{"version":"1.0","provider_name":"UC. Now","provider_url":"https:\/\/www.u-c-now.com\/en\/","author_name":"root","author_url":"https:\/\/www.u-c-now.com\/en\/author\/root\/","title":"Security By Design - UC. Now","type":"rich","width":600,"height":338,"html":"<blockquote
class=\"wp-embedded-content\"><a
href=\"https:\/\/www.u-c-now.com\/en\/technology\/security-by-design\/\">Security By Design<\/a><\/blockquote>\n<script
type='text\/javascript'>\n<![CDATA[\/\/><!]]>\n<\/script><iframe
sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.u-c-now.com\/en\/technology\/security-by-design\/embed\/\" width=\"600\" height=\"338\" title=\"&#8220;Security By Design&#8221; &#8212; UC. Now\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe>","description":"Our Technologies Security By Design Private Cloud Or On-Premise Hosting\u200b On-Premise \u201cDedicated\u201d Cloud Hosting Workflow Driven Automation Proven Workflow Driven Automation\u200b Customizable Security By Design On-Premise \u201cDedicated\u201d Cloud Hosting Workflow Driven Automation Customizable Security By Design \u201cCybersecurity\u201d built into all our platforms\u2019 design to decrease the number of risks\/vulnerabilities that might render them susceptible to [&hellip;]","thumbnail_url":"https:\/\/www.u-c-now.com\/wp-content\/uploads\/2024\/08\/Security-By-Design.gif"}