{"id":1063,"date":"2020-06-03T09:16:44","date_gmt":"2020-06-03T06:16:44","guid":{"rendered":"https:\/\/www.teyseer-security.com\/our-histroy\/"},"modified":"2022-08-15T06:51:24","modified_gmt":"2022-08-15T03:51:24","slug":"our-histroy","status":"publish","type":"page","link":"https:\/\/www.teyseer-security.com\/ar\/our-histroy\/","title":{"rendered":"Our Histroy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1063\" class=\"elementor elementor-1063\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9a1b2b dsvy-col-stretched-none dsvy-bg-color-over-image elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9a1b2b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a4a1bb5 dsvy-bg-color-over-image\" data-id=\"a4a1bb5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-966e893 elementor-widget elementor-widget-dsvy_timeline_element\" data-id=\"966e893\" data-element_type=\"widget\" data-widget_type=\"dsvy_timeline_element.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"dsvy-timeline\">\r\n\r\n\t\t\t<div class=\"dsvy-ele-header-area\">\r\n\t\t\t\t\t<div class=\"dsvy-heading-subheading left-align \"><\/div>\t\t\t<\/div>\r\n\r\n\t\t\t\r\n\t\t\t\t\t<div class=\"dsvy-timeline-inner\">\r\n\t\t\t\t\t\t<div class=\" col-sm-12 dsvy-ourhistory dsvy-ourhistory-type2 \">\r\n\t\t\t\t\t\t\t<div class=\"row dsvy-ourhistory-row\">\r\n\r\n\t\t\t\t\t\t\t\t<div class=\"col-md-2 dsvy-ourhistory-left\">\r\n\t\t\t\t\t\t\t\t\t<span class=\"label\">2010<\/span>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"col-md-10 col-sm-10 col-xs-10 dsvy-ourhistory-right\">\r\n\t\t\t\t\t\t\t\t\t<span class=\"dsvy-timeline-image\"><img decoding=\"async\" src=\"http:\/\/digicop.designervily.com\/datasite\/wp-content\/uploads\/sites\/6\/2020\/06\/history-01.jpg\" alt=\"We start security company\" \/><\/span>\r\n\t\t\t\t\t\t\t\t\t<span class=\"label\">2010<\/span>\r\n\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t\t<h4>We start security company<\/h4>\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"simple-text\">\r\n\t\t\t\t\t\t\t\t\t\t\t<p>There are many variation of passages of security technologies available. The majority have suffered alteration in some form by  injected a security systems. This systems security is away some which don\u2019t look even slightly believable. <\/p>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/digicop.designervily.com\/datasite\/wp-content\/uploads\/sites\/6\/2020\/06\/history-01.jpg\" alt=\"We start security company\" \/>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div> \r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\t<div class=\"dsvy-timeline-inner\">\r\n\t\t\t\t\t\t<div class=\" col-sm-12 dsvy-ourhistory dsvy-ourhistory-type2 \">\r\n\t\t\t\t\t\t\t<div class=\"row dsvy-ourhistory-row\">\r\n\r\n\t\t\t\t\t\t\t\t<div class=\"col-md-2 dsvy-ourhistory-left\">\r\n\t\t\t\t\t\t\t\t\t<span class=\"label\">2012<\/span>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"col-md-10 col-sm-10 col-xs-10 dsvy-ourhistory-right\">\r\n\t\t\t\t\t\t\t\t\t<span class=\"dsvy-timeline-image\"><img decoding=\"async\" src=\"http:\/\/digicop.designervily.com\/datasite\/wp-content\/uploads\/sites\/6\/2020\/06\/history-01.jpg\" alt=\"We have experienced expert\" \/><\/span>\r\n\t\t\t\t\t\t\t\t\t<span class=\"label\">2012<\/span>\r\n\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t\t<h4>We have experienced expert<\/h4>\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"simple-text\">\r\n\t\t\t\t\t\t\t\t\t\t\t<p>There are many variation of passages of security technologies available. The majority have suffered alteration in some form by  injected a security systems. This systems security is away some which don\u2019t look even slightly believable. <\/p>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/digicop.designervily.com\/datasite\/wp-content\/uploads\/sites\/6\/2020\/06\/history-01.jpg\" alt=\"We have experienced expert\" \/>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div> \r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\t<div class=\"dsvy-timeline-inner\">\r\n\t\t\t\t\t\t<div class=\" col-sm-12 dsvy-ourhistory dsvy-ourhistory-type2 \">\r\n\t\t\t\t\t\t\t<div class=\"row dsvy-ourhistory-row\">\r\n\r\n\t\t\t\t\t\t\t\t<div class=\"col-md-2 dsvy-ourhistory-left\">\r\n\t\t\t\t\t\t\t\t\t<span class=\"label\">2014<\/span>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"col-md-10 col-sm-10 col-xs-10 dsvy-ourhistory-right\">\r\n\t\t\t\t\t\t\t\t\t<span class=\"dsvy-timeline-image\"><img decoding=\"async\" src=\"http:\/\/digicop.designervily.com\/datasite\/wp-content\/uploads\/sites\/6\/2020\/06\/history-01.jpg\" alt=\"We win the national awards\" \/><\/span>\r\n\t\t\t\t\t\t\t\t\t<span class=\"label\">2014<\/span>\r\n\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t\t<h4>We win the national awards<\/h4>\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"simple-text\">\r\n\t\t\t\t\t\t\t\t\t\t\t<p>There are many variation of passages of security technologies available. The majority have suffered alteration in some form by  injected a security systems. This systems security is away some which don\u2019t look even slightly believable. <\/p>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/digicop.designervily.com\/datasite\/wp-content\/uploads\/sites\/6\/2020\/06\/history-01.jpg\" alt=\"We win the national awards\" \/>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div> \r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\t<div class=\"dsvy-timeline-inner\">\r\n\t\t\t\t\t\t<div class=\" col-sm-12 dsvy-ourhistory dsvy-ourhistory-type2 \">\r\n\t\t\t\t\t\t\t<div class=\"row dsvy-ourhistory-row\">\r\n\r\n\t\t\t\t\t\t\t\t<div class=\"col-md-2 dsvy-ourhistory-left\">\r\n\t\t\t\t\t\t\t\t\t<span class=\"label\">2015<\/span>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"col-md-10 col-sm-10 col-xs-10 dsvy-ourhistory-right\">\r\n\t\t\t\t\t\t\t\t\t<span class=\"dsvy-timeline-image\"><img decoding=\"async\" src=\"http:\/\/digicop.designervily.com\/datasite\/wp-content\/uploads\/sites\/6\/2020\/06\/history-01.jpg\" alt=\"We get high level success\" \/><\/span>\r\n\t\t\t\t\t\t\t\t\t<span class=\"label\">2015<\/span>\r\n\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t\t<h4>We get high level success<\/h4>\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"simple-text\">\r\n\t\t\t\t\t\t\t\t\t\t\t<p>There are many variation of passages of security technologies available. The majority have suffered alteration in some form by  injected a security systems. This systems security is away some which don\u2019t look even slightly believable. <\/p>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/digicop.designervily.com\/datasite\/wp-content\/uploads\/sites\/6\/2020\/06\/history-01.jpg\" alt=\"We get high level success\" \/>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div> \r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t<\/div>\r\n\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>2010 2010 We start security company There are many variation of passages of security technologies available. The majority have suffered alteration in some form by injected a security systems. This systems security is away some which don\u2019t look even slightly believable. 2012 2012 We have experienced expert There are many variation of passages of security technologies available. The majority have suffered alteration in some form by injected a security systems.[&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1063","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.13 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Our Histroy - Teyseer Security Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.teyseer-security.com\/ar\/our-histroy\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Our Histroy - Teyseer Security Services\" \/>\n<meta property=\"og:description\" content=\"2010 2010 We start security company There are many variation of passages of security technologies available. The majority have suffered alteration in some form by injected a security systems. This systems security is away some which don\u2019t look even slightly believable. 2012 2012 We have experienced expert There are many variation of passages of security technologies available. The majority have suffered alteration in some form by injected a security systems.[&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.teyseer-security.com\/ar\/our-histroy\/\" \/>\n<meta property=\"og:site_name\" content=\"Teyseer Security Services\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-15T03:51:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.teyseer-security.com\/wp-content\/uploads\/2020\/06\/history-01.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 \u062f\u0642\u064a\u0642\u0629\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.teyseer-security.com\/ar\/our-histroy\/\",\"url\":\"https:\/\/www.teyseer-security.com\/ar\/our-histroy\/\",\"name\":\"Our Histroy - Teyseer Security Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.teyseer-security.com\/#website\"},\"datePublished\":\"2020-06-03T06:16:44+00:00\",\"dateModified\":\"2022-08-15T03:51:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.teyseer-security.com\/ar\/our-histroy\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.teyseer-security.com\/ar\/our-histroy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.teyseer-security.com\/ar\/our-histroy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.teyseer-security.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our Histroy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.teyseer-security.com\/#website\",\"url\":\"https:\/\/www.teyseer-security.com\/\",\"name\":\"Teyseer Security Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.teyseer-security.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.teyseer-security.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.teyseer-security.com\/#organization\",\"name\":\"Teyseer Security Services\",\"url\":\"https:\/\/www.teyseer-security.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/www.teyseer-security.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.teyseer-security.com\/wp-content\/uploads\/2022\/08\/logo2.png\",\"contentUrl\":\"https:\/\/www.teyseer-security.com\/wp-content\/uploads\/2022\/08\/logo2.png\",\"width\":200,\"height\":64,\"caption\":\"Teyseer Security Services\"},\"image\":{\"@id\":\"https:\/\/www.teyseer-security.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/teyseer-security-services\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Our Histroy - Teyseer Security Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.teyseer-security.com\/ar\/our-histroy\/","og_locale":"ar_AR","og_type":"article","og_title":"Our Histroy - Teyseer Security Services","og_description":"2010 2010 We start security company There are many variation of passages of security technologies available. The majority have suffered alteration in some form by injected a security systems. This systems security is away some which don\u2019t look even slightly believable. 2012 2012 We have experienced expert There are many variation of passages of security technologies available. The majority have suffered alteration in some form by injected a security systems.[&hellip;]","og_url":"https:\/\/www.teyseer-security.com\/ar\/our-histroy\/","og_site_name":"Teyseer Security Services","article_modified_time":"2022-08-15T03:51:24+00:00","og_image":[{"url":"https:\/\/www.teyseer-security.com\/wp-content\/uploads\/2020\/06\/history-01.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"1 \u062f\u0642\u064a\u0642\u0629"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.teyseer-security.com\/ar\/our-histroy\/","url":"https:\/\/www.teyseer-security.com\/ar\/our-histroy\/","name":"Our Histroy - Teyseer Security Services","isPartOf":{"@id":"https:\/\/www.teyseer-security.com\/#website"},"datePublished":"2020-06-03T06:16:44+00:00","dateModified":"2022-08-15T03:51:24+00:00","breadcrumb":{"@id":"https:\/\/www.teyseer-security.com\/ar\/our-histroy\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.teyseer-security.com\/ar\/our-histroy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.teyseer-security.com\/ar\/our-histroy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.teyseer-security.com\/"},{"@type":"ListItem","position":2,"name":"Our Histroy"}]},{"@type":"WebSite","@id":"https:\/\/www.teyseer-security.com\/#website","url":"https:\/\/www.teyseer-security.com\/","name":"Teyseer Security Services","description":"","publisher":{"@id":"https:\/\/www.teyseer-security.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.teyseer-security.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/www.teyseer-security.com\/#organization","name":"Teyseer Security Services","url":"https:\/\/www.teyseer-security.com\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/www.teyseer-security.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.teyseer-security.com\/wp-content\/uploads\/2022\/08\/logo2.png","contentUrl":"https:\/\/www.teyseer-security.com\/wp-content\/uploads\/2022\/08\/logo2.png","width":200,"height":64,"caption":"Teyseer Security Services"},"image":{"@id":"https:\/\/www.teyseer-security.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/teyseer-security-services\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.teyseer-security.com\/ar\/wp-json\/wp\/v2\/pages\/1063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.teyseer-security.com\/ar\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.teyseer-security.com\/ar\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.teyseer-security.com\/ar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.teyseer-security.com\/ar\/wp-json\/wp\/v2\/comments?post=1063"}],"version-history":[{"count":1,"href":"https:\/\/www.teyseer-security.com\/ar\/wp-json\/wp\/v2\/pages\/1063\/revisions"}],"predecessor-version":[{"id":1064,"href":"https:\/\/www.teyseer-security.com\/ar\/wp-json\/wp\/v2\/pages\/1063\/revisions\/1064"}],"wp:attachment":[{"href":"https:\/\/www.teyseer-security.com\/ar\/wp-json\/wp\/v2\/media?parent=1063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}