{"total":4,"offset":0,"limit":4,"data":[{"icon":"","title":"Security Workflow Automation","description":"Eliminate manual tasks to focus on higher-value intelligence work.","link":"","linkLabel":"","linkIcon":""},{"icon":"","title":"Mitigate Ransomware","description":"Prevent ransomware threats across every stage of the attack lifecycle.","link":"","linkLabel":"","linkIcon":""},{"icon":"","title":"Mitigate Supply Chain Risk","description":"Understand and manage global vendor risk.","link":"","linkLabel":"","linkIcon":""},{"icon":"","title":"Protect Your Digital Assets","description":"Safeguard your brand, identities, and other business-critical assets.","link":"","linkLabel":"","linkIcon":""}],"columns":["icon","title","description","link","linkLabel","linkIcon"],":type":"sheet"}