[et_pb_section fb_built=”1″ admin_label=”Header” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00ffd8 0%|#0029e2 100%” background_color_gradient_start=”#00ffd8″ background_color_gradient_end=”#0029e2″ background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-18.png” parallax=”on” custom_padding=”10vw||” da_disable_devices=”off|off|off” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ z_index=”1″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”||||||||” header_font=”Roboto Slab|300|||||||” header_text_color=”#FFFFFF” header_font_size=”60px” background_layout=”dark” header_text_color_tablet=”#FFFFFF” header_text_color_phone=”#000000″ header_text_color_last_edited=”on|phone” header_font_size_tablet=”54px” header_font_size_phone=”32px” header_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
Cyber Security Services
[/et_pb_text][et_pb_text _builder_version=”4.21.0″ _module_preset=”default” text_font=”Roboto Slab|300|||||||” text_text_color=”#FFFFFF” text_font_size=”16px” text_line_height=”1.8em” text_orientation=”justified” text_text_color_tablet=”#FFFFFF” text_text_color_phone=”#000000″ text_text_color_last_edited=”on|phone” header_6_text_color_tablet=”” header_6_text_color_phone=”#000000″ header_6_text_color_last_edited=”on|phone” global_colors_info=”{}”]
We offer a range of cyber security services to help you stay secure in today’s digital landscape. Our team of experienced professionals can help you identify potential vulnerabilities in your systems and develop a comprehensive security strategy to mitigate risks.
SOC MARKETPLACE services include Vulnerability Assessment and Penetration Testing (VAPT), which can help you identify weaknesses in your systems and take steps to address them before they are exploited by cyber criminals. We also offer Cyber Security Consulting to help you develop a customized security plan that fits your unique business needs.
[/et_pb_text][et_pb_button button_url=”https://9f88040c.sibforms.com/serve/MUIEAITEVwFdx8qdeg3NtOcGkKTrrkm_qn_LtBUsLB_WF80jMsaTLqikoccVzidIiaQsWLUQ3_5G_I_BliUFfHYaQtuKzQpoqGcKoNdjuoA-Q6AZkxz-WhCbYmBtAUH1bmHzoYuEsbOU1JUk-iGf_GnqQ3o6uI1FfDwfFev6we2JpxJ-aaN5DWyGQ6G4w4wRinEnwm0nBrDIy_ch” button_text=”Talk With An Expert” _builder_version=”4.21.0″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#47d7ff” button_border_width=”0px” button_border_radius=”100px” button_font=”Roboto Slab|||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(23,102,193,0.46)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-06-1.png” title_text=”What is cyber security” align=”right” _builder_version=”4.21.0″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”-10vw|0vw||” custom_margin_tablet=”-2vw|0vw||” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_6,1_6,1_6,1_6,1_6,1_6″ use_custom_gutter=”on” gutter_width=”2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_button button_text=”Threat Discovery” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_button button_text=”Endpoint Security” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_button button_text=”Vulnerabilities” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_button button_text=”Cyber security” button_alignment=”center” _builder_version=”4.21.0″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_button button_text=”Incident Report” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_button button_text=”Intro Assessment ” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.16″ z_index=”0″ width=”100%” max_width=”none” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ _module_preset=”default” text_font=”Roboto Slab|300|||||||” text_text_color=”#FFFFFF” text_font_size=”16px” text_line_height=”1.8em” header_3_font=”Roboto Slab|300|||||||” header_3_text_color=”#FFFFFF” header_3_font_size=”16px” header_3_line_height=”1.8em” text_orientation=”justified” custom_padding=”|250px||250px|false|true” custom_padding_tablet=”|250px||250px|false|true” custom_padding_phone=”|20px||20px|false|true” custom_padding_last_edited=”on|phone” global_colors_info=”{}”]
In addition, SOC MARKETPLACE offer System Integration Services to help you streamline your IT infrastructure and improve your overall security posture. And if you’re looking to enhance your team’s cyber security skills, we offer Security Training Courses that can help your employees stay up-to-date on the latest threats and best practices.
At our company, we take a holistic approach to cyber security, working closely with our clients to understand their specific needs and develop tailored solutions that provide maximum protection. We use the latest tools and technologies to ensure that your systems and data are secure, and we are committed to staying up-to-date on the latest threats and trends in cyber security.
[/et_pb_text][et_pb_image src=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-13.png” show_bottom_space=”off” force_fullwidth=”on” _builder_version=”4.16″ custom_margin=”0vw||-2px” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Contact Form” _builder_version=”4.16″ background_color=”#f1fafe” z_index=”10″ bottom_divider_height=”26vw” bottom_divider_flip=”horizontal” da_disable_devices=”off|off|off” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”1_3,1_3,1_3″ custom_padding_last_edited=”on|phone” _builder_version=”4.16″ background_color=”#ffffff” z_index=”1″ custom_margin=”-24vw|auto|-16vw|auto||” custom_padding=”60px|60px|60px|60px|true|true” custom_padding_tablet=”|40px||40px||true” custom_padding_phone=”|20px||20px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” locked=”off” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_blurb title=”CISO as Service” image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-icon-29.png” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_color=”#000000″ header_line_height=”1.4em” body_font=”Roboto Slab|300|||||||” body_text_align=”justify” body_text_color=”#000000″ body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”]
The CISO is responsible for establishing and enforcing policies and procedures related to information security, as well as providing guidance and training
[/et_pb_blurb][et_pb_blurb title=”Application Security” image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-icon-28.png” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_color=”#000000″ header_line_height=”1.4em” body_font=”Roboto Slab|300|||||||” body_text_align=”justify” body_text_color=”#000000″ body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”]
Application security is important because many security breaches occur through vulnerabilities in software applications.
[/et_pb_blurb][et_pb_blurb title=”VAPT” image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-icon-31.png” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_color=”#000000″ header_line_height=”1.4em” body_font=”Roboto Slab|300|||||||” body_text_align=”justify” body_text_color=”#000000″ body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”]
The identifying potential vulnerabilities in the organization’s applications, networks, and systems using automated tools and manual techniques.
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_blurb title=”GRC Advisory & Audit” image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-icon-14.png” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_color=”#000000″ header_line_height=”1.4em” body_font=”Roboto Slab|300|||||||” body_text_align=”justify” body_text_color=”#000000″ body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”]
RC advisory & audit services typically include risk assessments, compliance audits, policy development and implementation…
[/et_pb_blurb][et_pb_blurb title=”Cyber Forensics” image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-icon-6.png” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_color=”#000000″ header_line_height=”1.4em” body_font=”Roboto Slab|300|||||||” body_text_align=”justify” body_text_color=”#000000″ body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”]
The goal of cyber forensics is to reconstruct the events leading up to a cyber incident, identify the individuals or parties involved, and present the evidence
[/et_pb_blurb][et_pb_blurb title=”Red Teaming” image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-icon-13.png” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_color=”#000000″ header_line_height=”1.4em” body_font=”Roboto Slab|300|||||||” body_text_align=”justify” body_text_color=”#000000″ body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”]
This involves identifying the scope of the Red Team engagement, developing the rules of engagement, and defining the objectives and goals of the engagement.
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_blurb title=”Cloud Security” image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-icon-15.png” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_color=”#000000″ header_line_height=”1.4em” body_font=”Roboto Slab|300|||||||” body_text_align=”justify” body_text_color=”#000000″ body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”]
At our company, we understand the importance of keeping your data and systems safe from cyber threats. With the increasing frequency and sophistication of cyber attacks
[/et_pb_blurb][et_pb_blurb title=”Network Security” image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-icon-10.png” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_color=”#000000″ header_line_height=”1.4em” body_font=”Roboto Slab|300|||||||” body_text_align=”justify” body_text_color=”#000000″ body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”]
Effective network security requires a combination of proactive measures, such as risk assessments and vulnerability scanning, and reactive measures
[/et_pb_blurb][et_pb_blurb title=”IOT Security” image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-icon-7.png” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_color=”#000000″ header_line_height=”1.4em” body_font=”Roboto Slab|300|||||||” body_text_align=”justify” body_text_color=”#000000″ body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”]
This involves dividing an organization’s IoT network into smaller, more secure segments to reduce the risk of a security breach affecting the entire network.
[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ prev_background_color=”#f1fafe” next_background_color=”#ffffff” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_stops=”#004183 0%|#001f4c 100%” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” custom_margin=”||14vw|||” custom_padding=”24vw||8vw||false|” top_divider_style=”slant” top_divider_height=”27vw” top_divider_flip=”horizontal” bottom_divider_style=”slant” bottom_divider_height=”27vw” bottom_divider_flip=”horizontal” da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.16″ max_width=”800px” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_font_size=”17px” text_line_height=”1.8em” header_font=”||||||||” header_2_font=”Roboto Slab|300|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Roboto Slab|300|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” text_orientation=”center” background_layout=”dark” custom_margin=”||” custom_padding=”|||||” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
Cyber Security
We Serve a Variety of Businesses & Industries
At our company, we understand the importance of keeping your data and systems safe from cyber threats. With the increasing frequency and sophistication of cyber attacks, it’s more important than ever to have robust security measures in place to protect your business.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ _builder_version=”4.16″ locked=”off” global_colors_info=”{}”][et_pb_column type=”1_4″ _builder_version=”4.16″ background_color=”#ffffff” transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|240px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|tablet” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|tablet” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” global_colors_info=”{}”][et_pb_blurb title=”Online Stores” image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-icon-40.png” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” global_colors_info=”{}”][/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ background_color=”#ffffff” transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|160px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|tablet” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|tablet” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” global_colors_info=”{}”][et_pb_blurb title=”Health Care” image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-icon-41.png” alt=”What is cyber security” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”][/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ background_color=”#ffffff” transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|80px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|tablet” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|tablet” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” global_colors_info=”{}”][et_pb_blurb title=”Government” image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-icon-31.png” alt=”What is cyber security” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”][/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ background_color=”#ffffff” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” global_colors_info=”{}”][et_pb_blurb title=”Software” image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-icon-13.png” _builder_version=”4.16″ header_font=”Roboto Slab||||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”][/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ fullwidth=”on” admin_label=”Feature” _builder_version=”4.16″ background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/03/it-services-04.jpg” parallax=”on” custom_margin=”|5%||” custom_padding=”0px|0|0px|0px|false|false” da_disable_devices=”off|off|off” border_radii=”||26vw|26vw|” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_fullwidth_header title=”%22If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.%22″ button_one_text=”Get Started” button_one_url=”https://9f88040c.sibforms.com/serve/MUIEAITEVwFdx8qdeg3NtOcGkKTrrkm_qn_LtBUsLB_WF80jMsaTLqikoccVzidIiaQsWLUQ3_5G_I_BliUFfHYaQtuKzQpoqGcKoNdjuoA-Q6AZkxz-WhCbYmBtAUH1bmHzoYuEsbOU1JUk-iGf_GnqQ3o6uI1FfDwfFev6we2JpxJ-aaN5DWyGQ6G4w4wRinEnwm0nBrDIy_ch” header_image_url=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-14.png” _builder_version=”4.21.0″ title_level=”h2″ title_font=”Roboto Slab|300|||||||” title_line_height=”1.2em” content_font=”Roboto Slab|300|||||||” content_font_size=”18px” content_line_height=”1.8em” subhead_font=”||||||||” background_color=”rgba(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top left” parallax=”on” parallax_method=”on” custom_button_one=”on” button_one_text_size=”15px” button_one_bg_color=”#00457A” button_one_border_width=”10px” button_one_border_color=”#00457A” button_one_border_radius=”100px” button_one_letter_spacing=”5px” button_one_font=”Open Sans|700||on|||||” button_one_use_icon=”off” custom_margin=”|||” custom_padding=”5px||5px||true|false” custom_padding_tablet=”|||” custom_padding_phone=”|||” custom_padding_last_edited=”off|desktop” title_font_tablet=”” title_font_phone=”” title_font_last_edited=”on|desktop” title_font_size_tablet=”” title_font_size_phone=”26px” title_font_size_last_edited=”on|phone” content_font_size_tablet=”” content_font_size_phone=”16px” content_font_size_last_edited=”on|phone” button_one_text_size_last_edited=”off|desktop” button_two_text_size_tablet=”” button_two_text_size_phone=”” button_two_text_size_last_edited=”on|desktop” button_one_border_color_hover=”#ff8a3d” button_one_border_radius_hover=”100px” button_one_letter_spacing_hover=”5px” button_one_bg_color_hover=”#ff8a3d” global_colors_info=”{}” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_one_border_color__hover_enabled=”on” button_one_border_color__hover=”#ff8a3d” button_two_border_color__hover_enabled=”off” button_one_border_radius__hover_enabled=”on” button_one_border_radius__hover=”100px” button_two_border_radius__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”on” button_one_letter_spacing__hover=”5px” button_two_letter_spacing__hover_enabled=”off” button_one_bg_color__hover_enabled=”on” button_one_bg_color__hover=”#ff8a3d” button_two_bg_color__hover_enabled=”off”]
Richard Clarke
National Coordinator for Security, Infrastructure Protection
United States.
[/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ fullwidth=”on” _builder_version=”4.21.0″ _module_preset=”default” custom_padding=”60px|||||” da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.21.0″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#3122b2 0%|#00ffd8 100%” background_color_gradient_start=”#3122b2″ background_color_gradient_end=”#00ffd8″ background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-17.png” z_index=”10″ overflow-x=”visible” overflow-y=”visible” custom_margin=”80px||||false|false” custom_padding=”||10vw|||” da_disable_devices=”off|off|off” global_module=”465″ saved_tabs=”all” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”4.21.0″ background_color=”#ffffff” custom_margin=”-100px|auto|-2px|auto|false|false” custom_padding=”0px||0px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”40px” box_shadow_blur=”60px” box_shadow_spread=”-8px” box_shadow_color=”rgba(10,45,97,0.48)” locked=”off” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ custom_padding=”60px|40px|60px|40px|true|true” global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ header_2_font=”Roboto Slab|300|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
Contact Us
[/et_pb_text][et_pb_blurb title=”(+91) 91406 56178″ use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_align=”left” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”][/et_pb_blurb][et_pb_blurb title=”connect@bitwiseinfosystems.in ” use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_align=”left” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”][/et_pb_blurb][et_pb_blurb title=”Raheja Vista Premier, cloud Nine, NIBM ROAD Pune – 411060, Maharashtra-India ” use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_align=”left” header_font_size=”16px” header_line_height=”1.4em” body_font=”Roboto Slab||||||||” body_line_height=”1.8em” icon_font_size=”24px” locked=”off” global_colors_info=”{}”]
Monday-Friday: 9:00am – 6:00pm
[/et_pb_blurb][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00f6ff 0%|#00ffbf 100%” background_color_gradient_start=”#00f6ff” background_color_gradient_end=”#00ffbf” background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-010-1.png” background_size=”contain” background_position=”bottom_left” transform_translate_linked=”off” custom_padding=”60px|40px|60px|20%|true” custom_padding_tablet=”80px|||40px” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” background_last_edited=”on|desktop” background_image_tablet=”http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-11.png” background_enable_image_tablet=”on” background_position_tablet=”top_left” global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”||||||||” header_2_font=”Roboto Slab|300|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” text_orientation=”center” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” text_text_align=”center” locked=”off” global_colors_info=”{}”]
Get Started
[/et_pb_text][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” text_orientation=”center” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
We offer a range of Cyber Security Services to help you stay secure in today’s digital landscape.
[/et_pb_text][et_pb_button button_url=”https://9f88040c.sibforms.com/serve/MUIEAITEVwFdx8qdeg3NtOcGkKTrrkm_qn_LtBUsLB_WF80jMsaTLqikoccVzidIiaQsWLUQ3_5G_I_BliUFfHYaQtuKzQpoqGcKoNdjuoA-Q6AZkxz-WhCbYmBtAUH1bmHzoYuEsbOU1JUk-iGf_GnqQ3o6uI1FfDwfFev6we2JpxJ-aaN5DWyGQ6G4w4wRinEnwm0nBrDIy_ch” button_text=”Book Appointment” button_alignment=”center” _builder_version=”4.21.0″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]