{"id":393,"date":"2021-10-22T14:15:51","date_gmt":"2021-10-22T14:15:51","guid":{"rendered":"http:\/\/security-its.unaux.com\/?page_id=393"},"modified":"2021-10-28T20:08:17","modified_gmt":"2021-10-28T20:08:17","slug":"light-current","status":"publish","type":"page","link":"https:\/\/security-its.com\/index.php\/light-current\/","title":{"rendered":"Light Current"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"393\" class=\"elementor elementor-393\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-75c7ff5f elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"75c7ff5f\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-336d7b20\" data-id=\"336d7b20\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-169a953 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"169a953\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 20-08-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"640\" height=\"512\" src=\"https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/light-current2.png\" class=\"attachment-large size-large wp-image-437\" alt=\"\" srcset=\"https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/light-current2.png 640w, https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/light-current2-300x240.png 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-12ccbc4f elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"12ccbc4f\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;bounceInLeft&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-13d6b642\" data-id=\"13d6b642\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-117b230f elementor-widget elementor-widget-image\" data-id=\"117b230f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"400\" height=\"300\" src=\"https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/11.jpg\" class=\"attachment-large size-large wp-image-426\" alt=\"\" srcset=\"https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/11.jpg 400w, https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/11-300x225.jpg 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-13246cc2\" data-id=\"13246cc2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-674b7050 elementor-widget elementor-widget-heading\" data-id=\"674b7050\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 20-08-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Access Control<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32839618 elementor-widget elementor-widget-text-editor\" data-id=\"32839618\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 20-08-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Access control is a fundamental component of data security that dictates who\u2019s allowed to access and use company information and resources.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f229a20\" data-id=\"f229a20\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-32d24407 elementor-widget elementor-widget-image\" data-id=\"32d24407\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"400\" height=\"300\" src=\"https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/12.jpg\" class=\"attachment-large size-large wp-image-427\" alt=\"\" srcset=\"https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/12.jpg 400w, https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/12-300x225.jpg 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b304113 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"b304113\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;bounceInRight&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4781c104\" data-id=\"4781c104\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2aa2799d elementor-widget elementor-widget-heading\" data-id=\"2aa2799d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Fire Alarm<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6283923c elementor-widget elementor-widget-text-editor\" data-id=\"6283923c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>A fire alarm is a standalone device or a complete network of devices, installed in a building or an area, which gives audible and\/or visible warning of an outbreak of fire in that building or area.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-254bbbed\" data-id=\"254bbbed\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3039316b elementor-widget elementor-widget-image\" data-id=\"3039316b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"400\" height=\"300\" src=\"https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/10.jpg\" class=\"attachment-large size-large wp-image-425\" alt=\"\" srcset=\"https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/10.jpg 400w, https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/10-300x225.jpg 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-18e82fff\" data-id=\"18e82fff\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-707c932a elementor-widget elementor-widget-heading\" data-id=\"707c932a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CCTV &amp; IP Cam<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c0ba3e3 elementor-widget elementor-widget-text-editor\" data-id=\"5c0ba3e3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>An Internet Protocol camera, or IP camera, is a type of digital video camera that receives control data and sends image data via an IP network.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a66165c elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a66165c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-428c530\" data-id=\"428c530\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0c1221f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0c1221f\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 20-08-2023 *\/\n.elementor-widget-divider{--divider-border-style:none;--divider-border-width:1px;--divider-color:#0c0d0e;--divider-icon-size:20px;--divider-element-spacing:10px;--divider-pattern-height:24px;--divider-pattern-size:20px;--divider-pattern-url:none;--divider-pattern-repeat:repeat-x}.elementor-widget-divider .elementor-divider{display:flex}.elementor-widget-divider .elementor-divider__text{font-size:15px;line-height:1;max-width:95%}.elementor-widget-divider .elementor-divider__element{margin:0 var(--divider-element-spacing);flex-shrink:0}.elementor-widget-divider .elementor-icon{font-size:var(--divider-icon-size)}.elementor-widget-divider .elementor-divider-separator{display:flex;margin:0;direction:ltr}.elementor-widget-divider--view-line_icon .elementor-divider-separator,.elementor-widget-divider--view-line_text .elementor-divider-separator{align-items:center}.elementor-widget-divider--view-line_icon .elementor-divider-separator:after,.elementor-widget-divider--view-line_icon .elementor-divider-separator:before,.elementor-widget-divider--view-line_text .elementor-divider-separator:after,.elementor-widget-divider--view-line_text .elementor-divider-separator:before{display:block;content:\"\";border-bottom:0;flex-grow:1;border-top:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--element-align-left .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-left .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-left .elementor-divider__element{margin-left:0}.elementor-widget-divider--element-align-right .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-right .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-right .elementor-divider__element{margin-right:0}.elementor-widget-divider:not(.elementor-widget-divider--view-line_text):not(.elementor-widget-divider--view-line_icon) .elementor-divider-separator{border-top:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--separator-type-pattern{--divider-border-style:none}.elementor-widget-divider--separator-type-pattern.elementor-widget-divider--view-line .elementor-divider-separator,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:after,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:before,.elementor-widget-divider--separator-type-pattern:not([class*=elementor-widget-divider--view]) .elementor-divider-separator{width:100%;min-height:var(--divider-pattern-height);-webkit-mask-size:var(--divider-pattern-size) 100%;mask-size:var(--divider-pattern-size) 100%;-webkit-mask-repeat:var(--divider-pattern-repeat);mask-repeat:var(--divider-pattern-repeat);background-color:var(--divider-color);-webkit-mask-image:var(--divider-pattern-url);mask-image:var(--divider-pattern-url)}.elementor-widget-divider--no-spacing{--divider-pattern-size:auto}.elementor-widget-divider--bg-round{--divider-pattern-repeat:round}.rtl .elementor-widget-divider .elementor-divider__text{direction:rtl}.e-con-inner>.elementor-widget-divider,.e-con>.elementor-widget-divider{width:var(--container-widget-width,100%);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a657448 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"a657448\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;bounceInLeft&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-2018518\" data-id=\"2018518\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d1cb20a elementor-widget elementor-widget-image\" data-id=\"d1cb20a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"400\" height=\"300\" src=\"https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/13.jpg\" class=\"attachment-large size-large wp-image-428\" alt=\"\" srcset=\"https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/13.jpg 400w, https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/13-300x225.jpg 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-092751f\" data-id=\"092751f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4521533 elementor-widget elementor-widget-heading\" data-id=\"4521533\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Intrusion system<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b7feea elementor-widget elementor-widget-text-editor\" data-id=\"1b7feea\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-46c8c43\" data-id=\"46c8c43\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f432555 elementor-widget elementor-widget-image\" data-id=\"f432555\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"400\" height=\"300\" src=\"https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/15.jpg\" class=\"attachment-large size-large wp-image-430\" alt=\"\" srcset=\"https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/15.jpg 400w, https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/15-300x225.jpg 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7aa70d9 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"7aa70d9\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;bounceInRight&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-34b94f7\" data-id=\"34b94f7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-858366e elementor-widget elementor-widget-heading\" data-id=\"858366e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sound System<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99d5c92 elementor-widget elementor-widget-text-editor\" data-id=\"99d5c92\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>A sound system is a set of equipment for playing recorded music, or for making a band&#8217;s music able to be heard by everyone at a concert.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-61eccef\" data-id=\"61eccef\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e0e754 elementor-widget elementor-widget-image\" data-id=\"5e0e754\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"400\" height=\"300\" src=\"https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/14.jpg\" class=\"attachment-large size-large wp-image-429\" alt=\"\" srcset=\"https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/14.jpg 400w, https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/14-300x225.jpg 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-a8209f2\" data-id=\"a8209f2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8aeee0f elementor-widget elementor-widget-heading\" data-id=\"8aeee0f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Solar Energy<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-792c5cb elementor-widget elementor-widget-text-editor\" data-id=\"792c5cb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Solar power is energy from the sun that is converted into thermal or electrical energy.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Access Control Access control is a fundamental component of data security that dictates who\u2019s allowed to access and use company information and resources. Fire Alarm A fire alarm is a standalone device or a complete network of devices, installed in a building or an area, which gives audible and\/or visible warning of an outbreak of fire in that building or area. CCTV &amp; IP Cam An Internet Protocol camera, or IP camera, is a type of digital video camera that receives control data and sends image data via an IP network. Intrusion system An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Sound System A sound system is a set of equipment for playing recorded music, or for making a band&#8217;s music able to be heard by everyone at a concert. Solar Energy Solar power is energy from&hellip;<\/p>\n<p> <a class=\"more-link\" href=\"https:\/\/security-its.com\/index.php\/light-current\/\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":431,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Light Current - Tech masters<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/security-its.com\/index.php\/light-current\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Light Current - Tech masters\" \/>\n<meta property=\"og:description\" content=\"Access Control Access control is a fundamental component of data security that dictates who\u2019s allowed to access and use company information and resources. Fire Alarm A fire alarm is a standalone device or a complete network of devices, installed in a building or an area, which gives audible and\/or visible warning of an outbreak of fire in that building or area. CCTV &amp; IP Cam An Internet Protocol camera, or IP camera, is a type of digital video camera that receives control data and sends image data via an IP network. Intrusion system An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Sound System A sound system is a set of equipment for playing recorded music, or for making a band&#8217;s music able to be heard by everyone at a concert. Solar Energy Solar power is energy from&hellip;  Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/security-its.com\/index.php\/light-current\/\" \/>\n<meta property=\"og:site_name\" content=\"Tech masters\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-28T20:08:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/102943056_114174670326216_1675393304959584604_n.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"952\" \/>\n\t<meta property=\"og:image:height\" content=\"342\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/security-its.com\/index.php\/light-current\/\",\"url\":\"https:\/\/security-its.com\/index.php\/light-current\/\",\"name\":\"Light Current - Tech masters\",\"isPartOf\":{\"@id\":\"https:\/\/security-its.com\/#website\"},\"datePublished\":\"2021-10-22T14:15:51+00:00\",\"dateModified\":\"2021-10-28T20:08:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/security-its.com\/index.php\/light-current\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/security-its.com\/index.php\/light-current\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/security-its.com\/index.php\/light-current\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/security-its.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Light Current\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/security-its.com\/#website\",\"url\":\"https:\/\/security-its.com\/\",\"name\":\"Tech masters\",\"description\":\"Just another WordPress site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/security-its.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Light Current - Tech masters","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/security-its.com\/index.php\/light-current\/","og_locale":"en_US","og_type":"article","og_title":"Light Current - Tech masters","og_description":"Access Control Access control is a fundamental component of data security that dictates who\u2019s allowed to access and use company information and resources. Fire Alarm A fire alarm is a standalone device or a complete network of devices, installed in a building or an area, which gives audible and\/or visible warning of an outbreak of fire in that building or area. CCTV &amp; IP Cam An Internet Protocol camera, or IP camera, is a type of digital video camera that receives control data and sends image data via an IP network. Intrusion system An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Sound System A sound system is a set of equipment for playing recorded music, or for making a band&#8217;s music able to be heard by everyone at a concert. Solar Energy Solar power is energy from&hellip;  Read more","og_url":"https:\/\/security-its.com\/index.php\/light-current\/","og_site_name":"Tech masters","article_modified_time":"2021-10-28T20:08:17+00:00","og_image":[{"width":952,"height":342,"url":"https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/102943056_114174670326216_1675393304959584604_n.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/security-its.com\/index.php\/light-current\/","url":"https:\/\/security-its.com\/index.php\/light-current\/","name":"Light Current - Tech masters","isPartOf":{"@id":"https:\/\/security-its.com\/#website"},"datePublished":"2021-10-22T14:15:51+00:00","dateModified":"2021-10-28T20:08:17+00:00","breadcrumb":{"@id":"https:\/\/security-its.com\/index.php\/light-current\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/security-its.com\/index.php\/light-current\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/security-its.com\/index.php\/light-current\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/security-its.com\/"},{"@type":"ListItem","position":2,"name":"Light Current"}]},{"@type":"WebSite","@id":"https:\/\/security-its.com\/#website","url":"https:\/\/security-its.com\/","name":"Tech masters","description":"Just another WordPress site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/security-its.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/security-its.com\/index.php\/wp-json\/wp\/v2\/pages\/393"}],"collection":[{"href":"https:\/\/security-its.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/security-its.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/security-its.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/security-its.com\/index.php\/wp-json\/wp\/v2\/comments?post=393"}],"version-history":[{"count":5,"href":"https:\/\/security-its.com\/index.php\/wp-json\/wp\/v2\/pages\/393\/revisions"}],"predecessor-version":[{"id":490,"href":"https:\/\/security-its.com\/index.php\/wp-json\/wp\/v2\/pages\/393\/revisions\/490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/security-its.com\/index.php\/wp-json\/wp\/v2\/media\/431"}],"wp:attachment":[{"href":"https:\/\/security-its.com\/index.php\/wp-json\/wp\/v2\/media?parent=393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}