[et_pb_section fb_built=”1″ admin_label=”Header” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_stops=”#004183 0%|#001f4c 100%” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-18.png” parallax=”on” overflow-x=”hidden” overflow-y=”hidden” custom_padding=”6vw|||||” da_disable_devices=”off|off|off” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ z_index=”1″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”||||||||” header_font=”Roboto Slab|300|||||||” header_font_size=”46px” background_layout=”dark” header_font_size_tablet=”54px” header_font_size_phone=”32px” header_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
Network Security Services
[/et_pb_text][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_font_size=”17px” text_line_height=”1.8em” text_orientation=”justified” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}” custom_padding=”0px|||||”]
At SOC MARKETPLACE, we are aware of the many facets of network security, which includes a variety of tools and techniques to safeguard your priceless assets. Our all-encompassing strategy makes use of cutting-edge firewalls, intrusion detection and prevention systems, virtual private networks, and access control systems.
[/et_pb_text][et_pb_button button_url=”https://9f88040c.sibforms.com/serve/MUIEAOrsqkE9rb8h0ecq-jF8WaQsnJ85trh9KyX3-XsxChdzSC98XKz4zqtiYlwfOT5mps82fLK4l1Y4vTorCz2-O2rfCmBaKrDgOm5MuDE911EwZfEJyp84FArpdDS_IJhh0Wd-dPo-wdm7UyQ_VZzCS-xqcDiuC5ACuAcEtXmf5jTg_hG4YbCkd0YhUgwAfzBntA8acK2TmrCY” button_text=”Request An Evaluation” _builder_version=”4.21.0″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#47d7ff” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(23,102,193,0.46)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/Network-security.png” alt=”Network Security Services” title_text=”Network Security Services” align=”right” _builder_version=”4.21.0″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”-16vw|-20vw|-4vw|” custom_margin_tablet=”-2vw|0vw|-24vw|” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.16″ z_index=”0″ width=”100%” max_width=”none” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-05.png” show_bottom_space=”off” force_fullwidth=”on” _builder_version=”4.16″ custom_margin=”-30vw||-3px” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”About” _builder_version=”4.16″ da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.16″ max_width=”800px” locked=”off” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_font=”Roboto Slab||||||||” header_2_font=”Roboto Slab|300|||||||” header_2_text_align=”center” header_2_font_size=”46px” header_3_font=”Roboto Slab|300|||||||” header_3_text_align=”center” header_3_text_color=”#0C71C3″ header_3_font_size=”24px” header_3_line_height=”1.6em” text_orientation=”justified” locked=”off” global_colors_info=”{}”]
About
Network Security Services
By connecting with SOC MARKETPLACE, you have access to our knowledge of how to put strong network security measures in place. In order to build a solid perimeter defense and protect your network resources from unauthorized access and harmful activity, we deploy cutting-edge firewalls.
Our intrusion detection and prevention systems (IDPS) are essential for keeping track of network activity, quickly seeing possible attacks, and taking preventative steps to lessen risks. We provide early detection of security problems with real-time analysis and cutting-edge threat intelligence, enabling prompt response and remediation.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_image src=”https://bitwiseinfosystems.in/wp-content/uploads/2023/04/it-services-12.jpg” alt=”Network Security Services” title_text=”Network Security Services” align_tablet=”center” align_phone=”center” align_last_edited=”on|desktop” _builder_version=”4.21.0″ border_radii=”on|25px|25px|25px|25px” box_shadow_style=”preset1″ global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” header_font=”Roboto Slab||||||||” header_2_font=”||||||||” header_3_font=”Roboto Slab|300|||||||” header_3_text_color=”#000000″ header_3_font_size=”24px” header_3_line_height=”1.6em” text_orientation=”justified” global_colors_info=”{}”]
We use secure virtual private networks (VPNs), which build encrypted tunnels and protect the confidentiality and integrity of data exchanged between network endpoints, to increase the security of your network communication. As a result, you may retain strict security procedures while allowing authorized users to connect to your network securely from a distance.
Furthermore, SOC MARKETPLACE uses strong access controls to enforce fine-grained permissions and limitations, making sure that only authorized users have the proper level of access to network resources. This reduces the possibility of insider threats and helps stop unauthorized activity.
[/et_pb_text][et_pb_toggle title=”Network Security Assessment
” closed_toggle_text_color=”#000000″ closed_toggle_background_color=”rgba(214,214,214,0.47)” icon_color=”#E09900″ open_icon_color=”#E02B20″ _builder_version=”4.21.0″ title_text_color=”#000000″ title_font=”Roboto Slab|300|||||||” title_text_align=”left” closed_title_font=”Roboto Slab|300|||||||” body_font=”Roboto Slab|300|||||||” body_text_color=”#000000″ background_color=”#ffffff” text_orientation=”justified” custom_margin=”||8px|” custom_padding=”16px||16px||true” border_width_all=”0px” locked=”off” global_colors_info=”{}”]
This involves assessing an organization’s network security posture, including identifying potential vulnerabilities and making recommendations for remediation.
[/et_pb_toggle][et_pb_toggle title=”Configuration Audits” closed_toggle_text_color=”#000000″ closed_toggle_background_color=”rgba(214,214,214,0.47)” icon_color=”#E09900″ open_icon_color=”#E02B20″ _builder_version=”4.21.0″ title_text_color=”#000000″ title_font=”Roboto Slab|300|||||||” title_text_align=”left” closed_title_font=”Roboto Slab|300|||||||” body_font=”Roboto Slab|300|||||||” body_text_color=”#000000″ background_color=”#ffffff” text_orientation=”justified” custom_margin=”||8px|” custom_padding=”16px||16px||true” border_width_all=”0px” locked=”off” global_colors_info=”{}”]
This involves change detection, configuration assessment, and reconciliation of detected changes against approved requests for changes (RFCs) and mitigation.
[/et_pb_toggle][et_pb_toggle title=”Intrusion Detection and Prevention” closed_toggle_text_color=”#000000″ closed_toggle_background_color=”rgba(214,214,214,0.47)” icon_color=”#E09900″ open_icon_color=”#E02B20″ _builder_version=”4.21.0″ title_text_color=”#000000″ title_font=”Roboto Slab|300|||||||” title_text_align=”left” closed_title_font=”Roboto Slab|300|||||||” body_font=”Roboto Slab|300|||||||” body_text_color=”#000000″ background_color=”#ffffff” text_orientation=”justified” custom_margin=”||8px|” custom_padding=”16px||16px||true” border_width_all=”0px” locked=”off” global_colors_info=”{}”]
This involves monitoring network traffic for signs of potential security breaches, such as unauthorized access attempts or malware infections, and taking action to prevent them.
[/et_pb_toggle][et_pb_toggle title=”Network Architecture Planning” closed_toggle_text_color=”#000000″ closed_toggle_background_color=”rgba(214,214,214,0.47)” icon_color=”#E09900″ open_icon_color=”#E02B20″ _builder_version=”4.21.0″ title_text_color=”#000000″ title_font=”Roboto Slab|300|||||||” title_text_align=”left” closed_title_font=”Roboto Slab|300|||||||” body_font=”Roboto Slab|300|||||||” body_text_color=”#000000″ background_color=”#ffffff” text_orientation=”justified” custom_margin=”||8px|” custom_padding=”16px||16px||true” border_width_all=”0px” locked=”off” global_colors_info=”{}”]
This involves process of designing and planning a computer network infrastructure that supports an organization’s overall goals and objectives.
[/et_pb_toggle][et_pb_toggle title=”Wireless Security Management
” closed_toggle_text_color=”#000000″ closed_toggle_background_color=”rgba(214,214,214,0.47)” icon_color=”#E09900″ open_icon_color=”#E02B20″ _builder_version=”4.21.0″ title_text_color=”#000000″ title_font=”Roboto Slab|300|||||||” title_text_align=”left” closed_title_font=”Roboto Slab|300|||||||” body_font=”Roboto Slab|300|||||||” body_text_color=”#000000″ background_color=”#ffffff” text_orientation=”justified” custom_margin=”||8px|” custom_padding=”16px||16px||true” border_width_all=”0px” locked=”off” global_colors_info=”{}”]
This involves managing and securing wireless networks, including the use of encryption and other security measures to protect against unauthorized access.
[/et_pb_toggle][et_pb_toggle title=”Network Segmentation
” closed_toggle_text_color=”#000000″ closed_toggle_background_color=”rgba(214,214,214,0.47)” icon_color=”#E09900″ open_icon_color=”#E02B20″ _builder_version=”4.21.0″ title_text_color=”#000000″ title_font=”Roboto Slab|300|||||||” title_text_align=”left” closed_title_font=”Roboto Slab|300|||||||” body_font=”Roboto Slab|300|||||||” body_text_color=”#000000″ background_color=”#ffffff” text_orientation=”justified” custom_margin=”||8px|” custom_padding=”16px||16px||true” border_width_all=”0px” locked=”off” global_colors_info=”{}”]
This involves dividing an organization’s network into smaller, more secure segments to reduce the risk of a security breach affecting the entire network.
[/et_pb_toggle][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” prev_background_color=”#ffffff” admin_label=”Feature” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00ffd8 0%|#0029e2 100%” background_color_gradient_start=”#00ffd8″ background_color_gradient_end=”#0029e2″ background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-02.png” background_size=”contain” background_position=”bottom_center” custom_padding=”||0px|||” custom_padding_tablet=”||24vw” custom_padding_phone=”” top_divider_style=”slant” top_divider_height=”26vw” top_divider_flip=”horizontal” background_last_edited=”on|desktop” background_image_tablet=”http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-09.png” background_enable_image_tablet=”on” da_disable_devices=”off|off|off” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.21.0″ custom_padding=”||140px||false|false” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”30vw||” custom_padding_tablet=”0vw||” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” global_colors_info=”{}”][et_pb_image src=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/Network-security-2.png” alt=”Network security 2″ title_text=”Network Security Services” _builder_version=”4.21.0″ transform_scale=”130%|130%” transform_scale_tablet=”100%|100%” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate_tablet=”” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin=”100%|0%” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|tablet” transform_styles_last_edited=”on|tablet” max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin_tablet=”-16vw||” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” transform_styles_tablet=”” transform_styles_phone=”” locked=”off” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”18vw||” custom_padding_tablet=”0vw||” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”||||||||” header_2_font=”Roboto Slab|300|||||||” header_2_font_size=”41px” header_2_line_height=”1.1em” header_3_font=”Roboto Slab|300|||||||” header_3_font_size=”30px” header_3_line_height=”1.2em” background_layout=”dark” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
About How it works
Network Security Services
[/et_pb_text][et_pb_divider color=”#00b4ff” divider_weight=”2px” _builder_version=”4.16″ width=”100px” custom_margin=”||0px” global_colors_info=”{}”][/et_pb_divider][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_font_size=”16px” text_line_height=”1.8em” text_orientation=”justified” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
Our network security solutions are made to fit your unique needs and current industry standards. We always keep an eye on new security risks and trends, which enables us to make timely upgrades and modifications that keep your network safe from the newest threats.
By strengthening your network security with SOC MARKETPLACE, you can be sure that your network resources will be protected from unauthorized access, security incidents will be handled quickly, and your data will be delivered safely.
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ fullwidth=”on” admin_label=”Feature” _builder_version=”4.16″ background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/03/it-services-04.jpg” parallax=”on” custom_margin=”|5%||” custom_padding=”0px|0|0px|0px|false|false” da_disable_devices=”off|off|off” border_radii=”||26vw|26vw|” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_fullwidth_header title=”%22Cybersecurity is not just a technology issue, it is a business risk that requires a holistic and strategic approach to manage.%22″ button_one_text=”Get Started” button_one_url=”https://9f88040c.sibforms.com/serve/MUIEAH8QsJnnFiC-fNnpPIZi05CuvNmaumb6p5jANQqLGOkqtob4b7mahuK10bKwi318mC-bRpFxnLNb1fBHWuJUxKCpkLFmZZV7H1mt1qWyR8R–M6HGIsBHhwTKON53sGYPh_60VAzwE_nl_YW6EksX5_RZF2Qb-Mb1MDHbyz2f32LM4DyYXU_As4O00AgwlSwhqrTeAAUqMbY” header_image_url=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-14.png” _builder_version=”4.21.0″ title_level=”h2″ title_font=”Roboto Slab|300|||||||” title_line_height=”1.2em” content_font=”Roboto Slab|300|||||||” content_font_size=”18px” content_line_height=”1.8em” subhead_font=”||||||||” background_color=”rgba(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top left” parallax=”on” parallax_method=”on” custom_button_one=”on” button_one_text_size=”15px” button_one_bg_color=”#00457A” button_one_border_width=”10px” button_one_border_color=”#00457A” button_one_border_radius=”100px” button_one_letter_spacing=”5px” button_one_font=”Open Sans|700||on|||||” button_one_use_icon=”off” custom_margin=”|||” custom_padding=”5px||5px||true|false” custom_padding_tablet=”|||” custom_padding_phone=”|||” custom_padding_last_edited=”off|desktop” title_font_tablet=”” title_font_phone=”” title_font_last_edited=”on|desktop” title_font_size_tablet=”” title_font_size_phone=”26px” title_font_size_last_edited=”on|phone” content_font_size_tablet=”” content_font_size_phone=”16px” content_font_size_last_edited=”on|phone” button_one_text_size_last_edited=”off|desktop” button_two_text_size_tablet=”” button_two_text_size_phone=”” button_two_text_size_last_edited=”on|desktop” button_one_border_color_hover=”#ff8a3d” button_one_border_radius_hover=”100px” button_one_letter_spacing_hover=”5px” button_one_bg_color_hover=”#ff8a3d” global_colors_info=”{}” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_one_border_color__hover_enabled=”on” button_one_border_color__hover=”#ff8a3d” button_two_border_color__hover_enabled=”off” button_one_border_radius__hover_enabled=”on” button_one_border_radius__hover=”100px” button_two_border_radius__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”on” button_one_letter_spacing__hover=”5px” button_two_letter_spacing__hover_enabled=”off” button_one_bg_color__hover_enabled=”on” button_one_bg_color__hover=”#ff8a3d” button_two_bg_color__hover_enabled=”off”]
Stephane Nappo
Global Head of Information Security
Societe Generale International Banking
[/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.21.0″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#3122b2 0%|#00ffd8 100%” background_color_gradient_start=”#3122b2″ background_color_gradient_end=”#00ffd8″ background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-17.png” z_index=”10″ overflow-x=”visible” overflow-y=”visible” custom_margin=”80px||||false|false” custom_padding=”||10vw|||” da_disable_devices=”off|off|off” global_module=”465″ saved_tabs=”all” locked=”off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”4.21.0″ background_color=”#ffffff” custom_margin=”-100px|auto|-2px|auto|false|false” custom_padding=”0px||0px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”40px” box_shadow_blur=”60px” box_shadow_spread=”-8px” box_shadow_color=”rgba(10,45,97,0.48)” locked=”off” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ custom_padding=”60px|40px|60px|40px|true|true” global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ header_2_font=”Roboto Slab|300|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
Contact Us
[/et_pb_text][et_pb_blurb title=”(+91) 91406 56178″ use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_align=”left” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”][/et_pb_blurb][et_pb_blurb title=”connect@bitwiseinfosystems.in ” use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_align=”left” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”][/et_pb_blurb][et_pb_blurb title=”Raheja Vista Premier, cloud Nine, NIBM ROAD Pune – 411060, Maharashtra-India ” use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.21.0″ header_font=”Roboto Slab||||||||” header_text_align=”left” header_font_size=”16px” header_line_height=”1.4em” body_font=”Roboto Slab||||||||” body_line_height=”1.8em” icon_font_size=”24px” locked=”off” global_colors_info=”{}”]
Monday-Friday: 9:00am – 6:00pm
[/et_pb_blurb][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00f6ff 0%|#00ffbf 100%” background_color_gradient_start=”#00f6ff” background_color_gradient_end=”#00ffbf” background_image=”https://bitwiseinfosystems.in/wp-content/uploads/2023/05/cyber-security-010-1.png” background_size=”contain” background_position=”bottom_left” transform_translate_linked=”off” custom_padding=”60px|40px|60px|20%|true” custom_padding_tablet=”80px|||40px” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” background_last_edited=”on|desktop” background_image_tablet=”http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-11.png” background_enable_image_tablet=”on” background_position_tablet=”top_left” global_colors_info=”{}”][et_pb_text _builder_version=”4.21.0″ text_font=”||||||||” header_2_font=”Roboto Slab|300|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” text_orientation=”center” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” text_text_align=”center” locked=”off” global_colors_info=”{}”]
Get Started
[/et_pb_text][et_pb_text _builder_version=”4.21.0″ text_font=”Roboto Slab|300|||||||” text_text_color=”#000000″ text_font_size=”16px” text_line_height=”1.8em” text_orientation=”center” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]
We offer a range of Cyber Security Services to help you stay secure in today’s digital landscape.
[/et_pb_text][et_pb_button button_url=”https://9f88040c.sibforms.com/serve/MUIEAITEVwFdx8qdeg3NtOcGkKTrrkm_qn_LtBUsLB_WF80jMsaTLqikoccVzidIiaQsWLUQ3_5G_I_BliUFfHYaQtuKzQpoqGcKoNdjuoA-Q6AZkxz-WhCbYmBtAUH1bmHzoYuEsbOU1JUk-iGf_GnqQ3o6uI1FfDwfFev6we2JpxJ-aaN5DWyGQ6G4w4wRinEnwm0nBrDIy_ch” button_text=”Book Appointment” button_alignment=”center” _builder_version=”4.21.0″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]