{"id":16475,"date":"2025-12-27T12:32:37","date_gmt":"2025-12-27T12:32:37","guid":{"rendered":"https:\/\/dmsretail.com\/RetailNews\/cisco-secure-client-the-integrated-platform-for-federal-endpoint-security-and-compliance\/"},"modified":"2025-12-27T12:32:37","modified_gmt":"2025-12-27T12:32:37","slug":"cisco-secure-client-the-integrated-platform-for-federal-endpoint-security-and-compliance","status":"publish","type":"post","link":"https:\/\/dmsretail.com\/RetailNews\/cisco-secure-client-the-integrated-platform-for-federal-endpoint-security-and-compliance\/","title":{"rendered":"Cisco Secure Client: The Integrated Platform for Federal Endpoint Security and Compliance"},"content":{"rendered":"<p> <p><a href=\"https:\/\/dmsretail.com\/online-workshops-list\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-496\" src=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png\" alt=\"Retail Online Training\" width=\"729\" height=\"91\" srcset=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png 729w, https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90-300x37.png 300w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/a><\/p><br \/>\n<\/p>\n<div>\n<p><span data-contrast=\"auto\">For U.S.\u00a0public sector\u00a0agencies\u2014from\u00a0civilian departments to the DoD and Intelligence communities\u2014the mission is always the top priority. Safeguarding sensitive information, guaranteeing smooth operations, and staying compliant are the non-negotiable duties of every hero in the field. But even the most dedicated defenders often find themselves tangled in a web of ever-evolving endpoint security tools,\u00a0each\u00a0contributing to\u00a0its own challenges.\u00a0It\u2019s\u00a0not just about memory consumption;\u00a0it\u2019s\u00a0about battling performance slowdowns, wrestling with operational complexity, expanding the attack surface, and carrying the heavy load of managing a league of disconnected solutions.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">With\u00a0<\/span><b><span data-contrast=\"none\">Cisco Secure Client<\/span><\/b><span data-contrast=\"auto\">,\u00a0public sector\u00a0heroes gain integrated superpowers\u2014streamlining security, simplifying compliance, and unleashing top-tier performance all from a single, unified platform.\u00a0Agencies are rightly cautious about deploying\u00a0additional\u00a0endpoint software. Every new agent introduces:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Performance Impact:<\/span><\/b><span data-contrast=\"auto\"> Consuming CPU and memory, potentially degrading critical system performance, especially on legacy or resource-constrained devices.<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Complexity\u00a0and\u00a0Compatibility:<\/span><\/b><span data-contrast=\"auto\">\u00a0Introducing management challenges and potential conflicts with existing systems, leading to operational disruptions.<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Increased Attack Surface:<\/span><\/b><span data-contrast=\"auto\">\u00a0Each new software\u00a0component\u00a0is a potential vulnerability, requiring rigorous evaluation and ongoing patching.<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Operational Overhead:<\/span><\/b><span data-contrast=\"auto\">\u00a0Demanding significant IT resources for deployment, maintenance, updates, and support.<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Compliance\u00a0and\u00a0Licensing Hurdles:<\/span><\/b><span data-contrast=\"auto\">\u00a0Complicating adherence to strict government regulations and audit requirements.<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">User Experience Degradation:<\/span><\/b><span data-contrast=\"auto\">\u00a0Causing system slowdowns or frequent alerts that hinder productivity.<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Deployment Challenges:<\/span><\/b><span data-contrast=\"auto\">\u00a0Requiring extensive planning and testing to minimize disruption across vast, distributed environments.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">These formidable challenges call for more than just ordinary solutions\u2014they demand tools with true superpowers: lightweight, efficient, and seamlessly integrated. That\u2019s\u00a0where\u00a0Cisco Secure Client\u00a0swoops in, ready to transform endpoint security for the U.S.\u00a0public sector. With its unified powers, Cisco Secure Client equips agencies to conquer complexity and protect their missions like never before.<\/span><\/p>\n<h2>One client, comprehensive security: The Cisco Secure Client advantage<\/h2>\n<p><span data-contrast=\"auto\">Cisco Secure Client\u00a0consolidates\u00a0a suite of critical security capabilities into a single, highly efficient agent. This unified approach directly addresses the\u00a0public sector\u2019s concerns by reducing endpoint clutter, simplifying management, and significantly enhancing the overall security posture.\u00a0It\u2019s\u00a0not just a VPN;\u00a0it\u2019s\u00a0a foundational security platform.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Let\u2019s\u00a0look under the superhero cape and\u00a0explore the key modules and their benefits,\u00a0demonstrating\u00a0how one client delivers a multitude of security advantages:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ol>\n<li><strong>VPN (Virtual Private Network) Module: Secure remote access and data-in-transit protection<\/strong><br \/>At its core, Cisco Secure Client provides robust VPN connectivity, enabling secure remote access for employees, contractors, and partners. It establishes encrypted tunnels, safeguarding sensitive data as it traverses untrusted networks. For agencies with distributed workforces and a need for secure access to classified or sensitive networks, this module is indispensable, helping to ensure compliance with data protection mandates.<\/li>\n<li><strong>Network Visibility Module (NVM): Unprecedented endpoint insight<\/strong><br \/>NVM provides deep visibility into endpoint network activity. It collects flow data (who, what, when, where, how) without requiring a separate agent. This granular insight allows security teams to:\n<ul>\n<li><strong>Identify anomalous network behavior:<\/strong> This capability allows security teams to spot unusual or unexpected network traffic patterns that deviate from normal operations, which can often be an early indicator of a security breach or compromise. By flagging these deviations, it helps in proactively identifying potential threats that might otherwise go unnoticed.<\/li>\n<li><strong>Detect malware command-and-control communications:<\/strong> This refers to the ability to pinpoint the specific network communications between a compromised endpoint and a malicious server, which malware uses to receive instructions or exfiltrate data. Recognizing these \u201ccall-home\u201d signals is crucial for quickly isolating infected systems and preventing further damage.<\/li>\n<li><strong>Monitor application usage and enforce acceptable use policies:<\/strong> This function provides visibility into which applications are being used on endpoints and by whom, enabling agencies to help ensure compliance with their established guidelines for software use. It helps prevent unauthorized application deployment, manage licensing, and maintain a secure and productive computing environment.<\/li>\n<li><strong>Accelerate threat hunting and incident response by providing a clear picture of endpoint communications:<\/strong> By offering detailed insights into all network activity originating from endpoints, NVM significantly speeds up the process of proactively searching for threats (threat hunting) and responding effectively to security incidents. This comprehensive visibility allows analysts to quickly understand the scope of an attack, trace its origins, and implement containment measures.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Umbrella Roaming Security Module: DNS-layer security everywhere<\/strong><br \/>This module extends Cisco Umbrella\u2019s powerful DNS-layer security to devices even when they are off the corporate network and not connected via VPN. It blocks access to malicious domains (malware, phishing, C2 callbacks) at the earliest point, preventing threats from ever reaching the endpoint. This is crucial for protecting mobile workforces and devices that frequently operate outside the agency\u2019s traditional perimeter.<\/li>\n<li><strong>Posture Module: Ensuring device compliance<\/strong><br \/>The Posture Module assesses the security state of an endpoint before granting network access. It can check for:\n<ul>\n<li>\u00a0<strong>Operating system patches:<\/strong> This check verifies that the endpoint has the latest security updates and fixes applied to its operating system, which is critical for remediating known vulnerabilities that attackers could exploit. Ensuring up-to-date patching significantly reduces the attack surface of the device.<\/li>\n<li><strong>Antivirus definitions and status:<\/strong> This refers to confirming that antivirus software is not only installed and running but also has the most current threat definitions. This ensures the endpoint is equipped to detect and protect against the latest known malware and other malicious threats.<\/li>\n<li><strong>Presence:<\/strong> This capability assesses whether specific, mandatory security software, agents, or critical configurations (such as disk encryption or host-based firewalls) are installed and active on the endpoint. Verifying their presence helps ensure the device adheres to organizational security baselines before being granted network access.<\/li>\n<li><strong>Disk encryption status:<\/strong> This ensures that only devices meeting defined security policies can connect, significantly reducing the risk of compromised endpoints introducing threats into the network. When integrated with Cisco Identity Services Engine (ISE), it enables dynamic access control based on device posture and user identity.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Duo Security Module: Seamless multi-factor authentication (MFA)<\/strong><br \/>Integrating directly with Cisco Duo, this module enables seamless MFA for VPN connections and other access points. MFA is a critical control for government agencies, mandated by various directives (e.g., OMB M-19-17). By embedding MFA capabilities, Cisco Secure Client strengthens identity verification, making it significantly harder for unauthorized users to gain access even if credentials are stolen.<\/li>\n<li><strong>Secure Endpoint Enabler: Integrated threat detection and response<\/strong><br \/>While Cisco Secure Endpoint (formerly AMP for Endpoints) is a separate solution, Cisco Secure Client includes an enabler that simplifies its deployment and integration. This allows agencies to leverage Secure Endpoint\u2019s advanced malware prevention, detection, and response capabilities, including continuous monitoring, retrospective security, and threat hunting, all managed centrally.<\/li>\n<li><strong>Secure Access (ZTNA Agent): The future of access control<\/strong><br \/>As agencies move towards Zero Trust architectures, Cisco Secure Client serves as the agent for Cisco Secure Access (ZTNA). This capability shifts from implicit trust to explicit verification, granting granular, least-privilege access to applications based on user identity, device posture, and context, regardless of location. This significantly reduces the attack surface and enhances security for cloud-based and on-premises applications.<\/li>\n<li><strong>Cisco Endpoint Security Analytics Built on Splunk (CESA)<\/strong><br \/>Cisco Endpoint Security Analytics Built on Splunk (CESA) enhances Cisco Secure Client by providing deep endpoint visibility and an early-warning system for threats. It leverages telemetry from the Secure Client\u2019s Network Visibility Module (NVM) to detect endpoint threats such as zero-day malware, dangerous user behavior, and data exfiltration before they become critical issues. CESA captures endpoint telemetry whether devices are on or off the network, offering continuous monitoring without requiring additional agents. It provides instant insights through prebuilt Splunk dashboards, enabling security teams to conduct forensic analysis, monitor application and SaaS usage, and track device types and operating systems.<\/li>\n<\/ol>\n<h2>The\u00a0unified\u00a0advantage for the\u00a0public sector<span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">By\u00a0consolidating\u00a0these critical functions into a single client, Cisco Secure Client delivers tangible\u00a0superhero\u00a0benefits directly addressing\u00a0public sector\u00a0pain points:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Reduced\u00a0endpoint\u00a0footprint:<\/span><\/b><span data-contrast=\"auto\">\u00a0Fewer agents mean less resource consumption, improved system performance, and a smaller attack surface.<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Simplified\u00a0management\u00a0and\u00a0operations:<\/span><\/b><span data-contrast=\"auto\"> Centralized deployment, configuration, and monitoring reduce IT overhead, freeing up valuable resources for strategic initiatives.<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Enhanced\u00a0security\u00a0posture:<\/span><\/b><span data-contrast=\"auto\"> A holistic, integrated approach provides comprehensive protection against a wide range of threats, from network-based attacks to advanced malware and identity compromise.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Streamlined\u00a0compliance:<\/span><\/b><span data-contrast=\"auto\"> Easier to manage and audit security controls, helping agencies meet stringent regulatory requirements (e.g., FISMA, NIST, CMMC).<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Improved\u00a0user\u00a0experience:<\/span><\/b><span data-contrast=\"auto\"> Seamless, secure access without the friction of multiple, potentially conflicting security agents.<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Cost\u00a0efficiency:<\/span><\/b><span data-contrast=\"auto\">\u00a0Consolidating\u00a0multiple functions into one solution can reduce licensing and operational costs associated with disparate tools.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">For U.S.\u00a0public sector\u00a0agencies facing an ever-evolving threat landscape, Cisco Secure Client equips your teams with true superpowers\u2014a unified, efficient, and powerful shield against cyber adversaries. This\u00a0isn\u2019t\u00a0just about dodging\u00a0software overload;\u00a0it\u2019s\u00a0about deploying one integrated hero that delivers end-to-end protection, turbocharged efficiency, and steadfast compliance. With Cisco Secure Client, your agency gains the ultimate ally in the fight for security and mission success.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">References<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<\/p><\/div>\n<p><p><a href=\"https:\/\/dmsretail.com\/online-workshops-list\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-496\" src=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png\" alt=\"Retail Online Training\" width=\"729\" height=\"91\" srcset=\"https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90.png 729w, https:\/\/dmsretail.com\/RetailNews\/wp-content\/uploads\/2022\/05\/RETAIL-ONLINE-TRAINING-728-X-90-300x37.png 300w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/a><\/p><br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For U.S.\u00a0public sector\u00a0agencies\u2014from\u00a0civilian departments to the DoD and Intelligence communities\u2014the mission is always the top priority. Safeguarding sensitive information, guaranteeing smooth operations, and staying compliant [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":16476,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-16475","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/posts\/16475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/comments?post=16475"}],"version-history":[{"count":0,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/posts\/16475\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/media\/16476"}],"wp:attachment":[{"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/media?parent=16475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/categories?post=16475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dmsretail.com\/RetailNews\/wp-json\/wp\/v2\/tags?post=16475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}