{"id":22,"date":"2019-09-18T21:57:28","date_gmt":"2019-09-18T21:57:28","guid":{"rendered":"http:\/\/prosaweb.duckdns.org\/?page_id=22"},"modified":"2021-12-07T12:29:33","modified_gmt":"2021-12-07T12:29:33","slug":"front-page","status":"publish","type":"page","link":"https:\/\/prosasecurity.com\/","title":{"rendered":"Front Page"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"22\" class=\"elementor elementor-22\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-10f9eff0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"10f9eff0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5f219b8b\" data-id=\"5f219b8b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-09cf1e8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"09cf1e8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c8878a1\" data-id=\"c8878a1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4803fd0 elementor-widget elementor-widget-image\" data-id=\"4803fd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"817\" height=\"901\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2021\/11\/fixed-what-we-half-1-1.png\" class=\"attachment-large size-large wp-image-434\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-03a4976\" data-id=\"03a4976\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b9b7d1b elementor-widget elementor-widget-heading\" data-id=\"b9b7d1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PROSA: Security by design<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b00a164 elementor-widget elementor-widget-text-editor\" data-id=\"b00a164\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With PROSA you can test system vulnerability in applications and application layers for a range of distinct attack types, including <strong>confidentiality, integrity, and authenticity.<\/strong><\/p>\n<p>Compared with traditional security checks, which typically screen for only one type of potential danger, PROSA can give you close to 100% security confidence in your solution.<\/p>\n<p>Our product introduces a <strong>formal approach<\/strong>, applying advanced mathematics for developing security models, and optionally testing your solution before green-lighting deployment.<\/p>\n<p>The unique PROSA solution simulates<strong> passive and active<\/strong> attacks affecting the application layer, including data communication. We provide easy-to-use software which does not require IT security specialists to reach and document high-security levels in your product.<\/p>\n<p>Furthermore, we have an approach that helps you <strong>document compliance<\/strong>, e.g. with the PSD2 regulation. Together with certification organizations, we can help you document that your solution fulfills the requirements of nearly any regulation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf2efdd elementor-widget elementor-widget-heading\" data-id=\"bf2efdd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Some of our customers<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36287f9 elementor-widget elementor-widget-image-gallery\" data-id=\"36287f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-gallery.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-gallery\">\n\t\t\t<div id='gallery-1' class='gallery galleryid-22 gallery-columns-4 gallery-size-full'><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<img decoding=\"async\" width=\"400\" height=\"200\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/Encap.png\" class=\"attachment-full size-full\" alt=\"\" \/>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<img decoding=\"async\" width=\"230\" height=\"120\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/KantegaLogoProsa.jpg\" class=\"attachment-full size-full\" alt=\"\" \/>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"200\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/Bank-id.png\" class=\"attachment-full size-full\" alt=\"\" \/>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"200\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/hafslund.png\" class=\"attachment-full size-full\" alt=\"\" \/>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"200\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/sparebank.png\" class=\"attachment-full size-full\" alt=\"\" \/>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"230\" height=\"120\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/ProtectoriaProsaLogo.jpg\" class=\"attachment-full size-full\" alt=\"\" \/>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"200\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/aidon.png\" class=\"attachment-full size-full\" alt=\"\" \/>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"140\" height=\"139\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2020\/01\/buypass.png\" class=\"attachment-full size-full\" alt=\"\" \/>\n\t\t\t<\/div><\/figure>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>PROSA: Security by design With PROSA you can test system vulnerability in applications and application layers for a range of distinct attack types, including confidentiality, integrity, and authenticity. Compared with traditional security checks, which typically screen for only one type of potential danger, PROSA can give you close to 100% security confidence in your solution. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-22","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/22","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/comments?post=22"}],"version-history":[{"count":42,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/22\/revisions"}],"predecessor-version":[{"id":507,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/22\/revisions\/507"}],"wp:attachment":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/media?parent=22"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}