{"id":1696,"date":"2020-01-17T03:53:33","date_gmt":"2020-01-17T03:53:33","guid":{"rendered":"http:\/\/wpdemo.archiwp.com\/engitech\/?page_id=1696"},"modified":"2023-04-05T18:25:34","modified_gmt":"2023-04-05T18:25:34","slug":"elements","status":"publish","type":"page","link":"https:\/\/engitechnology.com\/?page_id=1696","title":{"rendered":"Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1696\" class=\"elementor elementor-1696\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-50eca5a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"50eca5a\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a18e915 ot-flex-column-vertical\" data-id=\"a18e915\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b853d5 elementor-widget elementor-widget-uael-infobox\" data-id=\"5b853d5\" data-element_type=\"widget\" data-widget_type=\"uael-infobox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n<div class=\"uael-module-content uael-infobox uael-imgicon-style-normal  uael-infobox-left  infobox-has-icon uael-infobox-icon-above-title  uael-infobox-link-type-none\">\n\t<div class=\"uael-infobox-left-right-wrap\">\n\t\t\t\t\t\t<div class=\"uael-infobox-content\">\n\t\t\t\t\t\t\t<div class=\"uael-module-content uael-imgicon-wrap \">\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uael-infobox-title-wrap'><h4 class=\"uael-infobox-title elementor-inline-editing\" data-elementor-setting-key=\"infobox_title\" data-elementor-inline-editing-toolbar=\"basic\" >Defensive Cybersecurity<\/h4><\/div>\t\t\t\t\t\t\t\t\t<div class=\"uael-infobox-text-wrap\">\n\t\t\t\t<div class=\"uael-infobox-text elementor-inline-editing\" data-elementor-setting-key=\"infobox_description\" data-elementor-inline-editing-toolbar=\"advanced\">\n\t\t\t\t\t<p><br>Our Defensive Cyber Security includes measures and techniques we implement to protect your organization\u2019s systems, networks, and data.<br><\/p>\n<p>We aim to detect &amp; prevent data breaches and minimize any damage caused by them. This will ensure confidentiality, integrity, and availability of your critical assets, as well as limiting costly related financial losses.<br><br>By handling your cybersecurity from all aspects, EngiTech will simply help you focus on your core business, support your digital transformation and drive business innovation.<\/p>\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b9486e elementor-widget elementor-widget-spacer\" data-id=\"7b9486e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.11.2 - 22-02-2023 *\/\n.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-con{--container-widget-width:100%}.e-con-inner>.elementor-widget-spacer,.e-con>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));--align-self:var(--container-widget-align-self,initial);--flex-shrink:0}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container,.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer,.e-con>.elementor-widget-spacer>.elementor-widget-container,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d755d92 elementor-section-height-full elementor-section-content-top is-fixed elementor-section-full_width ot-traditional elementor-section-height-default\" data-id=\"d755d92\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-8c3a4f7 ot-flex-column-vertical\" data-id=\"8c3a4f7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4702b81 elementor-widget elementor-widget-iiconbox2\" data-id=\"4702b81\" data-element_type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-code\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Cyber Security Operations Center<\/h5>\r\n\t            <p><br>CSOC is a unit that houses a dedicated team responsible for overseeing the security of your company\u2019s IT infrastructure and assets. \n<br><br>\nEquipped with a range of technologies and human expertise, CSOC analyzes security data and executes security measures to help detect, prevent, and respond to cyber threats on time.\n<br><br><br><br><\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6f17ae0 ot-flex-column-vertical\" data-id=\"6f17ae0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-59c5571 elementor-widget elementor-widget-iiconbox2\" data-id=\"59c5571\" data-element_type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"fas fa-cloud\"><\/i>\t\t\t    \t\t        \t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Cloud Security\t<\/h5>\r\n\t            <p><br>\nAs organizations move their on-prem infrastructure to the Cloud, new challenges and risks are introduced. <br><br>\n\nOur cloud security services can help you identify critical gaps, enhance your security defenses, and gain more visibility over your data security.\n\n\n<br>\n<br>\n<br><br>\n<br>\n<br><br>\n<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-1cb4a48 ot-flex-column-vertical\" data-id=\"1cb4a48\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-87122c0 elementor-widget elementor-widget-iiconbox2\" data-id=\"87122c0\" data-element_type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"fas fa-tasks\"><\/i>\t\t\t    \t\t        \t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Incident Response<\/h5>\r\n\t            <p><br>Our Incident Response service ensures round-the-clock detection of issues, deploys security experts to help you rapidly restore business-as-usual and prevent similar disruptions in future\n<br><br>\nOur Forensic Service provides immediate access to a pool of cyber analysts, who will uncover critical intelligence on attack\u2019s origin, purpose, and impact; \nEnabling your organization to make wise decisions before, during or after a breach.\n<br>\n<br><\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-734bcc9 elementor-invisible elementor-widget elementor-widget-uael-infobox\" data-id=\"734bcc9\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"uael-infobox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n<div class=\"uael-module-content uael-infobox uael-imgicon-style-normal  uael-infobox-left  infobox-has-icon uael-infobox-icon-above-title  uael-infobox-link-type-none\">\n\t<div class=\"uael-infobox-left-right-wrap\">\n\t\t\t\t\t\t<div class=\"uael-infobox-content\">\n\t\t\t\t\t\t\t<div class=\"uael-module-content uael-imgicon-wrap \">\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uael-infobox-title-wrap'><h4 class=\"uael-infobox-title elementor-inline-editing\" data-elementor-setting-key=\"infobox_title\" data-elementor-inline-editing-toolbar=\"basic\" >Offensive Cybersecurity<\/h4><\/div>\t\t\t\t\t\t\t\t\t<div class=\"uael-infobox-text-wrap\">\n\t\t\t\t<div class=\"uael-infobox-text elementor-inline-editing\" data-elementor-setting-key=\"infobox_description\" data-elementor-inline-editing-toolbar=\"advanced\">\n\t\t\t\t\t<p>Our Offensive Cyber Security refers to proactive and aggressive tactics used to protect your organization\u2019s systems, by identifying and exploiting its vulnerabilities.<\/p>\n<p>In this type of security, we aim to simulate real-world cyber-attacks to test and evaluate your organization's security posture, identify weaknesses, and help improve the overall defense.<\/p>\n<p>EngiTech\u2019s offensive cyber security techniques include penetration testing, social engineering, and red teaming exercises, which are performed with the explicit consent of your organization. Our use of offensive cyber security methods is regulated by various laws and ethical guidelines.<\/p><p><br><\/p><p><br><\/p>\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-80d1369 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"80d1369\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0545927 ot-flex-column-vertical\" data-id=\"0545927\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2509162 elementor-widget elementor-widget-iserv_box_2\" data-id=\"2509162\" data-element_type=\"widget\" data-widget_type=\"iserv_box_2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"serv-box-2 s2\">\r\n\t\t\t<span class=\"big-number\">01<\/span>\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-tablet\"><\/span>\t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Threat Modeling<\/h5>\r\n\t\t\t\t<div>Our Threat modeling service is a structured approach to identify and prioritize potential security threats to your organization\u2019s systems.<br><br>\nIt is a key aspect of risk management in cyber security, involves analyzing and mapping out the system to understand the potential attack vectors and vulnerabilities<br><br>\nWe perform Threat Modeling through various methodologies and Tools, can be done as a standalone service or as part of a larger security assessment.\n<\/div>\r\n\t\t\t\t<a href=\"#\" class=\"btn-details\"><\/a>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5eae81c ot-flex-column-vertical\" data-id=\"5eae81c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a425d3 elementor-widget elementor-widget-iserv_box_2\" data-id=\"5a425d3\" data-element_type=\"widget\" data-widget_type=\"iserv_box_2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"serv-box-2 s2\">\r\n\t\t\t<span class=\"big-number\">02<\/span>\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-ui\"><\/span>\t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Penetration Testing\t<\/h5>\r\n\t\t\t\t<div>Pen-Testing is a simulated cyber attack carried out by our security experts to evaluate the security of your systems.<br><br>\nUsing a variety of tools, techniques and methodologies, our Pen-testers attempt and simulate real-world attacks, which leads to identifying  technical vulnerabilities, weaknesses, and security gaps in your systems. <br><br>\nThe detailed results shed a light on your security posture, allowing you to make informed decisions on how to improve your defenses.\n<\/div>\r\n\t\t\t\t<a href=\"#\" class=\"btn-details\"><\/a>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1d611da elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"1d611da\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-44c282a ot-flex-column-vertical\" data-id=\"44c282a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f25f93c elementor-widget elementor-widget-iserv_box_2\" data-id=\"f25f93c\" data-element_type=\"widget\" data-widget_type=\"iserv_box_2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"serv-box-2 s2\">\r\n\t\t\t<span class=\"big-number\">03<\/span>\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-report\"><\/span>\t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Red Teaming<\/h5>\r\n\t\t\t\t<div>Our Red Teaming security assessment is a methodology that involves simulating an attack by a determined and well-resourced adversary<br><br>\nRed teaming takes a more holistic approach that considers the entire attack surface, including people, processes, and technology.\n\n\n<br><br><br><br><br><\/div>\r\n\t\t\t\t<a href=\"#\" class=\"btn-details\"><\/a>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7baec79 ot-flex-column-vertical\" data-id=\"7baec79\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9748c23 elementor-widget elementor-widget-iserv_box_2\" data-id=\"9748c23\" data-element_type=\"widget\" data-widget_type=\"iserv_box_2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"serv-box-2 s2\">\r\n\t\t\t<span class=\"big-number\">04<\/span>\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-shield\"><\/span>\t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Threat Intelligence<\/h5>\r\n\t\t\t\t<div>Our Threat Intelligence Services refer to the process of gathering, analyzing, and utilizing information about potential threats.<br><br>\nThis includes data from various sources such as network activity logs, open-source intelligence, and threat intelligence feeds, which are then analyzed to identify patterns and potential threats.<br><br>\nThreat Intelligence aims to provide your organization with deeper understanding of the threat landscape, to proactively prioritize defenses and respond effectively to incidents.\n<\/div>\r\n\t\t\t\t<a href=\"#\" class=\"btn-details\"><\/a>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b8733db ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b8733db\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1491f70 ot-flex-column-vertical\" data-id=\"1491f70\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-76b2c0c elementor-invisible elementor-widget elementor-widget-uael-infobox\" data-id=\"76b2c0c\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"uael-infobox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n<div class=\"uael-module-content uael-infobox uael-imgicon-style-normal  uael-infobox-left  infobox-has-icon uael-infobox-icon-above-title  uael-infobox-link-type-none\">\n\t<div class=\"uael-infobox-left-right-wrap\">\n\t\t\t\t\t\t<div class=\"uael-infobox-content\">\n\t\t\t\t\t\t\t<div class=\"uael-module-content uael-imgicon-wrap \">\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uael-infobox-title-wrap'><h4 class=\"uael-infobox-title elementor-inline-editing\" data-elementor-setting-key=\"infobox_title\" data-elementor-inline-editing-toolbar=\"basic\" >Governance and Compliance<\/h4><\/div>\t\t\t\t\t\t\t\t\t<div class=\"uael-infobox-text-wrap\">\n\t\t\t\t<div class=\"uael-infobox-text elementor-inline-editing\" data-elementor-setting-key=\"infobox_description\" data-elementor-inline-editing-toolbar=\"advanced\">\n\t\t\t\t\tGovernance and compliance in cybersecurity refer to the policies, procedures, and standards that we can help your organization to set and follow in order to ensure the protection of your information systems and data.<br>\n<br>\nIt\u2019s all about the management and direction of your cybersecurity program, by setting the right procedures for the use of technology, and allocation of resources and responsibilities.<br><br>\n\nCompliance refers to adhering to laws, regulations, standards, and best practices for information security.<br><br>\n\nExamples include the General Data Protection Regulation (GDPR) for data privacy in the European Union\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0aceafc elementor-section-content-top ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0aceafc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8688d53 ot-flex-column-vertical\" data-id=\"8688d53\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2831674 elementor-widget elementor-widget-isupport_box\" data-id=\"2831674\" data-element_type=\"widget\" data-widget_type=\"isupport_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"support-box\">\r\n\t\t\t<div class=\"inner-box\">\r\n\t\t\t\t<div class=\"overlay flex-middle\">\r\n\t\t\t\t\t<span class=\"number-box\">01<\/span>\r\n\t\t\t\t\t<div class=\"inner\">\r\n\t\t\t\t\t\t<p>Text comming soon <br>\n<br>\n<br>\n<br><\/p>\r\n\t\t\t\t\t\t<a href=\"#\" class=\"btn-details\"><\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"content-box\">\r\n\t\t\t\t\t<span class=\"number-box\">01<\/span>\r\n\t\t\t\t\t<h3>Health Check<\/h3>\r\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/engitechnology.com\/wp-content\/uploads\/2020\/02\/image-box1.jpg\" alt=\"Health Check\">\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d975d68 elementor-widget elementor-widget-isupport_box\" data-id=\"d975d68\" data-element_type=\"widget\" data-widget_type=\"isupport_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"support-box\">\r\n\t\t\t<div class=\"inner-box\">\r\n\t\t\t\t<div class=\"overlay flex-middle\">\r\n\t\t\t\t\t<span class=\"number-box\">03<\/span>\r\n\t\t\t\t\t<div class=\"inner\">\r\n\t\t\t\t\t\t<p>Our compliance experts will help you build a successful ISO 27001 framework tailored to your organization\u2019s needs, empowering you to achieve accreditation and add an extra layer of trust for your clients\n<\/p>\r\n\t\t\t\t\t\t<a href=\"#\" class=\"btn-details\"><\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"content-box\">\r\n\t\t\t\t\t<span class=\"number-box\">03<\/span>\r\n\t\t\t\t\t<h3>ISO Certification<\/h3>\r\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/engitechnology.com\/wp-content\/uploads\/2020\/02\/image-box3.jpg\" alt=\"ISO Certification\">\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-08e8e41 ot-flex-column-vertical\" data-id=\"08e8e41\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-96c9465 elementor-widget elementor-widget-isupport_box\" data-id=\"96c9465\" data-element_type=\"widget\" data-widget_type=\"isupport_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"support-box\">\r\n\t\t\t<div class=\"inner-box\">\r\n\t\t\t\t<div class=\"overlay flex-middle\">\r\n\t\t\t\t\t<span class=\"number-box\">02<\/span>\r\n\t\t\t\t\t<div class=\"inner\">\r\n\t\t\t\t\t\t<p>vCISO will work with you to ensure that your data, your products, and your business are protected.\nThis function we provide you, will give support, and build security strategy for your organization and make sure it complies with the latest regulations and standards.\n<\/p>\r\n\t\t\t\t\t\t<a href=\"#\" class=\"btn-details\"><\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"content-box\">\r\n\t\t\t\t\t<span class=\"number-box\">02<\/span>\r\n\t\t\t\t\t<h3>Virtual Chief Information Security Officer<\/h3>\r\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/engitechnology.com\/wp-content\/uploads\/2020\/02\/image-box2.jpg\" alt=\"Virtual Chief Information Security Officer\">\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f699f55 elementor-widget elementor-widget-isupport_box\" data-id=\"f699f55\" data-element_type=\"widget\" data-widget_type=\"isupport_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"support-box\">\r\n\t\t\t<div class=\"inner-box\">\r\n\t\t\t\t<div class=\"overlay flex-middle\">\r\n\t\t\t\t\t<span class=\"number-box\">04<\/span>\r\n\t\t\t\t\t<div class=\"inner\">\r\n\t\t\t\t\t\t<p>Text comming soon <\/p>\r\n\t\t\t\t\t\t<a href=\"#\" class=\"btn-details\"><\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"content-box\">\r\n\t\t\t\t\t<span class=\"number-box\">04<\/span>\r\n\t\t\t\t\t<h3>Training<\/h3>\r\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/engitechnology.com\/wp-content\/uploads\/2020\/02\/image-box4.jpg\" alt=\"Training\">\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Defensive Cybersecurity Our Defensive Cyber Security includes measures and techniques we implement to protect your organization\u2019s systems, networks, and data. We aim to detect &amp; prevent data breaches and minimize any damage caused by them. This will ensure confidentiality, integrity, and availability of your critical assets, as well as limiting costly related financial losses. By [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/engitechnology.com\/index.php?rest_route=\/wp\/v2\/pages\/1696"}],"collection":[{"href":"https:\/\/engitechnology.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/engitechnology.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/engitechnology.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/engitechnology.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1696"}],"version-history":[{"count":54,"href":"https:\/\/engitechnology.com\/index.php?rest_route=\/wp\/v2\/pages\/1696\/revisions"}],"predecessor-version":[{"id":5378,"href":"https:\/\/engitechnology.com\/index.php?rest_route=\/wp\/v2\/pages\/1696\/revisions\/5378"}],"wp:attachment":[{"href":"https:\/\/engitechnology.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}