{"id":753,"date":"2025-07-17T11:35:46","date_gmt":"2025-07-17T11:35:46","guid":{"rendered":"https:\/\/bthrustgrp.com\/custom-software-campaign-dev\/?page_id=753"},"modified":"2025-12-08T11:25:13","modified_gmt":"2025-12-08T11:25:13","slug":"firewall-perimeter-security","status":"publish","type":"page","link":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/","title":{"rendered":"Firewall &#038; Perimeter Security"},"content":{"rendered":"<h2>Robotic Automation<\/h2>\n<p>Lorem ipsum dolor, sit amet consectetur adipisicing elit. Sit sunt harum, temporibus omnis hic reiciendis iure quisquam culpa modi sed in natus! Voluptatum voluptates dicta laudantium fugit sequi nobis omnis?<\/p>\n<p>Lorem ipsum dolor, sit amet consectetur adipisicing elit. Sit sunt harum, temporibus omnis hic reiciendis iure quisquam culpa modi sed in natus! Voluptatum voluptates dicta laudantium fugit sequi nobis omnis?<\/p>\n<h2>This event will allow participants to:<\/h2>\n<p>Lorem ipsum dolor, sit amet consectetur adipisicing elit. Sit sunt harum, temporibus omnis hic reiciendis iure quisquam culpa modi sed in natus! Voluptatum voluptates dicta laudantium fugit sequi nobis omnis?<\/p>\n<ul class=\"list-unstyled \">\n<li><i class=\"circle fa fa-chevron-right\"><\/i>Robotic automation allows participants to streamline processes, reducing manual effort and boosting productivity.<\/li>\n<li><i class=\"circle fa fa-chevron-right\"><\/i>Participants can lower operational costs through reduced labor and increased accuracy.<\/li>\n<li><i class=\"circle fa fa-chevron-right\"><\/i>\u00a0Automation frees up time for participants to focus on higher-value, strategic activities, fostering innovation and growth.<\/li>\n<\/ul>\n<p>Lorem ipsum dolor, sit amet consectetur adipisicing elit. Sit sunt harum, temporibus omnis hic reiciendis iure quisquam culpa modi sed in natus! Voluptatum voluptates dicta laudantium fugit sequi nobis omnis?<\/p>\n<p>Lorem ipsum dolor, sit amet consectetur adipisicing elit. Sit sunt harum, temporibus omnis hic reiciendis iure quisquam culpa modi sed in natus! Voluptatum voluptates dicta laudantium fugit sequi nobis omnis?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Robotic Automation Lorem ipsum dolor, sit amet consectetur adipisicing elit. Sit sunt harum, temporibus omnis hic reiciendis iure quisquam culpa modi sed in natus! Voluptatum voluptates dicta laudantium fugit sequi nobis omnis? Lorem ipsum dolor, sit amet consectetur adipisicing elit. Sit sunt harum, temporibus omnis hic reiciendis iure quisquam culpa modi sed in natus! Voluptatum [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":347,"parent":228,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"templates\/service-details.php","meta":{"footnotes":""},"class_list":["post-753","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Firewall &amp; Perimeter Security - Genic Cyber Security Solutions<\/title>\n<meta name=\"description\" content=\"Safeguard networks with Firewall &amp; Perimeter Security. Gain visibility, control, and threat prevention to protect hybrid and multi\u2011cloud environments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Firewall &amp; Perimeter Security - Genic Cyber Security Solutions\" \/>\n<meta property=\"og:description\" content=\"Safeguard networks with Firewall &amp; Perimeter Security. Gain visibility, control, and threat prevention to protect hybrid and multi\u2011cloud environments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Security Solutions\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-08T11:25:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-content\/uploads\/2025\/07\/case-study-2-2048x1310-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/\",\"url\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/\",\"name\":\"Firewall & Perimeter Security - Genic Cyber Security Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-content\/uploads\/2025\/07\/case-study-2-2048x1310-1.jpg\",\"datePublished\":\"2025-07-17T11:35:46+00:00\",\"dateModified\":\"2025-12-08T11:25:13+00:00\",\"description\":\"Safeguard networks with Firewall & Perimeter Security. Gain visibility, control, and threat prevention to protect hybrid and multi\u2011cloud environments.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/#primaryimage\",\"url\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-content\/uploads\/2025\/07\/case-study-2-2048x1310-1.jpg\",\"contentUrl\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-content\/uploads\/2025\/07\/case-study-2-2048x1310-1.jpg\",\"width\":2048,\"height\":1310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our Services\",\"item\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Firewall &#038; Perimeter Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/#website\",\"url\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/\",\"name\":\"Cyber Security Solutions\",\"description\":\"Cyber Security Solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Firewall & Perimeter Security - Genic Cyber Security Solutions","description":"Safeguard networks with Firewall & Perimeter Security. Gain visibility, control, and threat prevention to protect hybrid and multi\u2011cloud environments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/","og_locale":"en_US","og_type":"article","og_title":"Firewall & Perimeter Security - Genic Cyber Security Solutions","og_description":"Safeguard networks with Firewall & Perimeter Security. Gain visibility, control, and threat prevention to protect hybrid and multi\u2011cloud environments.","og_url":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/","og_site_name":"Cyber Security Solutions","article_modified_time":"2025-12-08T11:25:13+00:00","og_image":[{"width":2048,"height":1310,"url":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-content\/uploads\/2025\/07\/case-study-2-2048x1310-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/","url":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/","name":"Firewall & Perimeter Security - Genic Cyber Security Solutions","isPartOf":{"@id":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/#primaryimage"},"image":{"@id":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-content\/uploads\/2025\/07\/case-study-2-2048x1310-1.jpg","datePublished":"2025-07-17T11:35:46+00:00","dateModified":"2025-12-08T11:25:13+00:00","description":"Safeguard networks with Firewall & Perimeter Security. Gain visibility, control, and threat prevention to protect hybrid and multi\u2011cloud environments.","breadcrumb":{"@id":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/#primaryimage","url":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-content\/uploads\/2025\/07\/case-study-2-2048x1310-1.jpg","contentUrl":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-content\/uploads\/2025\/07\/case-study-2-2048x1310-1.jpg","width":2048,"height":1310},{"@type":"BreadcrumbList","@id":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/firewall-perimeter-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/"},{"@type":"ListItem","position":2,"name":"Our Services","item":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/services\/"},{"@type":"ListItem","position":3,"name":"Firewall &#038; Perimeter Security"}]},{"@type":"WebSite","@id":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/#website","url":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/","name":"Cyber Security Solutions","description":"Cyber Security Solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/pages\/753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/comments?post=753"}],"version-history":[{"count":8,"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/pages\/753\/revisions"}],"predecessor-version":[{"id":1011,"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/pages\/753\/revisions\/1011"}],"up":[{"embeddable":true,"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/pages\/228"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/media\/347"}],"wp:attachment":[{"href":"https:\/\/www.genicsolutions.com\/cyber-security-solutions\/wp-json\/wp\/v2\/media?parent=753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}