<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Managed Cybersecurity Services Cape Town | 24/7 SOC | SHEL infosec</provider_name><provider_url>https://shelinfosec.com</provider_url><author_name>CISO</author_name><author_url>https://shelinfosec.com/index.php/author/ciso/</author_url><title>Agent-access- | Managed Cybersecurity Services Cape Town | 24/7 SOC | SHEL infosec</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="R4O5FMuUYY"&gt;&lt;a href="https://shelinfosec.com/index.php/agent-access/"&gt;Agent-access-&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://shelinfosec.com/index.php/agent-access/embed/#?secret=R4O5FMuUYY" width="600" height="338" title="&#x201C;Agent-access-&#x201D; &#x2014; Managed Cybersecurity Services Cape Town | 24/7 SOC | SHEL infosec" data-secret="R4O5FMuUYY" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://shelinfosec.com/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><description>&#xA0; Welcome to Your SILENT EDGE Setup Portal Thank you for choosing SHEL INFOSEC and the SILENT EDGE Cyber Security suite to protect your digital environment. This page guides you through the onboarding process for your new subscription and details what to expect next. &#xA0; What Happens Next? Overview of Your Security Setup Journey Your [&hellip;]</description><thumbnail_url>https://shelinfosec.com/wp-content/uploads/2025/08/silent_edge_hero_splash.png</thumbnail_url><thumbnail_width>1536</thumbnail_width><thumbnail_height>1024</thumbnail_height></oembed>
