{"id":1223,"date":"2026-03-25T09:39:25","date_gmt":"2026-03-25T00:39:25","guid":{"rendered":"https:\/\/cytur.mycafe24.com\/platform-build\/"},"modified":"2026-04-05T23:20:19","modified_gmt":"2026-04-05T14:20:19","slug":"platform-build","status":"publish","type":"page","link":"https:\/\/cytur.net\/en\/platform-build\/","title":{"rendered":"Platform Build"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1223\" class=\"elementor elementor-1223 elementor-20\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd84b16 e-con-full e-flex e-con e-parent\" data-id=\"dd84b16\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-93e897b elementor-widget elementor-widget-html\" data-id=\"93e897b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"background:#0A0E1A;\">\n<style>\n.bd-fade{opacity:0;transform:translateY(40px);transition:opacity 0.8s ease,transform 0.8s ease;}\n.bd-fade.visible{opacity:1;transform:translateY(0);}\n.bd-d1{transition-delay:0.15s;}\n.bd-d2{transition-delay:0.3s;}\n.bd-card{background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:16px;padding:36px 32px;transition:border-color 0.3s,transform 0.3s;}\n.bd-card:hover{border-color:rgba(26,86,219,0.3);transform:translateY(-4px);}\n.bd-feat{font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:2;margin:0;padding-left:18px;position:relative;}\n.bd-feat::before{content:'';position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#1A56DB;}\n.bd-tag{display:inline-block;font-family:'Pretendard Variable',sans-serif;font-size:12px;font-weight:700;padding:5px 14px;border-radius:4px;margin-bottom:8px;color:#FFFFFF;background:#1A56DB;letter-spacing:0.5px;}\n.bd-wf{opacity:0;transform:translateX(-30px);transition:opacity 0.6s ease,transform 0.6s ease;}\n.bd-wf.visible{opacity:1;transform:translateX(0);}\n.bd-label{display:inline-block;font-family:'Pretendard Variable',sans-serif;font-size:13px;font-weight:600;letter-spacing:2.5px;text-transform:uppercase;color:#FFFFFF;margin-bottom:16px;padding:6px 16px;border:1px solid rgba(26,86,219,0.6);border-radius:4px;background:rgba(26,86,219,0.3);}\n<\/style>\n\n<!-- HERO -->\n<div style=\"position:relative;min-height:600px;display:flex;align-items:center;overflow:hidden;\">\n<div style=\"position:absolute;inset:0;\">\n<img decoding=\"async\" src=\"http:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card2.png\" alt=\"\" style=\"width:100%;height:100%;object-fit:cover;display:block;\">\n<div style=\"position:absolute;inset:0;background:rgba(10,14,26,0.7);\"><\/div>\n<\/div>\n<div style=\"position:relative;z-index:1;max-width:1280px;margin:0 auto;padding:120px 40px;text-align:center;\">\n<div style=\"display:inline-block;font-family:'Pretendard Variable',sans-serif;font-size:13px;font-weight:600;letter-spacing:2.5px;text-transform:uppercase;color:#FFFFFF;margin-bottom:16px;padding:6px 16px;border:1px solid rgba(255,255,255,0.4);border-radius:4px;background:rgba(255,255,255,0.15);\">02 Build<\/div>\n<h1 style=\"font-family:'Pretendard Variable',sans-serif;font-size:48px;font-weight:700;color:#FFFFFF;margin:16px 0 16px;letter-spacing:-0.5px;line-height:1.15;text-shadow:0 2px 20px rgba(0,0,0,0.8);\">Eliminating Security Blind Spots<br>on the Construction Site<\/h1>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;color:#A0AEC0;margin:0 0 12px;line-height:1.6;text-shadow:0 2px 16px rgba(0,0,0,0.6);\">Frequent equipment changes during construction create rapid security blind spots.<\/p>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#718096;margin:0;line-height:1.75;text-shadow:0 2px 16px rgba(0,0,0,0.6);\">CYTUR identifies every onboard asset through automated scanning,<br>handling everything from FAT\/SAT security verification to class society documentation.<\/p>\n<\/div>\n<\/div>\n\n<!-- PROBLEM -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\">\n<div style=\"max-width:1280px;margin:0 auto;padding:100px 40px;\">\n<div class=\"bd-fade\" style=\"display:flex;gap:60px;align-items:center;\">\n<div style=\"flex:1;\">\n<div style=\"display:inline-block;font-family:'Pretendard Variable',sans-serif;font-size:13px;font-weight:600;letter-spacing:2.5px;text-transform:uppercase;color:#FFFFFF;margin-bottom:16px;padding:6px 16px;border:1px solid rgba(229,62,62,0.5);border-radius:4px;background:rgba(229,62,62,0.2);\">Problem<\/div>\n<h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 20px;line-height:1.25;\">Manual Inspections Can't Keep Up<br>with Construction Site Changes<\/h2>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#A0AEC0;line-height:1.75;margin:0 0 16px 0;\">As smart ships proliferate and onboard equipment multiplies,<br>manual inspections demand enormous time and cost while<br>inevitably creating security blind spots from data gaps.<\/p>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#A0AEC0;line-height:1.75;margin:0;\">IACS UR E26\/E27 regulations require practical verification of<br>onboard CBS security integrity before delivery, with evidence submitted to class societies.<br>Without automated verification, passing class audits is extremely difficult.<\/p>\n<\/div>\n<div class=\"bd-fade bd-d1\" style=\"flex-shrink:0;width:380px;background:rgba(229,62,62,0.06);border:1px solid rgba(229,62,62,0.2);border-radius:16px;padding:60px 40px;text-align:center;\">\n<div class=\"bd-counter\" data-target=\"95\" data-suffix=\"%\" style=\"font-family:'Pretendard Variable',sans-serif;font-size:80px;font-weight:800;color:#E53E3E;line-height:1;margin-bottom:20px;\">0%<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#718096;line-height:1.6;\">Unidentified asset rate<br>in manual inspections<br>\u2014 the root cause of blind spots<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<!-- SOLUTIONS -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\">\n<div style=\"max-width:1280px;margin:0 auto;padding:100px 40px;\">\n<div class=\"bd-fade\" style=\"text-align:center;margin-bottom:60px;\">\n<div class=\"bd-label\">Solution<\/div>\n<h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 0;line-height:1.15;\">Construction &amp; Sea Trial Solutions<\/h2>\n<\/div>\n<div style=\"display:grid;grid-template-columns:repeat(2,1fr);gap:24px;\">\n\n<div class=\"bd-fade bd-card\">\n<span class=\"bd-tag\">CYTUR-SC\u2122<\/span>\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 4px;\">Scanner<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;color:#5CB8C4;margin:0 0 16px;font-weight:500;\">Portable Automated Security Verification Scanner for Ships<\/p>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0 0 16px 0;\">Automatically discovers every asset connected to the ship's complex network<br>and performs deep analysis to uncover hidden vulnerabilities \u2014<br>including unidentified devices invisible to the naked eye.<\/p>\n<div class=\"bd-feat\">Auto-discovery of onboard CBS assets &amp; network change tracking<\/div>\n<div class=\"bd-feat\">In-depth security vulnerability &amp; configuration scanning<\/div>\n<div class=\"bd-feat\">IACS UR E26\/E27 field verification evidence generation<\/div>\n<div class=\"bd-feat\">Elimination of manual inspection errors &amp; reduced verification time<\/div>\n<\/div>\n\n<div class=\"bd-fade bd-d1 bd-card\">\n<span class=\"bd-tag\">CYTUR-SCS<\/span>\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 4px;\">Ship Equipment Cybersecurity Compliance Assessment System<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;color:#5CB8C4;margin:0 0 16px;font-weight:500;\">CBS Asset Management for the Build Phase<\/p>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0 0 16px 0;\">Tracks equipment configuration and network status changes<br>in real-time during construction, and systematizes<br>FAT\/SAT security verification procedures.<\/p>\n<div class=\"bd-feat\">Automated tracking of equipment change history during construction<\/div>\n<div class=\"bd-feat\">Automated FAT\/SAT security verification checklists<\/div>\n<div class=\"bd-feat\">Auto-generation of asset inventories &amp; class submission documents<\/div>\n<div class=\"bd-feat\">Vendor equipment security integrity verification framework<\/div>\n<\/div>\n\n<\/div>\n<\/div>\n<\/div>\n\n<!-- WORKFLOW -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\">\n<div style=\"max-width:1280px;margin:0 auto;padding:100px 40px;\">\n<div class=\"bd-fade\" style=\"text-align:center;margin-bottom:60px;\">\n<div class=\"bd-label\">Workflow<\/div>\n<h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 0;line-height:1.15;\">Build Phase Security Verification Process<\/h2>\n<\/div>\n<div style=\"display:flex;justify-content:center;\">\n<div style=\"display:inline-block;position:relative;\">\n<div style=\"position:absolute;left:15px;top:16px;bottom:16px;width:2px;background:rgba(26,86,219,0.3);\"><\/div>\n\n<div class=\"bd-wf\" style=\"display:flex;align-items:flex-start;gap:28px;padding-bottom:48px;position:relative;\">\n<div style=\"flex-shrink:0;width:32px;height:32px;border-radius:50%;background:#1A56DB;display:flex;align-items:center;justify-content:center;font-family:'Pretendard Variable',sans-serif;font-size:14px;font-weight:700;color:#FFFFFF;position:relative;z-index:1;\">01<\/div>\n<div style=\"padding-top:2px;\">\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 8px;line-height:1.3;\">Automated Asset Discovery<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0;\">SC automatically scans all CBS equipment connected to the onboard network,<br>detecting unidentified devices and unauthorized connections.<\/p>\n<\/div>\n<\/div>\n\n<div class=\"bd-wf\" style=\"display:flex;align-items:flex-start;gap:28px;padding-bottom:48px;position:relative;\">\n<div style=\"flex-shrink:0;width:32px;height:32px;border-radius:50%;background:#1A56DB;display:flex;align-items:center;justify-content:center;font-family:'Pretendard Variable',sans-serif;font-size:14px;font-weight:700;color:#FFFFFF;position:relative;z-index:1;\">02<\/div>\n<div style=\"padding-top:2px;\">\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 8px;line-height:1.3;\">Deep Vulnerability Analysis<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0;\">Inspects OS, firmware, open ports, and configuration status of discovered assets<br>to produce a comprehensive vulnerability report.<\/p>\n<\/div>\n<\/div>\n\n<div class=\"bd-wf\" style=\"display:flex;align-items:flex-start;gap:28px;padding-bottom:48px;position:relative;\">\n<div style=\"flex-shrink:0;width:32px;height:32px;border-radius:50%;background:#1A56DB;display:flex;align-items:center;justify-content:center;font-family:'Pretendard Variable',sans-serif;font-size:14px;font-weight:700;color:#FFFFFF;position:relative;z-index:1;\">03<\/div>\n<div style=\"padding-top:2px;\">\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 8px;line-height:1.3;\">FAT\/SAT Security Verification<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0;\">SCS automatically executes FAT\/SAT security verification checklists<br>and identifies discrepancies between design specifications and actual configuration.<\/p>\n<\/div>\n<\/div>\n\n<div class=\"bd-wf\" style=\"display:flex;align-items:flex-start;gap:28px;position:relative;\">\n<div style=\"flex-shrink:0;width:32px;height:32px;border-radius:50%;background:#1A56DB;display:flex;align-items:center;justify-content:center;font-family:'Pretendard Variable',sans-serif;font-size:14px;font-weight:700;color:#FFFFFF;position:relative;z-index:1;\">04<\/div>\n<div style=\"padding-top:2px;\">\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 8px;line-height:1.3;\">Automated Class Documentation<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0;\">Based on verification results, automatically generates IACS UR E26\/E27-compliant<br>class submission evidence and asset inventories.<\/p>\n<\/div>\n<\/div>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<!-- VALUE -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\">\n<div style=\"max-width:1280px;margin:0 auto;padding:100px 40px;text-align:center;\">\n<div class=\"bd-fade\">\n<div class=\"bd-label\">Value<\/div>\n<h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 48px;line-height:1.15;\">Expected Impact<\/h2>\n<\/div>\n<div style=\"display:grid;grid-template-columns:repeat(3,1fr);gap:24px;\">\n<div class=\"bd-fade\" style=\"background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:16px;padding:36px 28px;text-align:center;\">\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:800;color:#1A56DB;margin-bottom:12px;\">40%<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;font-weight:700;color:#FFFFFF;margin-bottom:8px;\">Faster Class Approval<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#718096;line-height:1.6;\">Automated verification and<br>documentation streamline audits<\/div>\n<\/div>\n<div class=\"bd-fade bd-d1\" style=\"background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:16px;padding:36px 28px;text-align:center;\">\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:800;color:#1A56DB;margin-bottom:12px;\">Zero<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;font-weight:700;color:#FFFFFF;margin-bottom:8px;\">Delivery Delay Risk<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#718096;line-height:1.6;\">Early flaw detection eliminates<br>delivery-stage uncertainties<\/div>\n<\/div>\n<div class=\"bd-fade bd-d2\" style=\"background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:16px;padding:36px 28px;text-align:center;\">\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:800;color:#1A56DB;margin-bottom:12px;\">100%<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;font-weight:700;color:#FFFFFF;margin-bottom:8px;\">Manual Error Elimination<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#718096;line-height:1.6;\">Automated scanning builds a<br>human-error-free verification system<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<!-- CTA -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\">\n<div style=\"max-width:1280px;margin:0 auto;padding:100px 40px;text-align:center;\" class=\"bd-fade\">\n<div class=\"bd-label\">Get Started<\/div>\n<h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 12px;line-height:1.15;\">Start Securing the Build Phase<\/h2>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#718096;margin:0 0 36px;line-height:1.6;\">See automated sea trial verification and streamlined class certification in action.<\/p>\n<div>\n<a href=\"https:\/\/cytur.net\/book-a-demo\/\" style=\"display:inline-block;padding:16px 36px;font-family:'Pretendard Variable',sans-serif;font-size:17px;font-weight:600;color:#FFFFFF;background:#1A56DB;border:none;border-radius:8px;text-decoration:none;letter-spacing:0.3px;margin-right:12px;\">Book a Demo \u2192<\/a>\n<a href=\"https:\/\/cytur.net\/contact-sales\/\" style=\"display:inline-block;padding:16px 36px;font-family:'Pretendard Variable',sans-serif;font-size:17px;font-weight:600;color:#FFFFFF;background:transparent;border:1px solid rgba(26,86,219,0.5);border-radius:8px;text-decoration:none;letter-spacing:0.3px;\">Contact Sales<\/a>\n<\/div>\n<\/div>\n<\/div>\n\n<\/div>\n\n<script>\n(function(){\nvar obs=new IntersectionObserver(function(entries){entries.forEach(function(e){if(e.isIntersecting)e.target.classList.add('visible');});},{threshold:0.1});\ndocument.querySelectorAll('.bd-fade').forEach(function(el){obs.observe(el);});\nvar wfItems=document.querySelectorAll('.bd-wf');\nvar wfObs=new IntersectionObserver(function(entries){entries.forEach(function(e){if(e.isIntersecting){var idx=Array.from(wfItems).indexOf(e.target);setTimeout(function(){e.target.classList.add('visible');},idx*200);}});},{threshold:0.1});\nwfItems.forEach(function(el){wfObs.observe(el);});\nvar cObs=new IntersectionObserver(function(entries){entries.forEach(function(e){if(e.isIntersecting&&!e.target.dataset.done){e.target.dataset.done='1';var t=parseInt(e.target.dataset.target);var suffix=e.target.dataset.suffix;var dur=1500,st=null;function step(ts){if(!st)st=ts;var p=Math.min((ts-st)\/dur,1);var eased=1-Math.pow(1-p,3);var cur=Math.round(eased*t);e.target.textContent=cur+suffix;if(p<1)requestAnimationFrame(step);}requestAnimationFrame(step);}});},{threshold:0.3});\ndocument.querySelectorAll('.bd-counter').forEach(function(el){cObs.observe(el);});\n})();\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>02 Build Eliminating Security Blind Spotson the Construction Site Frequent equipment changes during construction create rapid security blind spots. CYTUR identifies every onboard asset through automated scanning,handling everything from FAT\/SAT security verification to class society documentation. Problem Manual Inspections Can&#8217;t Keep Upwith Construction Site Changes As smart ships proliferate and onboard equipment multiplies,manual inspections demand [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1223","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Platform Build - Cyber Trust &amp; Resilience for Maritime<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cytur.net\/en\/platform-build\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Platform Build - Cyber Trust &amp; Resilience for Maritime\" \/>\n<meta property=\"og:description\" content=\"02 Build Eliminating Security Blind Spotson the Construction Site Frequent equipment changes during construction create rapid security blind spots. CYTUR identifies every onboard asset through automated scanning,handling everything from FAT\/SAT security verification to class society documentation. Problem Manual Inspections Can&#8217;t Keep Upwith Construction Site Changes As smart ships proliferate and onboard equipment multiplies,manual inspections demand [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cytur.net\/en\/platform-build\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Trust &amp; Resilience for Maritime\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-05T14:20:19+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card2.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/platform-build\\\/\",\"url\":\"https:\\\/\\\/cytur.net\\\/en\\\/platform-build\\\/\",\"name\":\"Platform Build - Cyber Trust &amp; Resilience for Maritime\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/platform-build\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/platform-build\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/batch_main-card2.png\",\"datePublished\":\"2026-03-25T00:39:25+00:00\",\"dateModified\":\"2026-04-05T14:20:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/platform-build\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cytur.net\\\/en\\\/platform-build\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/platform-build\\\/#primaryimage\",\"url\":\"http:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/batch_main-card2.png\",\"contentUrl\":\"http:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/batch_main-card2.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/platform-build\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\ud648\",\"item\":\"https:\\\/\\\/cytur.net\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Platform Build\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/cytur.net\\\/en\\\/\",\"name\":\"Cyber Trust &amp; Resilience for Maritime\",\"description\":\"End-to-End Cybersecurity for the Maritime Industry\",\"publisher\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cytur.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/#organization\",\"name\":\"Cyber Trust &amp; Resilience for Maritime\",\"url\":\"https:\\\/\\\/cytur.net\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/CYTUR_Logo_White_W600px_72ppi.png\",\"contentUrl\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/CYTUR_Logo_White_W600px_72ppi.png\",\"width\":601,\"height\":142,\"caption\":\"Cyber Trust &amp; Resilience for Maritime\"},\"image\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Platform Build - Cyber Trust &amp; Resilience for Maritime","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cytur.net\/en\/platform-build\/","og_locale":"en_US","og_type":"article","og_title":"Platform Build - Cyber Trust &amp; Resilience for Maritime","og_description":"02 Build Eliminating Security Blind Spotson the Construction Site Frequent equipment changes during construction create rapid security blind spots. CYTUR identifies every onboard asset through automated scanning,handling everything from FAT\/SAT security verification to class society documentation. Problem Manual Inspections Can&#8217;t Keep Upwith Construction Site Changes As smart ships proliferate and onboard equipment multiplies,manual inspections demand [&hellip;]","og_url":"https:\/\/cytur.net\/en\/platform-build\/","og_site_name":"Cyber Trust &amp; Resilience for Maritime","article_modified_time":"2026-04-05T14:20:19+00:00","og_image":[{"url":"http:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card2.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cytur.net\/en\/platform-build\/","url":"https:\/\/cytur.net\/en\/platform-build\/","name":"Platform Build - Cyber Trust &amp; Resilience for Maritime","isPartOf":{"@id":"https:\/\/cytur.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cytur.net\/en\/platform-build\/#primaryimage"},"image":{"@id":"https:\/\/cytur.net\/en\/platform-build\/#primaryimage"},"thumbnailUrl":"http:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card2.png","datePublished":"2026-03-25T00:39:25+00:00","dateModified":"2026-04-05T14:20:19+00:00","breadcrumb":{"@id":"https:\/\/cytur.net\/en\/platform-build\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cytur.net\/en\/platform-build\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cytur.net\/en\/platform-build\/#primaryimage","url":"http:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card2.png","contentUrl":"http:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/batch_main-card2.png"},{"@type":"BreadcrumbList","@id":"https:\/\/cytur.net\/en\/platform-build\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\ud648","item":"https:\/\/cytur.net\/en\/"},{"@type":"ListItem","position":2,"name":"Platform Build"}]},{"@type":"WebSite","@id":"https:\/\/cytur.net\/en\/#website","url":"https:\/\/cytur.net\/en\/","name":"Cyber Trust &amp; Resilience for Maritime","description":"End-to-End Cybersecurity for the Maritime Industry","publisher":{"@id":"https:\/\/cytur.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cytur.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cytur.net\/en\/#organization","name":"Cyber Trust &amp; Resilience for Maritime","url":"https:\/\/cytur.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cytur.net\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/CYTUR_Logo_White_W600px_72ppi.png","contentUrl":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/03\/CYTUR_Logo_White_W600px_72ppi.png","width":601,"height":142,"caption":"Cyber Trust &amp; Resilience for Maritime"},"image":{"@id":"https:\/\/cytur.net\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages\/1223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/comments?post=1223"}],"version-history":[{"count":6,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages\/1223\/revisions"}],"predecessor-version":[{"id":1229,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages\/1223\/revisions\/1229"}],"wp:attachment":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/media?parent=1223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}