{"id":1679,"date":"2024-10-30T15:59:26","date_gmt":"2024-10-30T15:59:26","guid":{"rendered":"https:\/\/shelinfosec.com\/?page_id=1679"},"modified":"2025-08-28T18:26:06","modified_gmt":"2025-08-28T18:26:06","slug":"agent-access","status":"publish","type":"page","link":"https:\/\/shelinfosec.com\/index.php\/agent-access\/","title":{"rendered":"Agent-access-"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1679\" class=\"elementor elementor-1679\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0be80d3 e-flex e-con-boxed e-con e-parent\" data-id=\"0be80d3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-466aaac e-con-full e-flex e-con e-child\" data-id=\"466aaac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf56236 elementor-widget elementor-widget-image\" data-id=\"cf56236\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/08\/silent_edge_hero_splash.png\" class=\"attachment-full size-full wp-image-3260\" alt=\"\" srcset=\"https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/08\/silent_edge_hero_splash.png 1536w, https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/08\/silent_edge_hero_splash-300x200.png 300w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6eb046e ha-has-bg-overlay elementor-widget elementor-widget-text-editor\" data-id=\"6eb046e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex-shrink-0 flex flex-col relative items-end\"><div class=\"pt-0\"><div class=\"gizmo-bot-avatar flex h-8 w-8 items-center justify-center overflow-hidden rounded-full\"><h1>\u00a0<\/h1><h1 style=\"text-align: center;\"><strong>Welcome to Your SILENT EDGE Setup Portal<\/strong><\/h1><p>Thank you for choosing SHEL INFOSEC and the SILENT EDGE Cyber Security suite to protect your digital environment. This page guides you through the onboarding process for your new subscription and details what to expect next.<\/p><h5>\u00a0<\/h5><h5><strong>What Happens Next? Overview of Your Security Setup Journey<\/strong><\/h5><p>Your account is being actively provisioned, and our expert team is preparing to onboard your device(s) to our Remote Monitoring &amp; Management (RMM), Endpoint Detection &amp; Response (EDR), and Managed VPN systems. We follow a <strong>phased rollout process<\/strong> to ensure smooth enrolment, minimal disruption, and full protection.<\/p><h5>\u00a0<\/h5><h5><strong>Step 1: Device Information Collection<\/strong><\/h5><h6>To get started, please provide details about each device you want protected:<\/h6><ul><li>Device Type (PC, laptop, server, phone, tablet)<\/li><li>Operating System:<br \/>\u2003- Windows \/ Mac \/ Linux (please specify version) for computers<br \/>\u2003- Apple iOS or Android (including version) for mobile devices<\/li><\/ul><p>This information aligns security policies with your environment and ensures the right agents and controls are deployed.<\/p><h5>\u00a0<\/h5><h5><strong>Step 2: Security Policy Setup<\/strong><\/h5><p>You will receive a brief questionnaire via email. This helps us tailor security configurations and compliance settings based on your specific needs and risk profile.<\/p><h5>\u00a0<\/h5><h5><strong>Step 3: Agent Installation &amp; Enrolment (RMM &amp; EDR Setup)<\/strong><\/h5><p>Within 24-48 hours of receiving your device info and completed questionnaire:<\/p><ul><li>An automated email from our enrollment system will deliver installation instructions for your Remote Monitoring &amp; Management (RMM) agent.<\/li><li>A technician will contact you to schedule a convenient 30-minute window for installation and configuration assistance.<\/li><\/ul><p><strong>Please ensure the device is available and connected to the internet during the scheduled session to facilitate a seamless setup.<\/strong><\/p><h5>\u00a0<\/h5><h5><strong>Step 4: Secure VPN Onboarding<\/strong><\/h5><p>If your subscription includes VPN protection (such as through Silent Edge SiteSentinel):<\/p><ul><li>Prior to setup, you\u2019ll receive instructions to download the <strong>Proton VPN app<\/strong> on your mobile device(s):<br \/>\u2003- <a href=\"https:\/\/apps.apple.com\/app\/proton-vpn-secure-internet\/id1437005085\">Apple App Store<\/a> (iOS)<br \/>\u2003- <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ch.protonvpn.android\">Google Play Store<\/a> (Android)<\/li><li><strong>Do not open or log into the app yet.<\/strong> The VPN setup uses a password-free <strong>QR code authentication<\/strong>, requiring precise timing.<\/li><\/ul><h6><strong>At your scheduled VPN onboarding session (5 minutes):<\/strong><\/h6><ul><li>Wait for the SHEL infosec technician to\u00a0<\/li><li>Open the Proton VPN app<\/li><li>Tap \u201cSign In\u201d<\/li><li>Select \u201cHelp\u201d (top-right corner), then \u201cSign in with QR code\u201d<\/li><li>Immediately screenshot the generated QR code and send it via WhatsApp to:<br \/><h6><strong>+27 77 416 7672 (SHEL INFOSEC)<\/strong><\/h6><\/li><\/ul><h6><em>Note:<\/em> The QR code expires within 2 minutes, so sending it promptly is critical. Our team scans the code in real-time to activate your secure VPN connection.<\/h6><h5><strong>What to Expect Based on Your Subscription Tier<\/strong><\/h5><table><thead><tr><td><p><strong>Tier<\/strong><\/p><\/td><td><p><strong>Main Features<\/strong><\/p><\/td><td><p><strong>Setup Highlights<\/strong><\/p><\/td><\/tr><\/thead><tbody><tr><td><p><strong>SILENT EDGE WebGuard<\/strong><\/p><\/td><td><p>Daily malware scans, one-click malware removal, real-time firewall, login protection, uptime monitoring, GDPR compliance (client data deletion on request)<\/p><\/td><td><p>Core RMM\/EDR agent installation, baseline website security controls, tailored security policy based on questionnaire. VPN optional\/available as add-on.<\/p><\/td><\/tr><tr><td><p><strong>SILENT EDGE SiteSentinel<\/strong><\/p><\/td><td><p>Enhanced malware detection, advanced firewall rules, vulnerability alerts, geo-blocking, priority support, PCI DSS &amp; HIPAA readiness<\/p><\/td><td><p>All SILENT EDGE WebGuard features plus advanced security components and compliance support. Includes full VPN onboarding with QR authentication and priority support coverage.<\/p><\/td><\/tr><tr><td><p><strong>SILENT EDGE Solo<\/strong><\/p><\/td><td><p>AI-powered EDR with basic device monitoring, private VPN, and real-time ransomware blocking.<\/p><\/td><td><p>RMM agent install, basic monitoring enabled. Simple setup and protection for individual devices.<\/p><\/td><\/tr><tr><td><p><strong>SILENT EDGE CoreGuard<\/strong><\/p><\/td><td><p>Behavioral AI-enhanced EDR, advanced device management automation, business VPN, compliance-ready with HIPAA\/GDPR templates.<\/p><\/td><td><p>Advanced automation with Core EDR agent install, monthly threat reviews, and compliance policy alignment.<\/p><\/td><\/tr><tr><td><p><strong>SILENT EDGE Sentinel<\/strong><\/p><\/td><td><p>Advanced threat hunting, forensic recovery, full policy enforcement, VPN with zero trust gateways, automated PCI\/NIST compliance reports.<\/p><\/td><td><p>Full policy enforcement with Advanced EDR agent, bi-weekly assessments, and prioritized incident triage support.<\/p><\/td><\/tr><tr><td><p><strong>SILENT EDGE ApexShield<\/strong><\/p><\/td><td><p>Enterprise-grade XDR with SOC &amp; SIEM integration, ultra-stealth Tor-over-VPN, forensic-level ransomware counterstrike, full audit &amp; certification.<\/p><\/td><td><p>Enterprise orchestration with XDR suite, 24\/7 SOC hotline, and dedicated threat response team support.<\/p><\/td><\/tr><\/tbody><\/table><h5>\u00a0<\/h5><h5><strong>Supported Devices for Monitoring<\/strong><\/h5><p>We actively monitor and protect:<\/p><ul><li>Windows desktops and laptops<\/li><li>Mac desktops and laptops<\/li><li>Linux servers and workstations<\/li><li>Apple iOS devices (iPhone, iPad)<\/li><li>Android mobile devices<\/li><\/ul><h6>For other devices or questions about compatibility, please contact us at <strong><a href=\"mailto:ciso@shelinfosec.com\">ciso@shelinfosec.com<\/a><\/strong>.<\/h6><h5>\u00a0<\/h5><h5><strong>Finalizing Policies &amp; Ongoing Maintenance<\/strong><\/h5><p>After installation, your CySA+ certified analysts will:<\/p><ul><li>Review and optimize security policies<\/li><li>Schedule regular maintenance and compliance updates<\/li><li>Provide ongoing monitoring and expert threat response<\/li><\/ul><p>You\u2019ll receive confirmations and any additional instructions via email to keep you informed every step of the way.<\/p><h5>\u00a0<\/h5><h5><strong>Need Assistance or Have Questions?<\/strong><\/h5><h6>We\u2019re here to help! For any setup questions or to discuss your device onboarding, contact us anytime at:<br \/><strong><a href=\"mailto:ciso@shelinfosec.com\">ciso@shelinfosec.com<\/a><\/strong><\/h6><h6><strong>Next Steps:<\/strong><\/h6><ol><li>Submit your device information as per the initial email or via reply.<\/li><li>Watch for your agent installation email and schedule your setup session.<\/li><li>Prepare for your scheduled VPN setup session as per instructions when applicable.<\/li><\/ol><h4>\u00a0<\/h4><h4>We look forward to securing your digital environment with SILENT EDGE.<\/h4><div><img decoding=\"async\" class=\"size-medium wp-image-3041 aligncenter\" src=\"https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/07\/SILENT-EDGE-LOGO-TEXT-REMAKE-CROPPED-bevel-300x87.png\" alt=\"\" width=\"300\" height=\"87\" srcset=\"https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/07\/SILENT-EDGE-LOGO-TEXT-REMAKE-CROPPED-bevel-300x87.png 300w, https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/07\/SILENT-EDGE-LOGO-TEXT-REMAKE-CROPPED-bevel-1024x296.png 1024w, https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/07\/SILENT-EDGE-LOGO-TEXT-REMAKE-CROPPED-bevel-768x222.png 768w, https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/07\/SILENT-EDGE-LOGO-TEXT-REMAKE-CROPPED-bevel-1536x445.png 1536w, https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/07\/SILENT-EDGE-LOGO-TEXT-REMAKE-CROPPED-bevel-600x174.png 600w, https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/07\/SILENT-EDGE-LOGO-TEXT-REMAKE-CROPPED-bevel.png 1641w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><div>\u00a0<\/div><p><img decoding=\"async\" class=\"size-medium wp-image-2479 aligncenter\" src=\"https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/06\/SHEL-INFOSEC-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/06\/SHEL-INFOSEC-300x300.jpg 300w, https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/06\/SHEL-INFOSEC-150x150.jpg 150w, https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/06\/SHEL-INFOSEC-600x600.jpg 600w, https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/06\/SHEL-INFOSEC-100x100.jpg 100w, https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/06\/SHEL-INFOSEC.jpg 640w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c92bb3 e-con-full e-grid e-con e-child\" data-id=\"4c92bb3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-ae5a3a0 e-grid e-con-full e-con e-child\" data-id=\"ae5a3a0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6643512 elementor-widget elementor-widget-heading\" data-id=\"6643512\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WINDOWS AGENT version <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dae802c elementor-align-center elementor-widget elementor-widget-button\" data-id=\"dae802c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-448e2a2 e-grid e-con-full e-con e-child\" data-id=\"448e2a2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-82c73e3 elementor-widget elementor-widget-heading\" data-id=\"82c73e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/shelinfosec.com\/wp-content\/uploads\/2024\/12\/OSX_AGENT_3.9.5-6.zip\">Download Mac AGENT version<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b4ddc7 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6b4ddc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-71696b1 e-grid e-con-full e-con e-child\" data-id=\"71696b1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5aa668c elementor-widget elementor-widget-heading\" data-id=\"5aa668c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Download Linux AGENT version<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74fc2c4 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"74fc2c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00a0 Welcome to Your SILENT EDGE Setup Portal Thank you for choosing SHEL INFOSEC and the SILENT EDGE Cyber Security suite to protect your digital environment. This page guides you through the onboarding process for your new subscription and details what to expect next. \u00a0 What Happens Next? Overview of Your Security Setup Journey Your [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1679","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Agent-access- | Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/shelinfosec.com\/index.php\/agent-access\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Agent-access- | Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec\" \/>\n<meta property=\"og:description\" content=\"\u00a0 Welcome to Your SILENT EDGE Setup Portal Thank you for choosing SHEL INFOSEC and the SILENT EDGE Cyber Security suite to protect your digital environment. This page guides you through the onboarding process for your new subscription and details what to expect next. \u00a0 What Happens Next? Overview of Your Security Setup Journey Your [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/shelinfosec.com\/index.php\/agent-access\/\" \/>\n<meta property=\"og:site_name\" content=\"Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-28T18:26:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/08\/silent_edge_hero_splash.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/index.php\\\/agent-access\\\/\",\"url\":\"https:\\\/\\\/shelinfosec.com\\\/index.php\\\/agent-access\\\/\",\"name\":\"Agent-access- | Managed Cybersecurity Services Cape Town | 24\\\/7 SOC | SHEL infosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/index.php\\\/agent-access\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/index.php\\\/agent-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shelinfosec.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/silent_edge_hero_splash.png\",\"datePublished\":\"2024-10-30T15:59:26+00:00\",\"dateModified\":\"2025-08-28T18:26:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/index.php\\\/agent-access\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/shelinfosec.com\\\/index.php\\\/agent-access\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/index.php\\\/agent-access\\\/#primaryimage\",\"url\":\"https:\\\/\\\/shelinfosec.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/silent_edge_hero_splash.png\",\"contentUrl\":\"https:\\\/\\\/shelinfosec.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/silent_edge_hero_splash.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/index.php\\\/agent-access\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/shelinfosec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Agent-access-\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/#website\",\"url\":\"https:\\\/\\\/shelinfosec.com\\\/\",\"name\":\"Managed Cybersecurity Services Cape Town | 24\\\/7 SOC | SHEL infosec\",\"description\":\"Premium managed cybersecurity services in Cape Town. 24\\\/7 SOC monitoring, dedicated security analysts, transparent pricing. SILENT EDGE managed security from $45\\\/month.\",\"publisher\":{\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/#organization\"},\"alternateName\":\"SILENT EDGE RMM\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/shelinfosec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/#organization\",\"name\":\"SHEL infosec\",\"url\":\"https:\\\/\\\/shelinfosec.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/shelinfosec.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/SHEL-INFOSEC-e1704278793512.jpg\",\"contentUrl\":\"https:\\\/\\\/shelinfosec.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/SHEL-INFOSEC-e1704278793512.jpg\",\"width\":200,\"height\":200,\"caption\":\"SHEL infosec\"},\"image\":{\"@id\":\"https:\\\/\\\/shelinfosec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Agent-access- | Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/shelinfosec.com\/index.php\/agent-access\/","og_locale":"en_US","og_type":"article","og_title":"Agent-access- | Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec","og_description":"\u00a0 Welcome to Your SILENT EDGE Setup Portal Thank you for choosing SHEL INFOSEC and the SILENT EDGE Cyber Security suite to protect your digital environment. This page guides you through the onboarding process for your new subscription and details what to expect next. \u00a0 What Happens Next? Overview of Your Security Setup Journey Your [&hellip;]","og_url":"https:\/\/shelinfosec.com\/index.php\/agent-access\/","og_site_name":"Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec","article_modified_time":"2025-08-28T18:26:06+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/08\/silent_edge_hero_splash.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/shelinfosec.com\/index.php\/agent-access\/","url":"https:\/\/shelinfosec.com\/index.php\/agent-access\/","name":"Agent-access- | Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec","isPartOf":{"@id":"https:\/\/shelinfosec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/shelinfosec.com\/index.php\/agent-access\/#primaryimage"},"image":{"@id":"https:\/\/shelinfosec.com\/index.php\/agent-access\/#primaryimage"},"thumbnailUrl":"https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/08\/silent_edge_hero_splash.png","datePublished":"2024-10-30T15:59:26+00:00","dateModified":"2025-08-28T18:26:06+00:00","breadcrumb":{"@id":"https:\/\/shelinfosec.com\/index.php\/agent-access\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/shelinfosec.com\/index.php\/agent-access\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shelinfosec.com\/index.php\/agent-access\/#primaryimage","url":"https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/08\/silent_edge_hero_splash.png","contentUrl":"https:\/\/shelinfosec.com\/wp-content\/uploads\/2025\/08\/silent_edge_hero_splash.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/shelinfosec.com\/index.php\/agent-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/shelinfosec.com\/"},{"@type":"ListItem","position":2,"name":"Agent-access-"}]},{"@type":"WebSite","@id":"https:\/\/shelinfosec.com\/#website","url":"https:\/\/shelinfosec.com\/","name":"Managed Cybersecurity Services Cape Town | 24\/7 SOC | SHEL infosec","description":"Premium managed cybersecurity services in Cape Town. 24\/7 SOC monitoring, dedicated security analysts, transparent pricing. SILENT EDGE managed security from $45\/month.","publisher":{"@id":"https:\/\/shelinfosec.com\/#organization"},"alternateName":"SILENT EDGE RMM","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/shelinfosec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/shelinfosec.com\/#organization","name":"SHEL infosec","url":"https:\/\/shelinfosec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shelinfosec.com\/#\/schema\/logo\/image\/","url":"https:\/\/shelinfosec.com\/wp-content\/uploads\/2024\/01\/SHEL-INFOSEC-e1704278793512.jpg","contentUrl":"https:\/\/shelinfosec.com\/wp-content\/uploads\/2024\/01\/SHEL-INFOSEC-e1704278793512.jpg","width":200,"height":200,"caption":"SHEL infosec"},"image":{"@id":"https:\/\/shelinfosec.com\/#\/schema\/logo\/image\/"}}]}},"_hostinger_reach_plugin_has_subscription_block":false,"_hostinger_reach_plugin_is_elementor":false,"_links":{"self":[{"href":"https:\/\/shelinfosec.com\/index.php\/wp-json\/wp\/v2\/pages\/1679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shelinfosec.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/shelinfosec.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/shelinfosec.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shelinfosec.com\/index.php\/wp-json\/wp\/v2\/comments?post=1679"}],"version-history":[{"count":86,"href":"https:\/\/shelinfosec.com\/index.php\/wp-json\/wp\/v2\/pages\/1679\/revisions"}],"predecessor-version":[{"id":3378,"href":"https:\/\/shelinfosec.com\/index.php\/wp-json\/wp\/v2\/pages\/1679\/revisions\/3378"}],"wp:attachment":[{"href":"https:\/\/shelinfosec.com\/index.php\/wp-json\/wp\/v2\/media?parent=1679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}