories","status":"publish","type":"page","link":"https:\/\/www.softwarevital.com\/blog\/service-categories\/","title":{"rendered":"Service Categories"},"content":{"rendered":"<h2>Find the Right Software<\/h2>\n<form  role=\"search\" method=\"get\" id=\"rh-custom-search-5f1cc185cefef\" action=\"https:\/\/softwarevital.com\/blog\/\">\n\t\t\t  <input type=\"text\" name=\"s\" placeholder=\"Search Software Type\"  data-posttype=\"\" data-enable_compare=\"\" data-catid=\"\"><br \/>\n\t\t\t  <input type=\"hidden\" name=\"post_type\" value=\"\" \/><br \/>\n\t\t\t  <input type=\"hidden\" name=\"cat\" value=\"\" \/><br \/>\n\t\t\t  <button type=\"submit\"><\/button><br \/>\n\t\t\t<\/form>\n<h2>Markeitng Services \u27a4<\/h2>\n<ul>\n<li id=\"tooltip5f1cc185d0945\" data-local=\"true\" >\n<p>Marketing Automation Software<\/p>\n<\/li>\n<li id=\"tooltip5f1cc185d0953\" data-local=\"true\" >\n<p>Marketing Analytics Software<\/p>\n<\/li>\n<li id=\"tooltip5f1cc185d095b\" data-local=\"true\" >\n<p>Email Marketing Software<\/p>\n<\/li>\n<li id=\"tooltip5f1cc185d0961\" data-local=\"true\" >\n<p>Lead Generation Software<\/p>\n<\/li>\n<li id=\"tooltip5f1cc185d0967\" data-local=\"true\" >\n<p>Lead Management Software<\/p>\n<\/li>\n<\/ul>\n<h2>Business Services \u27a4<\/h2>\n<h2>Cyber Security Services \u27a4<\/h2>\n<ul>\n<li id=\"tooltip5f1cc185d308c\" data-local=\"true\" >\n<p>Application Security Services<\/p>\n<\/li>\n<li id=\"tooltip5f1cc185d3099\" data-local=\"true\" >\n<p>Cybersecurity Consulting<\/p>\n<\/li>\n<li id=\"tooltip5f1cc185d30a0\" data-local=\"true\" >\n<p>Data Security Services<\/p>\n<\/li>\n<li id=\"tooltip5f1cc185d30a5\" data-local=\"true\" >\n<p>Email Security Services<\/p>\n<\/li>\n<li id=\"tooltip5f1cc185d30ab\" data-local=\"true\" >\n<p>Endpoint Security Services<\/p>\n<\/li>\n<\/ul>\n<ul>\n<li id=\"tooltip5f1cc185d3e43\" data-local=\"true\" >\n<p>Incident Response Services<\/p>\n<\/li>\n<li id=\"tooltip5f1cc185d3e4e\" data-local=\"true\" >\n<p>IoT Security Services<\/p>\n<\/li>\n<li id=\"tooltip5f1cc185d3e54\" data-local=\"true\" >\n<p>IT Compliance Services<\/p>\n<\/li>\n<li id=\"tooltip5f1cc185d3e5a\" data-local=\"true\" >\n<p>Managed Detection and Response Services<\/p>\n<\/li>\n<li id=\"tooltip5f1cc185d3e5f\" data-local=\"true\" >\n<p>Managed Security Services<\/p>\n<\/li>\n<\/ul>\n<ul>\n<li id=\"tooltip5f1cc185d4bf7\" data-local=\"true\" >\n<p>Managed SIEM Services<\/p>\n<\/li>\n<li id=\"tooltip5f1cc185d4c02\" data-local=\"true\" >\n<p>Network Security Services<\/p>\n<\/li>\n<li id=\"tooltip5f1cc185d4c08\" data-local=\"true\" >\n<p>Threat Hunting Services<\/p>\n<\/li>\n<li id=\"tooltip5f1cc185d4c0e\" data-local=\"true\" >\n<p>Vulnerability Assessment Services<\/p>\n<\/li>\n<li id=\"tooltip5f1cc185d4c13\" data-local=\"true\" >\n<p>Other Security Services<\/p>\n<\/li>\n<\/ul>\n<h2>Professional Services \u27a4<\/h2>\n<h2>Hosting &#038; Domain Services \u27a4<\/h2>\n<h2>Other Services \u27a4<\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Find the Right Software Markeitng Services \u27a4 Marketing Automation Software Marketing Analytics Software Email Marketing Software Lead Generation Software Lead Management Software Business Services \u27a4 Cyber Security Services \u27a4 Application Security Services Cybersecurity Consulting Data Security Services Email Security Services Endpoint Security Services Incident Response Services IoT Security Services IT Compliance Services Managed Detection and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-3105","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.softwarevital.com\/blog\/wp-json\/wp\/v2\/pages\/3105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softwarevital.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.softwarevital.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.softwarevital.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.softwarevital.com\/blog\/wp-json\/wp\/v2\/comments?post=3105"}],"version-history":[{"count":5,"href":"https:\/\/www.softwarevital.com\/blog\/wp-json\/wp\/v2\/pages\/3105\/revisions"}],"predecessor-version":[{"id":3118,"href":"https:\/\/www.softwarevital.com\/blog\/wp-json\/wp\/v2\/pages\/3105\/revisions\/3118"}],"wp:attachment":[{"href":"https:\/\/www.softwarevital.com\/blog\/wp-json\/wp\/v2\/media?parent=3105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}