{"id":2321,"date":"2020-06-18T13:56:03","date_gmt":"2020-06-18T13:56:03","guid":{"rendered":"https:\/\/www.odinenterprises.net\/?page_id=2321"},"modified":"2020-07-22T15:29:01","modified_gmt":"2020-07-22T15:29:01","slug":"sweeps","status":"publish","type":"page","link":"https:\/\/www.odinenterprises.net\/index.php\/sweeps\/","title":{"rendered":"Odin Sweeps"},"content":{"rendered":"<div id=\"pl-2321\"  class=\"panel-layout\" ><div id=\"pg-2321-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-2321-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-2321-0-0-0\" class=\"so-panel widget widget_sow-hero panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-2321-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-hero so-widget-sow-hero-default-7c1b3f5a69fb-2321 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"0.85\"\n\t\t>\t\t\t\t<div class=\"sow-slider-base\" style=\"display: none\">\n\t\t\t\t\t<ul\n\t\t\t\t\tclass=\"sow-slider-images\"\n\t\t\t\t\tdata-settings=\"{&quot;pagination&quot;:true,&quot;speed&quot;:800,&quot;timeout&quot;:8000,&quot;paused&quot;:false,&quot;pause_on_hover&quot;:false,&quot;swipe&quot;:true,&quot;nav_always_show_desktop&quot;:&quot;&quot;,&quot;nav_always_show_mobile&quot;:&quot;&quot;,&quot;breakpoint&quot;:&quot;780px&quot;,&quot;unmute&quot;:false,&quot;anchor&quot;:null}\"\n\t\t\t\t\tstyle=\"min-height: 300px\"\t\t\t\t\tdata-anchor-id=\"\"\n\t\t\t\t>\t\t<li class=\"sow-slider-image  sow-slider-image-cover\" style=\"visibility: visible;;background-color: #333333\" >\n\t\t\t\t\t<div class=\"sow-slider-image-container\">\n\t\t\t<div class=\"sow-slider-image-wrapper\">\n\t\t\t\t<h1 style=\"text-align: center\"><strong>Odin Sweeps<\/strong><\/h1>\n<p style=\"text-align: center\"><strong>Odin Sweeps <\/strong><em>is a comprehensive physical and technical inspection of the working environment to detect and neutralize various forms of covert surveillance against our clients. The counter-surveillance approach Odin Sweeps uses detects cyber and physical \u2018eavesdropping\u2019 and highlights the importance of neutralizing any internal or external threats to your confidential and proprietary information.<\/em><\/p>\n&nbsp;\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"sow-slider-image-overlay sow-slider-image-cover\" style=\"background-image: url(https:\/\/www.odinenterprises.net\/wp-content\/uploads\/2018\/05\/816843954.jpg);opacity: 0.4\"  ><\/div>\t\t<\/li>\n\t\t<\/ul>\t\t\t\t<ol class=\"sow-slider-pagination\">\n\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"#\" data-goto=\"0\" aria-label=\"display slide 1\"><\/a><\/li>\n\t\t\t\t\t\t\t\t\t<\/ol>\n\n\t\t\t\t<div class=\"sow-slide-nav sow-slide-nav-next\">\n\t\t\t\t\t<a href=\"#\" data-goto=\"next\" aria-label=\"next slide\" data-action=\"next\">\n\t\t\t\t\t\t<em class=\"sow-sld-icon-thin-right\"><\/em>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\n\t\t\t\t<div class=\"sow-slide-nav sow-slide-nav-prev\">\n\t\t\t\t\t<a href=\"#\" data-goto=\"previous\" aria-label=\"previous slide\" data-action=\"prev\">\n\t\t\t\t\t\t<em class=\"sow-sld-icon-thin-left\"><\/em>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-2321-1\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-2321-1\" ><div id=\"pgc-2321-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-2321-1-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-e1e4d6b6e623-2321\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t<h1 class='sow-headline'>Odin Sweeps provides:<\/h1>\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><div id=\"panel-2321-1-0-1\" class=\"so-panel widget widget_sow-features panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-features so-widget-sow-features-default-4b28be7a8e0b-2321\"\n\t\t\t\n\t\t>\n<div class=\"sow-features-list sow-features-responsive\">\n\n\t\t\t\t\t\t\t\t\t<div\n\t\t\t\tclass=\"sow-features-feature sow-icon-container-position-top sow-features-feature-last-row\"\n\t\t\t\tstyle=\"display: flex; flex-direction: column; width: 33.333%;\"\n\t\t\t>\n\t\t\t\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"sow-icon-container sow-container-square\"\n\t\t\t\t\tstyle=\"color: #ffffff; \"\n\t\t\t\t\ttitle=\"Technical Surveillance Countermeasures\">\n\t\t\t\t\t<span class=\"sow-icon-genericons\" data-sow-icon=\"&#xf470;\"\n\t\tstyle=\"font-size: 64px; color: #4a525a\" \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"textwidget\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h5>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\tTechnical Surveillance Countermeasures\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">Utilizing trained technical experts and specialized equipment, TSCM sweeps of critical areas are conducted for any implanted eavesdropping devices to ensure integrity of company confidential communications and meetings.<\/p>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t<div\n\t\t\t\tclass=\"sow-features-feature sow-icon-container-position-top sow-features-feature-last-row\"\n\t\t\t\tstyle=\"display: flex; flex-direction: column; width: 33.333%;\"\n\t\t\t>\n\t\t\t\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"sow-icon-container sow-container-square\"\n\t\t\t\t\tstyle=\"color: #ffffff; \"\n\t\t\t\t\ttitle=\"Cyber Penetration Testing\">\n\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-far\" data-sow-icon=\"&#xf247;\"\n\t\tstyle=\"font-size: 64px; color: #4a525a\" \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"textwidget\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h5>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\tCyber Penetration Testing\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><span lang=\"EN-GB\">This testing measures the effectiveness of security training, internal procedures, and technical controls by attempting to gain physical access to your systems. Attempts will be made to gain access to restricted areas, obtain a physical network connection, or access unattended workstations or servers.<\/span><\/p>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t<div\n\t\t\t\tclass=\"sow-features-feature sow-icon-container-position-top sow-features-feature-last-row\"\n\t\t\t\tstyle=\"display: flex; flex-direction: column; width: 33.333%;\"\n\t\t\t>\n\t\t\t\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"sow-icon-container sow-container-square\"\n\t\t\t\t\tstyle=\"color: #ffffff; \"\n\t\t\t\t\ttitle=\"Internal Signal Leakage\">\n\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-far\" data-sow-icon=\"&#xf0c5;\"\n\t\tstyle=\"font-size: 64px; color: #4a525a\" \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"textwidget\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h5>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\tInternal Signal Leakage\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><span lang=\"EN-GB\">Testing includes conducting external scans of facilities to determine levels of electronic leakage pertaining to systems, printers, wireless accessories, as well as susceptibility for capture and exploitation.<\/span><\/p>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Odin Sweeps Odin Sweeps is a comprehensive physical and technical inspection of the working environment to detect and neutralize various forms of covert surveillance against our clients. The counter-surveillance approach Odin Sweeps uses detects cyber and physical \u2018eavesdropping\u2019 and highlights the importance of neutralizing any internal or external threats to your confidential and proprietary information. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.odinenterprises.net\/index.php\/wp-json\/wp\/v2\/pages\/2321"}],"collection":[{"href":"https:\/\/www.odinenterprises.net\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.odinenterprises.net\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.odinenterprises.net\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.odinenterprises.net\/index.php\/wp-json\/wp\/v2\/comments?post=2321"}],"version-history":[{"count":0,"href":"https:\/\/www.odinenterprises.net\/index.php\/wp-json\/wp\/v2\/pages\/2321\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.odinenterprises.net\/index.php\/wp-json\/wp\/v2\/media?parent=2321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}