{"id":3891,"date":"2025-06-24T10:53:17","date_gmt":"2025-06-24T07:53:17","guid":{"rendered":"https:\/\/cybersecurity.imhbusiness.com\/?post_type=logo&#038;p=3891"},"modified":"2025-06-24T10:57:51","modified_gmt":"2025-06-24T07:57:51","slug":"cyma","status":"publish","type":"logo","link":"https:\/\/cybersecurity.imhbusiness.com\/2025\/logo\/cyma\/","title":{"rendered":"Cyma"},"content":{"rendered":"<div class=\"elementor-element elementor-element-5c98fb0 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"5c98fb0\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n<div class=\"elementor-widget-container\">\n<h1 class=\"elementor-heading-title elementor-size-default\"><\/h1>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-065ec9c elementor-widget elementor-widget-theme-post-content\" data-id=\"065ec9c\" data-element_type=\"widget\" data-widget_type=\"theme-post-content.default\">\n<div class=\"elementor-widget-container\">\n<div class=\"wpem-organizer-inner-wrapper\">\n<div class=\"wpem-organizer-short-info\">\n<p class=\"xmsonormal\"><span class=\"xui-provider\">Cyma<\/span><span class=\"xui-provider\">, the cybersecurity pillar of Mada\u00ae Group, fortifies operational integrity with global cyber security solutions spanning Europe, the Middle East, and Africa.<\/span>\u00a0<span class=\"xui-provider\">Our innovative products and services enable clients to enhance cyber capabilities, optimize digital environments, and ensure sustained growth and resilience. Cyma\u2019s 24\/7 Managed Security Services and expert consultants ensure constant protection. We analyze data to identify, protect, detect, respond, and recover from threats, safeguarding your organization\u2019s assets and reputation.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"featured_media":3892,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false},"categories":[],"tags":[],"class_list":["post-3891","logo","type-logo","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/logo\/3891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/logo"}],"about":[{"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/types\/logo"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/media\/3892"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/media?parent=3891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/categories?post=3891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.imhbusiness.com\/2025\/wp-json\/wp\/v2\/tags?post=3891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}