IOT Security

[et_pb_section fb_built=”1″ admin_label=”Header” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_stops=”#004183 0%|#001f4c 100%” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-18.png” parallax=”on” overflow-x=”hidden” overflow-y=”hidden” custom_padding=”6vw|||||” da_disable_devices=”off|off|off” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ z_index=”1″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”||||||||” header_font=”Roboto Slab|300|||||||” header_font_size=”50px” background_layout=”dark” header_font_size_tablet=”54px” header_font_size_phone=”32px” header_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]

IoT Security Services

[/et_pb_text][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_text_color=”#FFFFFF” text_font_size=”16px” text_line_height=”1.8em” text_orientation=”justified” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]

IoT security, commonly referred to as the Internet of Things security, is a specialty of SOC MARKETPLACE. IoT security services cover a variety of practices and measures put in place to guard IoT systems and devices against potential security threats and hazards. Making sure there are strong security precautions is crucial in the Internet of Things (IoT), a network of connected machines, sensors, and systems.

[/et_pb_text][et_pb_button button_url=”https://9f88040c.sibforms.com/serve/MUIEAOrsqkE9rb8h0ecq-jF8WaQsnJ85trh9KyX3-XsxChdzSC98XKz4zqtiYlwfOT5mps82fLK4l1Y4vTorCz2-O2rfCmBaKrDgOm5MuDE911EwZfEJyp84FArpdDS_IJhh0Wd-dPo-wdm7UyQ_VZzCS-xqcDiuC5ACuAcEtXmf5jTg_hG4YbCkd0YhUgwAfzBntA8acK2TmrCY” button_text=”Request An Evaluation” _builder_version=”4.21.0″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#47d7ff” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(23,102,193,0.46)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/IOT-Security-.png” alt=”IoT Security Services” title_text=”IoT Security Services” align=”right” _builder_version=”4.21.0″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”-16vw|-20vw|-4vw|” custom_margin_tablet=”-2vw|0vw|-24vw|” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.16″ z_index=”0″ width=”100%” max_width=”none” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-05.png” show_bottom_space=”off” force_fullwidth=”on” _builder_version=”4.16″ custom_margin=”-30vw||-3px” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”About” _builder_version=”4.16″ da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.16″ max_width=”800px” locked=”off” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_2_font=”Roboto Slab|300|||||||” header_2_text_align=”center” header_2_font_size=”48px” header_3_font=”Roboto Slab|300|||||||” header_3_text_align=”center” header_3_text_color=”#0C71C3″ header_4_font=”Overpass|900|||||||” header_4_line_height=”1.4em” text_orientation=”justified” locked=”off” global_colors_info=”{}”]

About

IOT Security Services

As a partner of SOC MARKETPLACE, you have access to our knowledge in IoT security. We have a thorough understanding of the special difficulties and complexities involved in safeguarding IoT ecosystems, and we provide specialised solutions to properly solve them.

We take a comprehensive approach to IoT security with our services, which include risk analyses, vulnerability scans, secure device management, and encryption techniques. We collaborate closely with you to comprehend your unique IoT ecosystem, spot any weaknesses, and create a thorough security plan.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.21.0″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_4_font=”Overpass|900|||||||” header_4_line_height=”1.4em” text_orientation=”justified” locked=”off” global_colors_info=”{}”]

Authentication and Authorization: To make sure that only authorized people or devices can access IoT devices, those devices should have strong authentication procedures. Password-based authentication, digital certificates, biometric authentication, and multifactor authentication are all possible methods of doing this.

Encryption: To avoid unauthorized interception and data tampering, data exchanged between IoT devices and the backend systems should be encrypted. Secure communication channels can be established using encryption methods like SSL/TLS.

Secure Communication Protocols: To protect data while it is being transmitted, IoT devices should use secure communication protocols like HTTPS, MQTT with TLS, or CoAP with DTLS. These protocols offer data integrity, authentication, and encryption.

Firmware and Software Updates: To fix security flaws and issues, IoT devices must routinely update their firmware and software. To guarantee that devices are safeguarded against new dangers, manufacturers and users should be timely in installing updates.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_4_font=”Overpass|900|||||||” header_4_line_height=”1.4em” text_orientation=”justified” locked=”off” global_colors_info=”{}”]

Access Control: Access control techniques can be implemented to restrict device access to registered users or systems. In order to prevent unauthorized access, user roles, permissions, and limits must be defined.

Physical Security: To safeguard IoT equipment from theft, tampering, or unauthorized physical access, physical security measures are required. These might involve personal supervision, tamper-evident seals, and secure enclosures.

Network Segmentation: If a single IoT device is compromised, separating IoT devices into multiple network segments or VLANs might stop unauthorized access to crucial systems. This lessens the harm that a security compromise might do.

Security Monitoring and Incident Response: The installation of security monitoring systems make it possible to identify shady behavior, intrusions, or anomalies in IoT networks. To prevent and deal with security incidents, prompt incident response processes should be in place.

Privacy Considerations: IoT devices frequently gather and process personal data, necessitating respect for privacy laws. It is crucial to implement privacy-by-design principles, ensure data anonymization, and use consent-based data-gathering procedures.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” prev_background_color=”#ffffff” admin_label=”Feature” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00ffd8 0%|#0029e2 100%” background_color_gradient_start=”#00ffd8″ background_color_gradient_end=”#0029e2″ background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-02.png” background_size=”contain” background_position=”bottom_center” custom_padding=”||0px|||” custom_padding_tablet=”||24vw” custom_padding_phone=”” top_divider_style=”slant” top_divider_height=”26vw” top_divider_flip=”horizontal” background_last_edited=”on|desktop” background_image_tablet=”http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-09.png” background_enable_image_tablet=”on” da_disable_devices=”off|off|off” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.21.0″ custom_padding=”||180px||false|false” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”30vw||” custom_padding_tablet=”0vw||” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” global_colors_info=”{}”][et_pb_image src=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/18.png” alt=”IoT Security Services” title_text=”IoT Security Services” _builder_version=”4.21.0″ transform_scale=”130%|130%” transform_scale_tablet=”100%|100%” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate_tablet=”” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin=”100%|0%” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|tablet” transform_styles_last_edited=”on|tablet” max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin_tablet=”-16vw||” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” transform_styles_tablet=”” transform_styles_phone=”” locked=”off” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”18vw||” custom_padding_tablet=”0vw||” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”||||||||” header_2_font=”Roboto Slab|300|||||||” header_2_font_size=”46px” header_2_line_height=”1.1em” header_3_font=”Roboto Slab|300|||||||” header_3_font_size=”30px” header_3_line_height=”1.2em” background_layout=”dark” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]

How It Works

IOT Security Services

[/et_pb_text][et_pb_divider color=”#00b4ff” divider_weight=”2px” _builder_version=”4.16″ width=”100px” custom_margin=”||0px” global_colors_info=”{}”][/et_pb_divider][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_text_color=”#FFFFFF” text_font_size=”16px” text_line_height=”1.8em” text_orientation=”justified” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]

In order to safeguard IoT systems and devices from unauthorized access, data breaches, and harmful actions, SOC MARKETPLACE transported inside your IoT ecosystem, we design strong authentication procedures, deploy encryption techniques, and follow industry best practices to create secure communication channels.

[/et_pb_text][et_pb_button button_text=”Learn More” _builder_version=”4.16″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”rgba(0,0,0,0)” button_border_width=”2px” button_border_color=”#00b4ff” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”12px|24px|12px|24px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ fullwidth=”on” admin_label=”Feature” _builder_version=”4.16″ background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/03/it-services-04.jpg” parallax=”on” custom_margin=”|5%||” custom_padding=”0px|0|0px|0px|false|false” da_disable_devices=”off|off|off” border_radii=”||26vw|26vw|” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_fullwidth_header title=”%22If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.%22″ button_one_text=”Get Started” button_one_url=”https://9f88040c.sibforms.com/serve/MUIEAH8QsJnnFiC-fNnpPIZi05CuvNmaumb6p5jANQqLGOkqtob4b7mahuK10bKwi318mC-bRpFxnLNb1fBHWuJUxKCpkLFmZZV7H1mt1qWyR8R–M6HGIsBHhwTKON53sGYPh_60VAzwE_nl_YW6EksX5_RZF2Qb-Mb1MDHbyz2f32LM4DyYXU_As4O00AgwlSwhqrTeAAUqMbY” header_image_url=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-14.png” _builder_version=”4.21.0″ title_level=”h2″ title_font=”Roboto Slab|300|||||||” title_line_height=”1.2em” content_font=”Roboto Slab|300|||||||” content_font_size=”18px” content_line_height=”1.8em” subhead_font=”||||||||” background_color=”rgba(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top left” parallax=”on” parallax_method=”on” custom_button_one=”on” button_one_text_size=”15px” button_one_bg_color=”#00457A” button_one_border_width=”10px” button_one_border_color=”#00457A” button_one_border_radius=”100px” button_one_letter_spacing=”5px” button_one_font=”Open Sans|700||on|||||” button_one_use_icon=”off” custom_margin=”|||” custom_padding=”5px||5px||true|false” custom_padding_tablet=”|||” custom_padding_phone=”|||” custom_padding_last_edited=”off|desktop” title_font_tablet=”” title_font_phone=”” title_font_last_edited=”on|desktop” title_font_size_tablet=”” title_font_size_phone=”26px” title_font_size_last_edited=”on|phone” content_font_size_tablet=”” content_font_size_phone=”16px” content_font_size_last_edited=”on|phone” button_one_text_size_last_edited=”off|desktop” button_two_text_size_tablet=”” button_two_text_size_phone=”” button_two_text_size_last_edited=”on|desktop” button_one_border_color_hover=”#ff8a3d” button_one_border_radius_hover=”100px” button_one_letter_spacing_hover=”5px” button_one_bg_color_hover=”#ff8a3d” global_colors_info=”{}” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_one_border_color__hover_enabled=”on” button_one_border_color__hover=”#ff8a3d” button_two_border_color__hover_enabled=”off” button_one_border_radius__hover_enabled=”on” button_one_border_radius__hover=”100px” button_two_border_radius__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”on” button_one_letter_spacing__hover=”5px” button_two_letter_spacing__hover_enabled=”off” button_one_bg_color__hover_enabled=”on” button_one_bg_color__hover=”#ff8a3d” button_two_bg_color__hover_enabled=”off”]

Richard Clarke

National Coordinator for Security, Infrastructure Protection

United States.

[/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.21.0″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#3122b2 0%|#00ffd8 100%” background_color_gradient_start=”#3122b2″ background_color_gradient_end=”#00ffd8″ background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-17.png” z_index=”10″ overflow-x=”visible” overflow-y=”visible” custom_margin=”80px||||false|false” custom_padding=”||10vw|||” da_disable_devices=”off|off|off” global_module=”465″ saved_tabs=”all” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”4.21.0″ background_color=”#ffffff” custom_margin=”-100px|auto|-2px|auto|false|false” custom_padding=”0px||0px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”40px” box_shadow_blur=”60px” box_shadow_spread=”-8px” box_shadow_color=”rgba(10,45,97,0.48)” locked=”off” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ custom_padding=”60px|40px|60px|40px|true|true” global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ header_2_font=”Roboto Slab|300|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]

Contact Us

[/et_pb_text][et_pb_blurb title=”(+91) 91406 56178″ use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_align=”left” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”][/et_pb_blurb][et_pb_blurb title=”connect@bitwiseinfosystems.in ” use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_align=”left” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”][/et_pb_blurb][et_pb_blurb title=”Raheja Vista Premier, cloud Nine, NIBM ROAD Pune – 411060, Maharashtra-India ” use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_align=”left” header_font_size=”16px” header_line_height=”1.4em” body_font=”Roboto Slab||||||||” body_line_height=”1.8em” icon_font_size=”24px” locked=”off” global_colors_info=”{}”]

Monday-Friday: 9:00am – 6:00pm

[/et_pb_blurb][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00f6ff 0%|#00ffbf 100%” background_color_gradient_start=”#00f6ff” background_color_gradient_end=”#00ffbf” background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-010-1.png” background_size=”contain” background_position=”bottom_left” transform_translate_linked=”off” custom_padding=”60px|40px|60px|20%|true” custom_padding_tablet=”80px|||40px” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” background_last_edited=”on|desktop” background_image_tablet=”http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-11.png” background_enable_image_tablet=”on” background_position_tablet=”top_left” global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”||||||||” header_2_font=”Roboto Slab|300|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” text_orientation=”center” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” text_text_align=”center” locked=”off” global_colors_info=”{}”]

Get Started

[/et_pb_text][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” text_orientation=”center” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]

We offer a range of Cyber Security Services to help you stay secure in today’s digital landscape.

[/et_pb_text][et_pb_button button_url=”https://9f88040c.sibforms.com/serve/MUIEAITEVwFdx8qdeg3NtOcGkKTrrkm_qn_LtBUsLB_WF80jMsaTLqikoccVzidIiaQsWLUQ3_5G_I_BliUFfHYaQtuKzQpoqGcKoNdjuoA-Q6AZkxz-WhCbYmBtAUH1bmHzoYuEsbOU1JUk-iGf_GnqQ3o6uI1FfDwfFev6we2JpxJ-aaN5DWyGQ6G4w4wRinEnwm0nBrDIy_ch” button_text=”Book Appointment” button_alignment=”center” _builder_version=”4.21.0″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]