GRC Advisory & Audit

[et_pb_section fb_built=”1″ admin_label=”Header” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_stops=”#004183 0%|#001f4c 100%” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-18.png” parallax=”on” overflow-x=”hidden” overflow-y=”hidden” custom_padding=”6vw|||||” da_disable_devices=”off|off|off” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ z_index=”1″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”||||||||” header_font=”Roboto Slab|300|||||||” header_font_size=”60px” background_layout=”dark” header_font_size_tablet=”54px” header_font_size_phone=”32px” header_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]

GRC Advisory & Audit

[/et_pb_text][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_font_size=”16px” text_line_height=”1.8em” text_orientation=”justified” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]

GRC advisory & audit services typically include risk assessments, compliance audits, policy development and implementation, internal control testing, and training and education programs for employees.

[/et_pb_text][et_pb_button button_url=”https://9f88040c.sibforms.com/serve/MUIEAITEVwFdx8qdeg3NtOcGkKTrrkm_qn_LtBUsLB_WF80jMsaTLqikoccVzidIiaQsWLUQ3_5G_I_BliUFfHYaQtuKzQpoqGcKoNdjuoA-Q6AZkxz-WhCbYmBtAUH1bmHzoYuEsbOU1JUk-iGf_GnqQ3o6uI1FfDwfFev6we2JpxJ-aaN5DWyGQ6G4w4wRinEnwm0nBrDIy_ch” button_text=”Request An Evaluation” _builder_version=”4.21.0″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#47d7ff” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(23,102,193,0.46)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-09-1.png” alt=”GRC Advisory & Audit” title_text=”GRC Advisory & Audit” align=”right” _builder_version=”4.21.0″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”-16vw|-20vw|-4vw|” custom_margin_tablet=”-2vw|0vw|-24vw|” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.16″ z_index=”0″ width=”100%” max_width=”none” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-05.png” show_bottom_space=”off” force_fullwidth=”on” _builder_version=”4.16″ custom_margin=”-30vw||-3px” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”About” _builder_version=”4.16″ da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.16″ max_width=”800px” locked=”off” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_font_size=”16px” text_line_height=”1.8em” header_font=”Roboto Slab|300|||||||” header_2_font=”Roboto Slab|300|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Roboto Slab|300|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” text_orientation=”center” custom_margin=”||” custom_padding=”|||||” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]

About

GRC Advisory & Audit

Based on the assessment and compliance evaluation, the advisor identifies any gaps between current practices and desired compliance and risk management standards. This helps in developing a roadmap for improvement.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_image src=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/3-1.jpg” title_text=”GRC Audit” align_tablet=”center” align_phone=”center” align_last_edited=”on|desktop” _builder_version=”4.21.0″ border_radii=”on|25px|25px|25px|25px” box_shadow_style=”preset1″ global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_font=”Roboto Slab||||||||” header_2_font=”||||||||” header_3_font=”Roboto Slab|300|||||||” header_3_text_color=”#000000″ header_3_font_size=”24px” header_3_line_height=”1.6em” text_orientation=”justified” width=”100%” global_colors_info=”{}”]

GRC (Governance, Risk, and Compliance) Advisory & Audit is a practice that helps organizations manage their operations in a way that is compliant with laws, regulations, and internal policies while also minimizing risk and maximizing performance.

GRC advisory & audit services typically include risk assessments, compliance audits, policy development and implementation, internal control testing, and training and education programs for employees. By working with SOC MARKETPLACE, organizations can improve their overall governance, minimize risk, and ensure compliance with legal and regulatory requirements.

[/et_pb_text][et_pb_toggle title=”Governance” closed_toggle_text_color=”#000000″ icon_color=”#E09900″ open_icon_color=”#E02B20″ _builder_version=”4.21.0″ title_text_color=”#000000″ title_font=”Roboto Slab|300|||||||” closed_title_font=”Roboto Slab|300|||||||” body_font=”Roboto Slab|300|||||||” body_text_color=”#000000″ background_color=”#ffffff” text_orientation=”justified” custom_margin=”||8px|” custom_padding=”16px||16px||true” border_width_all=”0px” locked=”off” global_colors_info=”{}”]

We help organizations improve their internal controls and governance practices to increase efficiency, effectiveness, and transparency. We assist you with internal control assessments, policies, and procedure development.

[/et_pb_toggle][et_pb_toggle title=”Risk Management” closed_toggle_text_color=”#000000″ icon_color=”#E09900″ open_icon_color=”#E02B20″ _builder_version=”4.21.0″ title_text_color=”#000000″ title_font=”Roboto Slab|300|||||||” closed_title_font=”Roboto Slab|300|||||||” body_font=”Roboto Slab|300|||||||” body_text_color=”#000000″ background_color=”#ffffff” text_orientation=”justified” custom_margin=”||8px|” custom_padding=”16px||16px||true” border_width_all=”0px” locked=”off” global_colors_info=”{}”]

We help identify, assess, and prioritize potential risks to an organization’s operations, assets, and reputation. We help you in developing risk management plans and implement controls to mitigate those risks.

[/et_pb_toggle][et_pb_toggle title=”Compliance Advisory” closed_toggle_text_color=”#000000″ icon_color=”#E09900″ open_icon_color=”#E02B20″ _builder_version=”4.21.0″ title_text_color=”#000000″ title_font=”Roboto Slab|300|||||||” closed_title_font=”Roboto Slab|300|||||||” body_font=”Roboto Slab|300|||||||” body_text_color=”#000000″ background_color=”#ffffff” text_orientation=”justified” custom_margin=”||8px|” custom_padding=”16px||16px||true” border_width_all=”0px” locked=”off” global_colors_info=”{}”]

We help organizations stay up-to-date with the latest regulations and industry standards. We develop compliance management programs, conduct compliance audits, and help organizations prepare for regulatory examinations.

[/et_pb_toggle][et_pb_toggle title=”Audit” closed_toggle_text_color=”#000000″ icon_color=”#E09900″ open_icon_color=”#E02B20″ _builder_version=”4.21.0″ title_text_color=”#000000″ title_font=”Roboto Slab|300|||||||” closed_title_font=”Roboto Slab|300|||||||” body_font=”Roboto Slab|300|||||||” body_text_color=”#000000″ background_color=”#ffffff” text_orientation=”justified” custom_margin=”||8px|” custom_padding=”16px||16px||true” border_width_all=”0px” locked=”off” global_colors_info=”{}”]

We help organizations manage and mitigate cybersecurity and information security risks. We conduct risk assessments, develop cybersecurity strategies, and help organizations implement security controls and protocols.

[/et_pb_toggle][et_pb_toggle title=”TPRM” closed_toggle_text_color=”#000000″ icon_color=”#E09900″ open_icon_color=”#E02B20″ _builder_version=”4.21.0″ title_text_color=”#000000″ title_font=”Roboto Slab|300|||||||” closed_title_font=”Roboto Slab|300|||||||” body_font=”Roboto Slab|300|||||||” body_text_color=”#000000″ background_color=”#ffffff” text_orientation=”justified” custom_margin=”||8px|” custom_padding=”16px||16px||true” border_width_all=”0px” locked=”off” global_colors_info=”{}”]

We help organizations manage risks associated with third-party vendors and suppliers. We conduct due diligence on vendors, assess vendor risk, and help organizations implement controls to mitigate those risks.

[/et_pb_toggle][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” prev_background_color=”#ffffff” admin_label=”Feature” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00ffd8 0%|#0029e2 100%” background_color_gradient_start=”#00ffd8″ background_color_gradient_end=”#0029e2″ background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-02.png” background_size=”contain” background_position=”bottom_center” custom_padding=”||0px|||” custom_padding_tablet=”||24vw” custom_padding_phone=”” top_divider_style=”slant” top_divider_height=”26vw” top_divider_flip=”horizontal” background_last_edited=”on|desktop” background_image_tablet=”http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-09.png” background_enable_image_tablet=”on” da_disable_devices=”off|off|off” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”30vw||” custom_padding_tablet=”0vw||” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” global_colors_info=”{}”][et_pb_image src=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-10.png” title_text=”cyber-security-10″ _builder_version=”4.21.0″ transform_scale=”130%|130%” transform_scale_tablet=”100%|100%” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate_tablet=”” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin=”100%|0%” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|tablet” transform_styles_last_edited=”on|tablet” max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin_tablet=”-16vw||” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” transform_styles_tablet=”” transform_styles_phone=”” locked=”off” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”18vw||” custom_padding_tablet=”0vw||” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”||||||||” header_2_font=”Roboto Slab|300|||||||” header_2_font_size=”45px” header_2_line_height=”1.1em” header_3_font=”Roboto Slab|300|||||||” header_3_font_size=”30px” header_3_line_height=”1.2em” background_layout=”dark” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]

How It Works

GRC Advisory & Audit

[/et_pb_text][et_pb_divider color=”#00b4ff” divider_weight=”2px” _builder_version=”4.16″ width=”100px” custom_margin=”||0px” global_colors_info=”{}”][/et_pb_divider][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_font_size=”16px” text_line_height=”1.8em” text_orientation=”justified” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]

GRC (Governance, Risk, and Compliance) Advisory & Audit works by assisting organizations in managing their operations to ensure compliance with regulations, laws, and internal policies while effectively managing risks and optimizing performance. Overall, GRC Advisory & Audit helps organizations navigate the complex landscape of governance, risk, and compliance by providing guidance, assessment, and recommendations to improve compliance, manage risks, and enhance overall performance.

[/et_pb_text][et_pb_button button_text=”Learn More” _builder_version=”4.16″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”rgba(0,0,0,0)” button_border_width=”2px” button_border_color=”#00b4ff” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”12px|24px|12px|24px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ fullwidth=”on” _builder_version=”4.21.0″ _module_preset=”default” custom_padding=”70px||||false|false” da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][/et_pb_section][et_pb_section fb_built=”1″ fullwidth=”on” admin_label=”Feature” _builder_version=”4.16″ background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/03/it-services-04.jpg” parallax=”on” custom_margin=”|5%||” custom_padding=”0px|0|0px|0px|false|false” da_disable_devices=”off|off|off” border_radii=”||26vw|26vw|” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_fullwidth_header title=”%22Data is the pollution problem of the information age, and protecting privacy is the environmental challenge.%22″ button_one_text=”Get Started” button_one_url=”https://9f88040c.sibforms.com/serve/MUIEAITEVwFdx8qdeg3NtOcGkKTrrkm_qn_LtBUsLB_WF80jMsaTLqikoccVzidIiaQsWLUQ3_5G_I_BliUFfHYaQtuKzQpoqGcKoNdjuoA-Q6AZkxz-WhCbYmBtAUH1bmHzoYuEsbOU1JUk-iGf_GnqQ3o6uI1FfDwfFev6we2JpxJ-aaN5DWyGQ6G4w4wRinEnwm0nBrDIy_ch” header_image_url=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-14.png” _builder_version=”4.21.0″ title_level=”h2″ title_font=”Roboto Slab|300|||||||” title_line_height=”1.2em” content_font=”Roboto Slab|300|||||||” content_font_size=”18px” content_line_height=”1.8em” subhead_font=”||||||||” background_color=”rgba(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top left” parallax=”on” parallax_method=”on” custom_button_one=”on” button_one_text_size=”15px” button_one_bg_color=”#00457A” button_one_border_width=”10px” button_one_border_color=”#00457A” button_one_border_radius=”100px” button_one_letter_spacing=”5px” button_one_font=”Open Sans|700||on|||||” button_one_use_icon=”off” custom_margin=”|||” custom_padding=”5px||5px||true|false” custom_padding_tablet=”|||” custom_padding_phone=”8px|10px|8px|10px|true|true” custom_padding_last_edited=”on|phone” title_font_tablet=”” title_font_phone=”” title_font_last_edited=”on|desktop” title_font_size_tablet=”” title_font_size_phone=”26px” title_font_size_last_edited=”on|phone” content_font_size_tablet=”” content_font_size_phone=”16px” content_font_size_last_edited=”on|phone” button_one_text_size_last_edited=”off|desktop” button_two_text_size_tablet=”” button_two_text_size_phone=”” button_two_text_size_last_edited=”on|desktop” button_one_border_color_hover=”#ff8a3d” button_one_border_radius_hover=”100px” button_one_letter_spacing_hover=”5px” button_one_bg_color_hover=”#ff8a3d” global_colors_info=”{}” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_one_border_color__hover_enabled=”on” button_one_border_color__hover=”#ff8a3d” button_two_border_color__hover_enabled=”off” button_one_border_radius__hover_enabled=”on” button_one_border_radius__hover=”100px” button_two_border_radius__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”on” button_one_letter_spacing__hover=”5px” button_two_letter_spacing__hover_enabled=”off” button_one_bg_color__hover_enabled=”on” button_one_bg_color__hover=”#ff8a3d” button_two_bg_color__hover_enabled=”off”]

Bruce Schneier

American cryptographer,

Computer Security Professional, Privacy Specialist

[/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ fullwidth=”on” _builder_version=”4.21.0″ _module_preset=”default” custom_padding=”14px||14px||true|false” da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.21.0″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#3122b2 0%|#00ffd8 100%” background_color_gradient_start=”#3122b2″ background_color_gradient_end=”#00ffd8″ background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-17.png” z_index=”10″ overflow-x=”visible” overflow-y=”visible” custom_margin=”80px||||false|false” custom_padding=”||10vw|||” da_disable_devices=”off|off|off” global_module=”465″ saved_tabs=”all” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”4.21.0″ background_color=”#ffffff” custom_margin=”-100px|auto|-2px|auto|false|false” custom_padding=”0px||0px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”40px” box_shadow_blur=”60px” box_shadow_spread=”-8px” box_shadow_color=”rgba(10,45,97,0.48)” locked=”off” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ custom_padding=”60px|40px|60px|40px|true|true” global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ header_2_font=”Roboto Slab|300|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]

Contact Us

[/et_pb_text][et_pb_blurb title=”(+91) 91406 56178″ use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_align=”left” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”][/et_pb_blurb][et_pb_blurb title=”connect@bitwiseinfosystems.in ” use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_align=”left” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”][/et_pb_blurb][et_pb_blurb title=”Raheja Vista Premier, cloud Nine, NIBM ROAD Pune – 411060, Maharashtra-India ” use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_align=”left” header_font_size=”16px” header_line_height=”1.4em” body_font=”Roboto Slab||||||||” body_line_height=”1.8em” icon_font_size=”24px” locked=”off” global_colors_info=”{}”]

Monday-Friday: 9:00am – 6:00pm

[/et_pb_blurb][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00f6ff 0%|#00ffbf 100%” background_color_gradient_start=”#00f6ff” background_color_gradient_end=”#00ffbf” background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-010-1.png” background_size=”contain” background_position=”bottom_left” transform_translate_linked=”off” custom_padding=”60px|40px|60px|20%|true” custom_padding_tablet=”80px|||40px” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” background_last_edited=”on|desktop” background_image_tablet=”http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-11.png” background_enable_image_tablet=”on” background_position_tablet=”top_left” global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”||||||||” header_2_font=”Roboto Slab|300|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” text_orientation=”center” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” text_text_align=”center” locked=”off” global_colors_info=”{}”]

Get Started

[/et_pb_text][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” text_orientation=”center” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]

We offer a range of Cyber Security Services to help you stay secure in today’s digital landscape.

[/et_pb_text][et_pb_button button_url=”https://9f88040c.sibforms.com/serve/MUIEAITEVwFdx8qdeg3NtOcGkKTrrkm_qn_LtBUsLB_WF80jMsaTLqikoccVzidIiaQsWLUQ3_5G_I_BliUFfHYaQtuKzQpoqGcKoNdjuoA-Q6AZkxz-WhCbYmBtAUH1bmHzoYuEsbOU1JUk-iGf_GnqQ3o6uI1FfDwfFev6we2JpxJ-aaN5DWyGQ6G4w4wRinEnwm0nBrDIy_ch” button_text=”Book Appointment” button_alignment=”center” _builder_version=”4.21.0″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]