{"id":2963,"date":"2024-05-14T10:23:40","date_gmt":"2024-05-14T09:23:40","guid":{"rendered":"https:\/\/cwsisecurity.com\/?p=2963"},"modified":"2026-04-08T10:52:01","modified_gmt":"2026-04-08T09:52:01","slug":"what-is-the-difference-between-a-siem-and-a-soc","status":"publish","type":"post","link":"https:\/\/cwsisecurity.com\/nl\/what-is-the-difference-between-a-siem-and-a-soc\/","title":{"rendered":"What is the Difference Between a SIEM and a SOC?"},"content":{"rendered":"\n<p>Within the ever-evolving terrain of <a href=\"https:\/\/cwsisecurity.com\/cyber-security-assessment\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity<\/a>, protecting digital assets demands a strategic fusion of information and resources. Managing this stream necessitates advanced tools, such as a <a href=\"https:\/\/cwsisecurity.com\/services\/managed-security-service\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Security Operations Centre (CSOC)<\/a> and Security Information Event Management (<a href=\"https:\/\/cwsisecurity.com\/defend-against-threats-with-siem-plus-xdr-workshop\/\" target=\"_blank\" rel=\"noreferrer noopener\">SIEM<\/a>) platform.<\/p>\n\n\n\n<p>Together, they underpin a company\u2019s cybersecurity infrastructure, enabling swift data analysis and prompt response to <a href=\"https:\/\/cwsisecurity.com\/threat-protection-engagement\/\" target=\"_blank\" rel=\"noreferrer noopener\">emerging threats<\/a>. In this blog, we delve into the critical distinctions between a CSOC and a SIEM, shedding light on the essential roles these components play within the intricate landscape of modern cybersecurity defences.<\/p>\n\n\n\n<p>In the dynamic landscape of cybersecurity, effective defence mechanisms hinge on the seamless flow of information. Security teams meticulously gather and scrutinise data from various sources to identify and counter malicious activities. However, the sheer volume of information necessitates sophisticated tools like a <a href=\"https:\/\/cwsisecurity.com\/a-guide-to-a-cyber-security-operations-centre\/\" target=\"_blank\" rel=\"noreferrer noopener\">(CSOC)<\/a> and Security Information and Event Management (SIEM) platform.<\/p>\n\n\n\n<p>Together, these components form the backbone of a company\u2019s cybersecurity infrastructure, ensuring efficient data collection, analysis, and response to emerging threats, safeguarding their digital assets with agility and precision.&nbsp;<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The Key Differences Between a SIEM and a SOC?<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>There are two distinctions between a SIEM and SOC:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>A SIEM focuses on collecting data from various sources to identify potential threats, whereas a SOC uses this data to monitor and respond to threats.<\/li>\n\n\n\n<li>A SIEM typically comes in the form of a tool or a set of tools, whereas a SOC is a team.<\/li>\n<\/ol>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-backbone-of-effective-threat-protection-nbsp-nbsp\">The Backbone of Effective Threat Protection&nbsp;&nbsp;<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>A Security Information and Event (SIEM) Management system is a comprehensive security solution equipped with multiple tools designed to furnish essential information for the effective detection and management of <a href=\"https:\/\/cwsisecurity.com\/five-key-threat-actor-groups\/\" target=\"_blank\" rel=\"noreferrer noopener\">security threats<\/a> within a business environment.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div style=\"height:11px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Through the gathering and analysis of event and log data from various sources, a SIEM performs continuous monitoring of IT <a href=\"https:\/\/cwsisecurity.com\/building-trust-in-byod-environments-the-freedom-to-work-from-any-device\/\" target=\"_blank\" rel=\"noreferrer noopener\">environments<\/a> to identify potential threats. Upon detection, the system promptly alerts security teams, empowering them to investigate and respond to threats efficiently with actionable insights.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The capabilities of a SIEM are closely linked to those of a CSOC, serving as a cornerstone for effective <a href=\"https:\/\/cwsisecurity.com\/what-is-microsofts-extended-detection-response-xdr\/\" target=\"_blank\" rel=\"noreferrer noopener\">threat detection and response<\/a>. Operating 24\/7, the CSOC is staffed with highly skilled professionals who tirelessly monitor network traffic and alerts, ready to intervene promptly in the event of potential cyber incidents. By harnessing sophisticated tools and functionalities, CSOC engineers work tirelessly to contain and analyse threats, remediate issues, and continuously enhance cyber defences to mitigate risks effectively.&nbsp;&nbsp;<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Synergising CSOC and SIEM for Enhanced Security&nbsp;<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>A <a href=\"https:\/\/cwsisecurity.com\/the-glossary-of-a-cyber-security-operations-centre\/\" target=\"_blank\" rel=\"noreferrer noopener\">CSOC<\/a> serves as a vital complement to a SIEM platform, furnishing the necessary resources for its management and enhancing the organisation\u2019s overall cybersecurity posture. While human experts within a CSOC can operate without a SIEM, doing so necessitates finding alternative methods to organise log data and flag key security events amidst the sea of information.<\/p>\n\n\n\n<p>While this approach to security may suffice for smaller businesses, for larger organisations it can prove cumbersome and hinder compliance reporting and other requirements.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The increased functionality of SIEM software addresses these challenges by assisting security professionals in prioritising alerts and highlighting specific devices and activities. Consisting of a dedicated team of skilled cybersecurity professionals, the CSOC leverages SIEM tools to monitor a business\u2019 IT infrastructure continuously. Proactively seeking out potential threats, the CSOC team works tirelessly to identify and analyse suspicious activities, enabling swift response to cyberattacks when they occur.<\/p>\n\n\n\n<p>By integrating CSOC capabilities, organisations fortify their defences against both internal and external threats. The collaborative efforts between the SIEM platform and the CSOC significantly reduce response times, allowing for agile containment and remediation of security incidents. This proactive approach not only mitigates the financial, operational, and reputational damage associated with cyberattacks, but also enhances the organisation\u2019s resilience against future threats.<\/p>\n\n\n\n<p>In essence, the synergy between a CSOC and a SIEM platform creates a robust cybersecurity framework that ensures the protection of critical assets and data from evolving cyber threats.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">How We Can Help&nbsp;<\/mark><\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Still unsure about the difference between SIEM and SOC? At CWSI, we offer specialised assistance for organisations requiring SOC and SIEM solutions. Our team provides expertise in proactive monitoring, threat detection, and incident response. With our managed CSOC services, we offer continuous security oversight, while our SIEM solutions streamline data analysis for better decision-making and compliance adherence.<\/p>\n\n\n\n<p>Keen to learn more about how we can strengthen your overall security posture? <a href=\"https:\/\/cwsisecurity.com\/contact-us\/\" target=\"_blank\" rel=\"noreferrer noopener\">Get in touch<\/a> today by filling out the form below.&nbsp;<\/p>\n\n\n\n<iframe loading=\"lazy\" src=\"https:\/\/cwsiinsights.cwsi.ie\/l\/1024581\/2024-04-09\/bgrcn\" width=\"100%\" height=\"600\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\" style=\"border: 0\"><\/iframe>\n","protected":false},"excerpt":{"rendered":"<p>Within the ever-evolving terrain of cybersecurity, protecting digital assets demands a strategic fusion of information and resources. Managing this stream necessitates advanced tools, such as a Cyber Security Operations Centre (CSOC) and Security Information Event Management (SIEM) platform. Together, they underpin a company\u2019s cybersecurity infrastructure, enabling swift data analysis and prompt response to emerging threats. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":494,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[93,4,1],"tags":[],"class_list":["post-2963","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","category-our-voice","category-uncategorised"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Difference Between SIEM and SOC | CWSI<\/title>\n<meta name=\"description\" content=\"Explore the various differnces between a CSOC and a SIEM, and learn the roles these components play within modern cybersecurity defences.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwsisecurity.com\/nl\/what-is-the-difference-between-a-siem-and-a-soc\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is the Difference Between a SIEM and a SOC?\" \/>\n<meta property=\"og:description\" content=\"Security made human. Compliance made simple. Protect your business without slowing it down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwsisecurity.com\/nl\/what-is-the-difference-between-a-siem-and-a-soc\/\" \/>\n<meta property=\"og:site_name\" content=\"CWSI\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-14T09:23:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-08T09:52:01+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"fluroltd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-the-difference-between-a-siem-and-a-soc\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-the-difference-between-a-siem-and-a-soc\\\/\"},\"headline\":\"What is the Difference Between a SIEM and a SOC?\",\"datePublished\":\"2024-05-14T09:23:40+00:00\",\"dateModified\":\"2026-04-08T09:52:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-the-difference-between-a-siem-and-a-soc\\\/\"},\"wordCount\":749,\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-the-difference-between-a-siem-and-a-soc\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Insights\",\"Our Voice\",\"Uncategorised\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-the-difference-between-a-siem-and-a-soc\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-the-difference-between-a-siem-and-a-soc\\\/\",\"name\":\"Difference Between SIEM and SOC | CWSI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-the-difference-between-a-siem-and-a-soc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-the-difference-between-a-siem-and-a-soc\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2024-05-14T09:23:40+00:00\",\"dateModified\":\"2026-04-08T09:52:01+00:00\",\"description\":\"Explore the various differnces between a CSOC and a SIEM, and learn the roles these components play within modern cybersecurity defences.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-the-difference-between-a-siem-and-a-soc\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-the-difference-between-a-siem-and-a-soc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-the-difference-between-a-siem-and-a-soc\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-the-difference-between-a-siem-and-a-soc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is the Difference Between a SIEM and a SOC?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"name\":\"CWSI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\",\"name\":\"CWSI\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"width\":125,\"height\":30,\"caption\":\"CWSI\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cwsi\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@cwsimobileandcloudsecurity361\"],\"description\":\"Security made human. Compliance made simple. Protect your business without slowing it down.\",\"email\":\"info.uk@cwsisecurity.com\",\"telephone\":\"+44 1189 344 300\",\"legalName\":\"CWSI Security\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/person\\\/870becf0b1e6869361f9510f90f8ce2a\",\"name\":\"fluroltd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"caption\":\"fluroltd\"},\"sameAs\":[\"https:\\\/\\\/cwsisecurity.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Difference Between SIEM and SOC | CWSI","description":"Explore the various differnces between a CSOC and a SIEM, and learn the roles these components play within modern cybersecurity defences.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwsisecurity.com\/nl\/what-is-the-difference-between-a-siem-and-a-soc\/","og_locale":"nl_NL","og_type":"article","og_title":"What is the Difference Between a SIEM and a SOC?","og_description":"Security made human. Compliance made simple. Protect your business without slowing it down.","og_url":"https:\/\/cwsisecurity.com\/nl\/what-is-the-difference-between-a-siem-and-a-soc\/","og_site_name":"CWSI","article_published_time":"2024-05-14T09:23:40+00:00","article_modified_time":"2026-04-08T09:52:01+00:00","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"fluroltd","Geschatte leestijd":"4 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwsisecurity.com\/nl\/what-is-the-difference-between-a-siem-and-a-soc\/#article","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-the-difference-between-a-siem-and-a-soc\/"},"headline":"What is the Difference Between a SIEM and a SOC?","datePublished":"2024-05-14T09:23:40+00:00","dateModified":"2026-04-08T09:52:01+00:00","mainEntityOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-the-difference-between-a-siem-and-a-soc\/"},"wordCount":749,"publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-the-difference-between-a-siem-and-a-soc\/#primaryimage"},"thumbnailUrl":"","articleSection":["Insights","Our Voice","Uncategorised"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/cwsisecurity.com\/nl\/what-is-the-difference-between-a-siem-and-a-soc\/","url":"https:\/\/cwsisecurity.com\/nl\/what-is-the-difference-between-a-siem-and-a-soc\/","name":"Difference Between SIEM and SOC | CWSI","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-the-difference-between-a-siem-and-a-soc\/#primaryimage"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-the-difference-between-a-siem-and-a-soc\/#primaryimage"},"thumbnailUrl":"","datePublished":"2024-05-14T09:23:40+00:00","dateModified":"2026-04-08T09:52:01+00:00","description":"Explore the various differnces between a CSOC and a SIEM, and learn the roles these components play within modern cybersecurity defences.","breadcrumb":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-the-difference-between-a-siem-and-a-soc\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwsisecurity.com\/nl\/what-is-the-difference-between-a-siem-and-a-soc\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/what-is-the-difference-between-a-siem-and-a-soc\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/cwsisecurity.com\/nl\/what-is-the-difference-between-a-siem-and-a-soc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwsisecurity.com\/nl\/"},{"@type":"ListItem","position":2,"name":"What is the Difference Between a SIEM and a SOC?"}]},{"@type":"WebSite","@id":"https:\/\/cwsisecurity.com\/nl\/#website","url":"https:\/\/cwsisecurity.com\/nl\/","name":"CWSI","description":"","publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwsisecurity.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/cwsisecurity.com\/nl\/#organization","name":"CWSI","url":"https:\/\/cwsisecurity.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","width":125,"height":30,"caption":"CWSI"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cwsi\/","https:\/\/www.youtube.com\/@cwsimobileandcloudsecurity361"],"description":"Security made human. Compliance made simple. Protect your business without slowing it down.","email":"info.uk@cwsisecurity.com","telephone":"+44 1189 344 300","legalName":"CWSI Security","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/person\/870becf0b1e6869361f9510f90f8ce2a","name":"fluroltd","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","caption":"fluroltd"},"sameAs":["https:\/\/cwsisecurity.com"]}]}},"_links":{"self":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/comments?post=2963"}],"version-history":[{"count":1,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2963\/revisions"}],"predecessor-version":[{"id":8356,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2963\/revisions\/8356"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media?parent=2963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/categories?post=2963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/tags?post=2963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}