[et_pb_section fb_built=”1″ admin_label=”Header” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_stops=”#004183 0%|#001f4c 100%” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-18.png” parallax=”on” overflow-x=”hidden” overflow-y=”hidden” custom_padding=”6vw|||||” da_disable_devices=”off|off|off” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ z_index=”1″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”||||||||” header_font=”Roboto Slab|300|||||||” header_font_size=”46px” background_layout=”dark” header_font_size_tablet=”54px” header_font_size_phone=”32px” header_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
Cyber Forensics Services
[/et_pb_text][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_font_size=”16px” text_line_height=”1.8em” text_orientation=”justified” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
In the context of a cyber incident, cyber forensics is of utmost importance, as we at SOC MARKETPLACE are fully aware. Our objective is to carefully reconstruct the sequence of events that led up to the incident, identify the people or parties involved, and painstakingly compile and present the evidence in a way that is persuasive and admissible in court.
[/et_pb_text][et_pb_button button_url=”https://9f88040c.sibforms.com/serve/MUIEAOrsqkE9rb8h0ecq-jF8WaQsnJ85trh9KyX3-XsxChdzSC98XKz4zqtiYlwfOT5mps82fLK4l1Y4vTorCz2-O2rfCmBaKrDgOm5MuDE911EwZfEJyp84FArpdDS_IJhh0Wd-dPo-wdm7UyQ_VZzCS-xqcDiuC5ACuAcEtXmf5jTg_hG4YbCkd0YhUgwAfzBntA8acK2TmrCY” button_text=”Request An Evaluation” _builder_version=”4.21.0″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#47d7ff” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(23,102,193,0.46)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/Cyber-Forensic.png” alt=”Cyber Forensics Services” title_text=”Cyber Forensics Services” align=”right” _builder_version=”4.21.0″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”-16vw|-20vw|-4vw|” custom_margin_tablet=”-2vw|0vw|-24vw|” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.16″ z_index=”0″ width=”100%” max_width=”none” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-05.png” show_bottom_space=”off” force_fullwidth=”on” _builder_version=”4.16″ custom_margin=”-30vw||-3px” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”About” _builder_version=”4.16″ da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.16″ max_width=”800px” locked=”off” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_font=”Roboto Slab||||||||” header_2_font=”Roboto Slab|300|||||||” header_2_text_align=”center” header_2_font_size=”46px” header_3_font=”Roboto Slab|300|||||||” header_3_text_align=”center” header_3_text_color=”#0C71C3″ header_3_font_size=”24px” header_3_line_height=”1.6em” text_orientation=”justified” locked=”off” global_colors_info=”{}”]
About
Cyber Forensics Services
By working with SOC MARKETPLACE for cyber forensics, you may take advantage of our team of highly qualified professionals that have experience collecting, examining, and interpreting digital evidence. We carefully study systems, networks, and digital artefacts using cutting-edge techniques and methodologies to find key insights that help explain the incident.
Our methodical methodology entails the preservation and examination of digital data, thorough forensic examination of systems and networks, and the use of cutting-edge tools to identify the attack’s origins. We seek to reconstruct the events leading up to the incident and identify the individuals or parties involved through meticulous investigation of log files, network traffic, system artifacts, and other pertinent data.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.21.0″ locked=”off” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_font=”Roboto Slab||||||||” header_2_font=”||||||||” header_3_font=”Roboto Slab|300|||||||” header_3_text_color=”#000000″ header_3_font_size=”24px” header_3_line_height=”1.6em” text_orientation=”justified” locked=”off” global_colors_info=”{}”]
Additionally, we make sure that the evidence we collect complies with the toughest requirements for admissibility in court. Our experts are skilled at making a case for the evidence they have gathered in a way that will stand up to examination in court. We collaborate closely with your legal team to offer professional assessments, thorough reports, and if required, expert witness testimony to back up your case.
[/et_pb_text][et_pb_toggle title=”Incident Response” open_toggle_text_color=”#000000″ icon_color=”#E09900″ open_icon_color=”#E02B20″ _builder_version=”4.21.0″ title_text_color=”#000000″ title_font=”Roboto Slab|300|||||||” body_font=”Roboto Slab|300|||||||” body_text_color=”#000000″ background_color=”#f1f1f1″ custom_margin=”||8px|” custom_padding=”16px||16px||true” border_width_all=”0px” global_colors_info=”{}”]
This involves responding to cyber security incidents, such as data breaches or network intrusions, to contain the damage and prevent further impact.
[/et_pb_toggle][et_pb_toggle title=”Malware Analysis” open_toggle_text_color=”#000000″ icon_color=”#E09900″ open_icon_color=”#E02B20″ _builder_version=”4.21.0″ title_text_color=”#000000″ title_font=”Roboto Slab|300|||||||” body_font=”Roboto Slab|300|||||||” body_text_color=”#000000″ background_color=”#f1f1f1″ custom_margin=”||8px|” custom_padding=”16px||16px||true” border_width_all=”0px” global_colors_info=”{}”]
This involves analyzing malware to determine its behavior, origins, and potential impact on an organization’s systems and data.
[/et_pb_toggle][et_pb_toggle title=”Network Forensics” open_toggle_text_color=”#000000″ icon_color=”#E09900″ open_icon_color=”#E02B20″ _builder_version=”4.21.0″ title_text_color=”#000000″ title_font=”Roboto Slab|300|||||||” body_font=”Roboto Slab|300|||||||” body_text_color=”#000000″ background_color=”#f1f1f1″ custom_margin=”||8px|” custom_padding=”16px||16px||true” border_width_all=”0px” global_colors_info=”{}”]
This involves analyzing network traffic to identify potential security incidents, such as unauthorized access or data exfiltration.
[/et_pb_toggle][et_pb_toggle title=”Data Recovery and Analysis” open_toggle_text_color=”#000000″ icon_color=”#E09900″ open_icon_color=”#E02B20″ _builder_version=”4.21.0″ title_text_color=”#000000″ title_font=”Roboto Slab|300|||||||” body_font=”Roboto Slab|300|||||||” body_text_color=”#000000″ background_color=”#f1f1f1″ custom_margin=”||8px|” custom_padding=”16px||16px||true” border_width_all=”0px” global_colors_info=”{}”]
This involves obtaining the information located on a storage device that cannot be accessed by standard means due to its previous deletion or certain damage to the digital medium.
[/et_pb_toggle][et_pb_toggle title=”Forensic Readiness Planning” open_toggle_text_color=”#000000″ icon_color=”#E09900″ open_icon_color=”#E02B20″ _builder_version=”4.21.0″ title_text_color=”#000000″ title_font=”Roboto Slab|300|||||||” body_font=”Roboto Slab|300|||||||” body_text_color=”#000000″ background_color=”#f1f1f1″ custom_margin=”||8px|” custom_padding=”16px||16px||true” border_width_all=”0px” global_colors_info=”{}”]
This involves developing plans and procedures to ensure that an organization is prepared to respond to a cyber security incident and to conduct effective forensic investigations.
[/et_pb_toggle][et_pb_toggle title=”Expert Witness Testimony” open_toggle_text_color=”#000000″ icon_color=”#E09900″ open_icon_color=”#E02B20″ _builder_version=”4.21.0″ title_text_color=”#000000″ title_font=”Roboto Slab|300|||||||” body_font=”Roboto Slab|300|||||||” body_text_color=”#000000″ background_color=”#f1f1f1″ custom_margin=”||8px|” custom_padding=”16px||16px||true” border_width_all=”0px” global_colors_info=”{}”]
This involves providing expert testimony in legal proceedings related to cyber security incidents.
[/et_pb_toggle][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_image src=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/7.jpg” alt=”Cyber Forensics” title_text=”Cyber Forensics Services” align_tablet=”center” align_phone=”” align_last_edited=”on|desktop” _builder_version=”4.21.0″ border_radii=”on|25px|25px|25px|25px” box_shadow_style=”preset1″ locked=”off” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” prev_background_color=”#ffffff” admin_label=”Feature” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00ffd8 0%|#0029e2 100%” background_color_gradient_start=”#00ffd8″ background_color_gradient_end=”#0029e2″ background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-02.png” background_size=”contain” background_position=”bottom_center” custom_padding=”||0px|||” custom_padding_tablet=”||24vw” custom_padding_phone=”” top_divider_style=”slant” top_divider_height=”26vw” top_divider_flip=”horizontal” background_last_edited=”on|desktop” background_image_tablet=”http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-09.png” background_enable_image_tablet=”on” da_disable_devices=”off|off|off” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.21.0″ custom_padding=”||140px||false|false” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”30vw||” custom_padding_tablet=”0vw||” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” global_colors_info=”{}”][et_pb_image src=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/Cyber-forensic-2.png” alt=”Cyber forensic 2″ title_text=”Cyber forensic services” _builder_version=”4.21.0″ transform_scale=”130%|130%” transform_scale_tablet=”100%|100%” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate_tablet=”” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin=”100%|0%” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|tablet” transform_styles_last_edited=”on|tablet” max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin_tablet=”-16vw||” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” transform_styles_tablet=”” transform_styles_phone=”” locked=”off” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”18vw||” custom_padding_tablet=”0vw||” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”||||||||” header_2_font=”Roboto Slab|300|||||||” header_2_font_size=”42px” header_2_line_height=”1.1em” header_3_font=”Roboto Slab|300|||||||” header_3_font_size=”30px” header_3_line_height=”1.2em” background_layout=”dark” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
How it Works
Cyber Forensics Services
[/et_pb_text][et_pb_divider color=”#00b4ff” divider_weight=”2px” _builder_version=”4.16″ width=”100px” custom_margin=”||0px” global_colors_info=”{}”][/et_pb_divider][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_text_color=”#FFFFFF” text_font_size=”16px” text_line_height=”1.8em” header_font=”Roboto Slab||||||||” header_2_font=”||||||||” header_3_font=”Roboto Slab|300|||||||” header_3_text_color=”#000000″ header_3_font_size=”24px” header_3_line_height=”1.6em” text_orientation=”justified” locked=”off” global_colors_info=”{}”]
By choosing SOC MARKETPLACE for cyber forensics, you can trust that we will leverage our expertise and cutting-edge techniques to uncover the truth, support your legal efforts, and assist in holding the responsible parties accountable for their actions.
Safeguard your legal interests and gain a thorough understanding of the cyber incident with SOC MARKETPLACE as your trusted partner in cyber forensics.
[/et_pb_text][et_pb_button button_text=”Learn More” _builder_version=”4.16″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”rgba(0,0,0,0)” button_border_width=”2px” button_border_color=”#00b4ff” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”12px|24px|12px|24px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ fullwidth=”on” admin_label=”Feature” _builder_version=”4.16″ background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/03/it-services-04.jpg” parallax=”on” custom_margin=”|5%||” custom_padding=”0px|0|0px|0px|false|false” da_disable_devices=”off|off|off” border_radii=”||26vw|26vw|” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_fullwidth_header title=”“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.”” button_one_text=”Get Started” button_one_url=”https://9f88040c.sibforms.com/serve/MUIEAH8QsJnnFiC-fNnpPIZi05CuvNmaumb6p5jANQqLGOkqtob4b7mahuK10bKwi318mC-bRpFxnLNb1fBHWuJUxKCpkLFmZZV7H1mt1qWyR8R–M6HGIsBHhwTKON53sGYPh_60VAzwE_nl_YW6EksX5_RZF2Qb-Mb1MDHbyz2f32LM4DyYXU_As4O00AgwlSwhqrTeAAUqMbY” header_image_url=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-14.png” _builder_version=”4.21.0″ title_level=”h2″ title_font=”Roboto Slab|300|||||||” title_line_height=”1.2em” content_font=”Roboto Slab|300|||||||” content_font_size=”18px” content_line_height=”1.8em” subhead_font=”||||||||” background_color=”rgba(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top left” parallax=”on” parallax_method=”on” custom_button_one=”on” button_one_text_size=”15px” button_one_bg_color=”#00457A” button_one_border_width=”10px” button_one_border_color=”#00457A” button_one_border_radius=”100px” button_one_letter_spacing=”5px” button_one_font=”Open Sans|700||on|||||” button_one_use_icon=”off” custom_margin=”|||” custom_padding=”5px||5px||true|false” custom_padding_tablet=”|||” custom_padding_phone=”|||” custom_padding_last_edited=”off|desktop” title_font_tablet=”” title_font_phone=”” title_font_last_edited=”on|desktop” title_font_size_tablet=”” title_font_size_phone=”26px” title_font_size_last_edited=”on|phone” content_font_size_tablet=”” content_font_size_phone=”16px” content_font_size_last_edited=”on|phone” button_one_text_size_last_edited=”off|desktop” button_two_text_size_tablet=”” button_two_text_size_phone=”” button_two_text_size_last_edited=”on|desktop” button_one_border_color_hover=”#ff8a3d” button_one_border_radius_hover=”100px” button_one_letter_spacing_hover=”5px” button_one_bg_color_hover=”#ff8a3d” global_colors_info=”{}” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_one_border_color__hover_enabled=”on” button_one_border_color__hover=”#ff8a3d” button_two_border_color__hover_enabled=”off” button_one_border_radius__hover_enabled=”on” button_one_border_radius__hover=”100px” button_two_border_radius__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”on” button_one_letter_spacing__hover=”5px” button_two_letter_spacing__hover_enabled=”off” button_one_bg_color__hover_enabled=”on” button_one_bg_color__hover=”#ff8a3d” button_two_bg_color__hover_enabled=”off”]
Stephane Nappo
Global Head of Information Security
Societe Generale International Banking
[/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.21.0″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#3122b2 0%|#00ffd8 100%” background_color_gradient_start=”#3122b2″ background_color_gradient_end=”#00ffd8″ background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-17.png” z_index=”10″ overflow-x=”visible” overflow-y=”visible” custom_margin=”80px||||false|false” custom_padding=”||10vw|||” da_disable_devices=”off|off|off” global_module=”465″ saved_tabs=”all” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”4.21.0″ background_color=”#ffffff” custom_margin=”-100px|auto|-2px|auto|false|false” custom_padding=”0px||0px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”40px” box_shadow_blur=”60px” box_shadow_spread=”-8px” box_shadow_color=”rgba(10,45,97,0.48)” locked=”off” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ custom_padding=”60px|40px|60px|40px|true|true” global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ header_2_font=”Roboto Slab|300|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
Contact Us
[/et_pb_text][et_pb_blurb title=”(+91) 91406 56178″ use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_align=”left” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”][/et_pb_blurb][et_pb_blurb title=”connect@bitwiseinfosystems.in ” use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_align=”left” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”][/et_pb_blurb][et_pb_blurb title=”Raheja Vista Premier, cloud Nine, NIBM ROAD Pune – 411060, Maharashtra-India ” use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_align=”left” header_font_size=”16px” header_line_height=”1.4em” body_font=”Roboto Slab||||||||” body_line_height=”1.8em” icon_font_size=”24px” locked=”off” global_colors_info=”{}”]
Monday-Friday: 9:00am – 6:00pm
[/et_pb_blurb][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00f6ff 0%|#00ffbf 100%” background_color_gradient_start=”#00f6ff” background_color_gradient_end=”#00ffbf” background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-010-1.png” background_size=”contain” background_position=”bottom_left” transform_translate_linked=”off” custom_padding=”60px|40px|60px|20%|true” custom_padding_tablet=”80px|||40px” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” background_last_edited=”on|desktop” background_image_tablet=”http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-11.png” background_enable_image_tablet=”on” background_position_tablet=”top_left” global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”||||||||” header_2_font=”Roboto Slab|300|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” text_orientation=”center” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” text_text_align=”center” locked=”off” global_colors_info=”{}”]
Get Started
[/et_pb_text][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” text_orientation=”center” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
We offer a range of Cyber Security Services to help you stay secure in today’s digital landscape.
[/et_pb_text][et_pb_button button_url=”https://9f88040c.sibforms.com/serve/MUIEAITEVwFdx8qdeg3NtOcGkKTrrkm_qn_LtBUsLB_WF80jMsaTLqikoccVzidIiaQsWLUQ3_5G_I_BliUFfHYaQtuKzQpoqGcKoNdjuoA-Q6AZkxz-WhCbYmBtAUH1bmHzoYuEsbOU1JUk-iGf_GnqQ3o6uI1FfDwfFev6we2JpxJ-aaN5DWyGQ6G4w4wRinEnwm0nBrDIy_ch” button_text=”Book Appointment” button_alignment=”center” _builder_version=”4.21.0″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]