{"id":3638,"date":"2025-12-08T08:00:14","date_gmt":"2025-12-08T08:00:14","guid":{"rendered":"https:\/\/dev.cloudengin.com\/?page_id=3638"},"modified":"2026-01-16T11:30:04","modified_gmt":"2026-01-16T11:30:04","slug":"security-3","status":"publish","type":"page","link":"https:\/\/www.cloudengin.com\/?page_id=3638","title":{"rendered":"Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3638\" class=\"elementor elementor-3638\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3daab90 e-flex e-con-boxed e-con e-parent\" data-id=\"3daab90\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7a39c01 elementor-widget elementor-widget-heading\" data-id=\"7a39c01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Google Cloud Platform<br>\n Security Services\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3ca974 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"e3ca974\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"banner-fixed-width pb30\">Detect, Investigate, and Mitigate cyberthreats with Advanced GCP Security Intelligence<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9eb3340 elementor-widget elementor-widget-button\" data-id=\"9eb3340\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-80b2a5f e-flex e-con-boxed e-con e-parent\" data-id=\"80b2a5f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c674e90 e-con-full e-flex e-con e-child\" data-id=\"c674e90\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c1dccb0 elementor-widget elementor-widget-heading\" data-id=\"c1dccb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CloudEngin Cybersecurity Management on GCP: A Fail-proof Roadmap to a Resilient, Intelligent Enterprise Future<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-efece7d e-con-full e-flex e-con e-child\" data-id=\"efece7d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e7b7ac elementor-widget elementor-widget-text-editor\" data-id=\"4e7b7ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><div id=\"cybersecurity-auditing\" class=\"row pb40 pb15-m\"><div class=\"col-md-7\"><div class=\"row pb30\"><div class=\"col-md-6\"><div id=\"cyber-threat\" class=\"row pb40 pb15-m\"><div class=\"col-md-6\"><div class=\"row pb40\"><div class=\"col-md-7\"><div id=\"cloud4c-intel\" class=\"row pb50\"><div class=\"col-md-7\"><div class=\"row pb30\"><div class=\"col-md-12 text-center\"><div id=\"Business-Continuity-Azure-Cloud\" class=\"row pb50\"><div class=\"col-md-7\"><div class=\"col-left col-lg-6\"><p>The story dates to roughly a year prior. Sundar Pichai, the CEO of Google and Alphabet (the former\u2019s parent company), went vocal on the necessity of AI Ethics and AI Regulations &#8211; a bold statement from an organization serving as the hotspot of the global AI revolution. However, if drilled deeper, the sentiment could well be connected to AI\u2019s proliferating applications in the cybersecurity domain. Quite similar to the arms race a century back, organizations (private and public) should collaborate and thrust ahead on developing compliant, well-regulated advanced AI solutions before cybercriminals succeed in achieving the powerful opposite. Data is the new oil and the reason for this modern global tussle. And, as highlighted on the stat above, most companies are on the receiving end of this tussle between large tech giants and sneaky cybercriminals.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-61dfd78 e-con-full e-flex e-con e-child\" data-id=\"61dfd78\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-eda6b98 e-con-full e-flex e-con e-child\" data-id=\"eda6b98\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dbd1a6a elementor-widget elementor-widget-text-editor\" data-id=\"dbd1a6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><p>This demands fast adoption of advanced, intelligent cybersecurity solutions worldwide and cloud security could well be that answer. Leading cloud providers such as Google Cloud Platform (GCP) have been investing billions to bolster enterprise security end-to-end: backend IT infra, computing devices, network, storage and data, workloads and workflows, datacenters, software platforms and architectures, business applications, Google Workspace, edge and end-point networks, IoT environments, etc. To facilitate seamless adoption of such cloud security advancements hence, managed security vendors like CloudEngin have been the necessary bridge between cloud providers and end firms.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5af7f4d e-con-full e-flex e-con e-child\" data-id=\"5af7f4d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e0462ec elementor-widget elementor-widget-text-editor\" data-id=\"e0462ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"row card-white--full-height\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"\"><div class=\"row row card-white--full-height pb50-d\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"Google-CAF\"><div class=\"row pb0 card-white--full-height\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div class=\"row card-white--full-height\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><p>As the world\u2019s largest application-focused managed cloud service provider commanding dedicated global expertise in cloud cybersecurity management, CloudEngin is poised to be the ideal partner to secure IT on Google cloud. Shield assets end-to-end with advanced automation and cloud-native security solutions, data encryption keys, intelligent threat protection, compliant-ready cloud architectures, and 24\/7 managed SOC support on GCP according to best security practices.<\/p><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2f7378c e-flex e-con-boxed e-con e-parent\" data-id=\"2f7378c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c2f89d elementor-widget elementor-widget-heading\" data-id=\"7c2f89d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity on Google Cloud: \nMaximum Protection, Maximized ROI<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28d122f e-con-full e-flex e-con e-child\" data-id=\"28d122f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-331afec e-con-full e-flex e-con e-child\" data-id=\"331afec\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c1a03fb e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"c1a03fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"203031547\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-2030315471\" data-tab-title-id=\"e-n-tab-title-2030315471\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-2030315471\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tVisibility and Managed Service\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2030315472\" data-tab-title-id=\"e-n-tab-title-2030315472\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2030315472\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tEnvironment Complexity\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2030315473\" data-tab-title-id=\"e-n-tab-title-2030315473\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2030315473\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tPlatform Reliability\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2030315474\" data-tab-title-id=\"e-n-tab-title-2030315474\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2030315474\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tCosts Management\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2030315475\" data-tab-title-id=\"e-n-tab-title-2030315475\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2030315475\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tCompliance\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2030315476\" data-tab-title-id=\"e-n-tab-title-2030315476\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2030315476\" style=\"--n-tabs-title-order: 6;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tResource Management\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2030315477\" data-tab-title-id=\"e-n-tab-title-2030315477\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2030315477\" style=\"--n-tabs-title-order: 7;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tIncident Management\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2030315478\" data-tab-title-id=\"e-n-tab-title-2030315478\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"8\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2030315478\" style=\"--n-tabs-title-order: 8;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAccess Control\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2030315479\" data-tab-title-id=\"e-n-tab-title-2030315479\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"9\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2030315479\" style=\"--n-tabs-title-order: 9;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tOutdated Policies\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-20303154710\" data-tab-title-id=\"e-n-tab-title-20303154710\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"10\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-20303154710\" style=\"--n-tabs-title-order: 10;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAsset Monitoring and Protections\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-20303154711\" data-tab-title-id=\"e-n-tab-title-20303154711\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"11\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-20303154711\" style=\"--n-tabs-title-order: 11;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tSupport and Governance\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-20303154712\" data-tab-title-id=\"e-n-tab-title-20303154712\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"12\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-20303154712\" style=\"--n-tabs-title-order: 12;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAI Capabilities\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-2030315471\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2030315471\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-3fb9eb9 e-con-full e-flex e-con e-child\" data-id=\"3fb9eb9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-989de0c e-flex e-con-boxed e-con e-child\" data-id=\"989de0c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8cb6845 elementor-widget elementor-widget-image\" data-id=\"8cb6845\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/cloud-computing-lg-rfs4hnqodw8mafj6uy01i93v5vd8mp1yeoj0d86nq8.jpg\" title=\"cloud-computing-lg\" alt=\"cloud-computing-lg\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b98825 elementor-widget elementor-widget-heading\" data-id=\"3b98825\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Visibility and Managed Service<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48b419f elementor-widget elementor-widget-text-editor\" data-id=\"48b419f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Scale operations securely with super visibility and control on GCP. Gain centralized GCP managed cybersecurity services or GCP cybersecurity-as-a-service and risk management visibility over your IaaS, PaaS, SaaS, CaaS environments. Avail automated alerting for any internal-external risks. Leverage the Cloud Console for end-to-end managing and monitoring of assets and applications, Cloud Armor for security policies and defense against cyber attacks, and Security Command Center to gain a comprehensive platform to defend\/protect Google Cloud Assets. Leverage Cloud Identity to universally manage, monitor, and defend user devices and applications.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2030315472\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2030315472\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-3597c08 e-con-full e-flex e-con e-child\" data-id=\"3597c08\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3be4028 e-flex e-con-boxed e-con e-child\" data-id=\"3be4028\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a409cf5 elementor-widget elementor-widget-image\" data-id=\"a409cf5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/f27448bbd415983fe5003f9810eaad5c-1-rft7ha6hxlozbwowoo27v1xddl34vfcapyzda70o80.jpg\" title=\"f27448bbd415983fe5003f9810eaad5c\" alt=\"f27448bbd415983fe5003f9810eaad5c\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ecdd54 elementor-widget elementor-widget-heading\" data-id=\"3ecdd54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Environment Complexity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-850f6e3 elementor-widget elementor-widget-text-editor\" data-id=\"850f6e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Avail flexible, highly scalable, and agile security platforms and solutions on GCP catering to any IT environment or resources, software, backend, workload, applications, networks, edge and IoT environments, and more. Leverage Access Transparency, Chronicle, Cloud Key Management, Cloud Asset Inventory, Cloud Data Loss Prevention, Cloud Key Management, Firewalls, Google Cloud Audit Logging, StackDriver, Google IAM Recommender, Shielded VMs, VPC Service Controls, Network Telemetry, Cloud Armor, Apigee API Management, Cloud Console, Network Intelligence Center, Kubernetes Monitoring, Cloud Identity, Policy Intelligence, Chronicle, Web Risk, Titan Security Key, Cloud Identity, IAM, etc.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2030315473\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2030315473\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-ba228a0 e-con-full e-flex e-con e-child\" data-id=\"ba228a0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-24371e3 e-flex e-con-boxed e-con e-child\" data-id=\"24371e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a2cdbc7 elementor-widget elementor-widget-image\" data-id=\"a2cdbc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/scale_1200-rfs21m6w8jpqtbf4yvy1ygxk2lbjnbj2awpq46q6jk.jpg\" title=\"scale_1200\" alt=\"scale_1200\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa4792f elementor-widget elementor-widget-heading\" data-id=\"fa4792f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Platform Reliability<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37aa1ad elementor-widget elementor-widget-text-editor\" data-id=\"37aa1ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Enjoy breakthrough reliability via integration of advanced information security and computing solutions on the Google Cloud Platform. Adhere to modernized security frameworks and policies and protect your business with ease. Streamline access management across all resources with Access Transparency and Binary Authorization, elastic and telemetry security with Chronicle, monitor assets with Cloud Asset Inventory, prevent data risks with Cloud Data Loss Prevention, manage data and key encryption with Cloud Key Management and Confidential Computing, protect sensitive information with VPC Service Controls, administer firewalls with Firewalls manager, Identity Management with Secrets Manager and Cloud Identity, app Identity Management with Identity Platform, prevent malicious attacks with WebRisks<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2030315474\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2030315474\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-69eef14 e-con-full e-flex e-con e-child\" data-id=\"69eef14\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-0e8a36a e-flex e-con-boxed e-con e-child\" data-id=\"0e8a36a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4c2490 elementor-widget elementor-widget-image\" data-id=\"e4c2490\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/shutterstock_564045061-rfs20uxkqcofgmiqe25vg5t6uf1wg3iuj5sn75ulk0.jpg\" title=\"shutterstock_564045061\" alt=\"shutterstock_564045061\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f302623 elementor-widget elementor-widget-heading\" data-id=\"f302623\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Costs Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a7ac33 elementor-widget elementor-widget-text-editor\" data-id=\"8a7ac33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Eliminate the need for dedicated hardware and IT infra to handle security and risk management queries. With all IT assets secured on the Google cloud, reduce administrative overheads and pay for only what you utilize. Continuously audit GCP resources to optimize future compliance, risk assessment mishaps, and costs with dedicated GCP Cost Management Tools. Avail fast, cost-effective, and automated Disaster Recovery on Google Cloud Platform<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2030315475\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2030315475\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-cafc6b6 e-flex e-con-boxed e-con e-child\" data-id=\"cafc6b6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c1f35b0 e-con-full e-flex e-con e-child\" data-id=\"c1f35b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd070fe elementor-widget elementor-widget-image\" data-id=\"fd070fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/18780c9592f96ee8359e6fcd2a2666d8-rfuc33skn0th87b9o1rt3o1bp5y6phoc1bl0wxk5gg.png\" title=\"18780c9592f96ee8359e6fcd2a2666d8\" alt=\"18780c9592f96ee8359e6fcd2a2666d8\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cae28a elementor-widget elementor-widget-heading\" data-id=\"6cae28a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Compliance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7bed26 elementor-widget elementor-widget-text-editor\" data-id=\"a7bed26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel4\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel4\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel4\" class=\"collapsible-tabs-panel js-panel\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel4\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><p>Compliant-ready Google cloud security architecture including local, national, and global compliance-regulatory standards. Embrace compliant-ready security architectures enabled with constant compliance checks and auditing. Avail Policy Intelligence to gain smart access control management, understand and manage policies better, and integrate key automation technologies. Lay hands on Sole-tenant Nodes &#8211; dedicated hardware for compliance, licensing, and management. Utilize Assured Workloads for compliance and security controls for sensitive workloads. Leverage Binary Authorization to deploy only trusted containers and security need-based policies on the Kubernetes Engine.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-compliance-management-SIEMpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alert-management-ManagedSOCpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alert-management-ManagedSOCpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/threat-monitoring-ManagedSOCpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2030315476\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2030315476\" data-tab-index=\"6\" style=\"--n-tabs-title-order: 6;\" class=\" elementor-element elementor-element-0e26018 e-con-full e-flex e-con e-child\" data-id=\"0e26018\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-90d0ae7 e-con-full e-flex e-con e-child\" data-id=\"90d0ae7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2040222 elementor-widget elementor-widget-image\" data-id=\"2040222\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/risk-management33-1-rft7hdxuoxu4mcjg2poq50z7r4klq7r82hlb7av3j4.jpg\" title=\"risk management33\" alt=\"risk management33\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26417d1 elementor-widget elementor-widget-heading\" data-id=\"26417d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Resource Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2235804 elementor-widget elementor-widget-text-editor\" data-id=\"2235804\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Automated Google cloud security services and solutions for constant monitoring, proactive maintenance, and risk alerting reduce the need for dedicated manhours. Administer global organizational security with ease and next to nil manual interventions for redundant tasks. Explore solutions such as Cloud Console, Network Intelligence Center, Network Telemetry, Cloud Asset Inventory, Assured Workloads, etc.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2030315477\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2030315477\" data-tab-index=\"7\" style=\"--n-tabs-title-order: 7;\" class=\" elementor-element elementor-element-90ad9b6 e-con-full e-flex e-con e-child\" data-id=\"90ad9b6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-14f09bf e-con-full e-flex e-con e-child\" data-id=\"14f09bf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cb71d9 elementor-widget elementor-widget-image\" data-id=\"4cb71d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/ZxAwGYF3NbkBXmm-_peopleatlongmeetingtable-rftyktyd0j5ayhnh5urz6dkod2q8mj7d6hq33mk8f4.jpeg\" title=\"ZxAwGYF3NbkBXmm-_peopleatlongmeetingtable\" alt=\"ZxAwGYF3NbkBXmm-_peopleatlongmeetingtable\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6352c27 elementor-widget elementor-widget-heading\" data-id=\"6352c27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Incident Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34e1643 elementor-widget elementor-widget-text-editor\" data-id=\"34e1643\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Significantly reduce mean time to detection and mean time to repair with Advanced Managed Detection and Response on Google cloud. Embed advanced, AI-enabled threat hunting, automated response management. Gain in-depth incident analysis for data-enriched security decision-making. Discover, explore, encrypt, and protect sensitive data with Cloud Data Loss Prevention, Cloud Key Management, Confidential Computing, Secret Manager, etc. Adopt Virtual Machines in-built with advanced security controls in Shielded VMs. Utilize Chronicle to monitor assets and find threats instantly. Avail fast, automated Disaster Recovery.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2030315478\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2030315478\" data-tab-index=\"8\" style=\"--n-tabs-title-order: 8;\" class=\" elementor-element elementor-element-d6861fa e-con-full e-flex e-con e-child\" data-id=\"d6861fa\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-a61f987 e-con-full e-flex e-con e-child\" data-id=\"a61f987\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9137b5c elementor-widget elementor-widget-image\" data-id=\"9137b5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/i-rftkeump0h0ruuff3euwd2hhn4d0eem4ebi9j2psbk.jpg\" title=\"i\" alt=\"i\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76c3528 elementor-widget elementor-widget-heading\" data-id=\"76c3528\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Access Control<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b4a79d elementor-widget elementor-widget-text-editor\" data-id=\"0b4a79d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Assess security and architecture access roles along with the entire organization with ease on GCP. Leverage the intuitive GCP Incident and Access Management (IAM) and Privileged User Access Management (PAM) to assign definite roles and administer functionalities across the security workflows. Gain access visibility and management with Access Transparency, Assured Workloads, etc. Manage access to applications and infra based on user identity and context with Context-aware Access. Implement Zero Trust Security Model. Manage Identity and Access on cloud with Cloud Identity, Identity Platform, Identity-aware Proxy, Google IAM, etc.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2030315479\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2030315479\" data-tab-index=\"9\" style=\"--n-tabs-title-order: 9;\" class=\" elementor-element elementor-element-e9c4915 e-con-full e-flex e-con e-child\" data-id=\"e9c4915\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-84e800c e-con-full e-flex e-con e-child\" data-id=\"84e800c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1be288e elementor-widget elementor-widget-image\" data-id=\"1be288e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/esnek-calismanin-detaylari-ortaya-cikti-18281085_9184_amp-1-rft7hgrd9fxzl6fcm8wlui9lja6pdb2f2vjrn4qx0g.webp\" title=\"esnek-calismanin-detaylari-ortaya-cikti-18281085_9184_amp\" alt=\"esnek-calismanin-detaylari-ortaya-cikti-18281085_9184_amp\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-467d5bb elementor-widget elementor-widget-heading\" data-id=\"467d5bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Outdated Policies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed7c456 elementor-widget elementor-widget-text-editor\" data-id=\"ed7c456\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel js-panel\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel js-panel\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><p>Move over from outdated cybersecurity policies. With IT assets on the Google cloud, embrace world-class methodologies, solutions, and frameworks: SIEM-SOAR, MITRE ATT&amp;CK, CIS Security Controls, Zero Trust, etc. Leverage advanced GCP native security tools and solutions such as Chronicle, Binary Authorization, Apigee API Management, Firewalls, Secret Manager, Cloud Data Loss Prevention, Web Risks, Cloud Asset Inventory, Cloud Key Management, and more.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-threat-detection-SIEMpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-log-management-ManagedSOCpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alert-management-ManagedSOCpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/threat-monitoring-ManagedSOCpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-20303154710\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-20303154710\" data-tab-index=\"10\" style=\"--n-tabs-title-order: 10;\" class=\" elementor-element elementor-element-1cbcb66 e-con-full e-flex e-con e-child\" data-id=\"1cbcb66\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-16db2e1 e-con-full e-flex e-con e-child\" data-id=\"16db2e1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9295633 elementor-widget elementor-widget-image\" data-id=\"9295633\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/7xjQ2_1715002146_826-rft7k1te21hdiko6iv4o7cs8cfg1jcbufo4u5iwxwg.jpeg\" title=\"7xjQ2_1715002146_826\" alt=\"7xjQ2_1715002146_826\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18bbe13 elementor-widget elementor-widget-heading\" data-id=\"18bbe13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Asset Monitoring and Protections<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-083bad0 elementor-widget elementor-widget-text-editor\" data-id=\"083bad0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel js-panel\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel js-panel\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><p>Gain 24\/7 monitoring on your devices, data, networks, platforms, applications, VMs or virtual systems, servers, etc on GCP. Achieve unprecedented security over your entire backend and endpoint architectures. Track assets with embedded alerts, AM-ML-Behaviour Analytics, cloud-native cybersecurity tools Cloud Console, Network Intelligence Center, Network Telemetry, Cloud Asset Inventory, Assured Workloads, Kubernetes Engine Monitoring, Firewalls, Cloud Identity, and more<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-threat-detection-SIEMpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-log-management-ManagedSOCpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alert-management-ManagedSOCpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/threat-monitoring-ManagedSOCpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-20303154711\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-20303154711\" data-tab-index=\"11\" style=\"--n-tabs-title-order: 11;\" class=\" elementor-element elementor-element-62955dd e-con-full e-flex e-con e-child\" data-id=\"62955dd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-098631c e-con-full e-flex e-con e-child\" data-id=\"098631c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ebd5530 elementor-widget elementor-widget-image\" data-id=\"ebd5530\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/services_cert_system-1-rft7hd00i3suaqkt87a3kj7r5qp8iinhqcxtq0whpc.webp\" title=\"services_cert_system\" alt=\"services_cert_system\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd39925 elementor-widget elementor-widget-heading\" data-id=\"cd39925\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Support and Governance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8e9add elementor-widget elementor-widget-text-editor\" data-id=\"c8e9add\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The dedicated Google Cloud Security Operations Centre (SOC) team adheres to all your cybersecurity monitoring, management, governance woes 24\/7. Leverage one of the largest ecosystems of security partners, solutions with GCP. Leverage the Google Security Command Center for defending all GCP assets and the Risk Protection Program to gain access to an exclusive cybersecurity management and insurance program.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-20303154712\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-20303154712\" data-tab-index=\"12\" style=\"--n-tabs-title-order: 12;\" class=\" elementor-element elementor-element-7b2cea9 e-con-full e-flex e-con e-child\" data-id=\"7b2cea9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-a5dbdd4 e-con-full e-flex e-con e-child\" data-id=\"a5dbdd4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45e6e53 elementor-widget elementor-widget-image\" data-id=\"45e6e53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/image_1816502999-rfwas7glpsvde6es26luff4g01gshtjxyemsgrwtr4.jpg\" title=\"image_1816502999\" alt=\"image_1816502999\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03c899c elementor-widget elementor-widget-heading\" data-id=\"03c899c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">AI Capabilities<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed46d95 elementor-widget elementor-widget-text-editor\" data-id=\"ed46d95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel js-panel\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel js-panel\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"Benefits\" class=\"services\"><div class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs align-items-center\"><div class=\"collapsible-tabs-content \"><div id=\"v-panel11\" class=\"collapsible-tabs-panel js-panel\"><div class=\"d-flex h-100 align-items-center justify-content-around\"><div class=\"collapsible-tabs-text\"><p>Integrate advanced threat intelligence powered by industry-leading platforms such as Microsoft, OSINT, STI&amp;TAXI, MISP, etc. With advanced Google Cloud security services capabilities, adopt smart threat hunting, deep cybersecurity analytics, predictive alerting, and preventive maintenance through proprietary AI-driven automation solutions.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"Responsibility-Model\" class=\"row pb50\"><div class=\"col-md-5\">\u00a0<\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-threat-detection-SIEMpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-log-management-ManagedSOCpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alert-management-ManagedSOCpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/threat-monitoring-ManagedSOCpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8d17daf e-flex e-con-boxed e-con e-parent\" data-id=\"8d17daf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3c8bcc9 e-con-full e-flex e-con e-child\" data-id=\"3c8bcc9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-426cc9e elementor-widget elementor-widget-heading\" data-id=\"426cc9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CloudEngin Cybersecurity Management on GCP: A Fail-proof Roadmap to a Resilient, Intelligent Enterprise Future<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a415cdb e-con-full e-flex e-con e-child\" data-id=\"a415cdb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1cd66ff elementor-widget elementor-widget-text-editor\" data-id=\"1cd66ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><div id=\"cybersecurity-auditing\" class=\"row pb40 pb15-m\"><div class=\"col-md-7\"><div class=\"row pb30\"><div class=\"col-md-6\"><div id=\"cyber-threat\" class=\"row pb40 pb15-m\"><div class=\"col-md-6\"><div class=\"row pb40\"><div class=\"col-md-7\"><div id=\"cloud4c-intel\" class=\"row pb50\"><div class=\"col-md-7\"><div class=\"row pb30\"><div class=\"col-md-12 text-center\"><div id=\"Business-Continuity-Azure-Cloud\" class=\"row pb50\"><div class=\"col-md-7\"><div class=\"col-left col-lg-6\"><p>The story dates to roughly a year prior. Sundar Pichai, the CEO of Google and Alphabet (the former\u2019s parent company), went vocal on the necessity of AI Ethics and AI Regulations &#8211; a bold statement from an organization serving as the hotspot of the global AI revolution. However, if drilled deeper, the sentiment could well be connected to AI\u2019s proliferating applications in the cybersecurity domain. Quite similar to the arms race a century back, organizations (private and public) should collaborate and thrust ahead on developing compliant, well-regulated advanced AI solutions before cybercriminals succeed in achieving the powerful opposite. Data is the new oil and the reason for this modern global tussle. And, as highlighted on the stat above, most companies are on the receiving end of this tussle between large tech giants and sneaky cybercriminals.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b8099a7 e-con-full e-flex e-con e-child\" data-id=\"b8099a7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-1f1900e e-con-full e-flex e-con e-child\" data-id=\"1f1900e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-740ceba e-con-full e-flex e-con e-child\" data-id=\"740ceba\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7de3169 elementor-widget elementor-widget-heading\" data-id=\"7de3169\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Client Responsibility\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b7e447b e-con-full e-flex e-con e-child\" data-id=\"b7e447b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-238b4b1 elementor-widget elementor-widget-heading\" data-id=\"238b4b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">GCP and CloudEngin Responsibility\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b0d8f7 e-con-full e-flex e-con e-child\" data-id=\"7b0d8f7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88ab7dd elementor-widget elementor-widget-heading\" data-id=\"88ab7dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">IaaS Security\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c0c96c1 e-con-full e-flex e-con e-child\" data-id=\"c0c96c1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d7dc31c elementor-widget elementor-widget-text-editor\" data-id=\"d7dc31c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><div id=\"cybersecurity-auditing\" class=\"row pb40 pb15-m\"><div class=\"col-md-7\"><div class=\"row pb30\"><div class=\"col-md-6\"><div id=\"cyber-threat\" class=\"row pb40 pb15-m\"><div class=\"col-md-6\"><div class=\"row pb40\"><div class=\"col-md-7\"><div id=\"cloud4c-intel\" class=\"row pb50\"><div class=\"col-md-7\"><div class=\"row pb30\"><div class=\"col-md-12 text-center\"><div id=\"Business-Continuity-Azure-Cloud\" class=\"row pb50\"><div class=\"col-md-7\"><div class=\"col-left col-lg-6\"><ul class=\"bulleted-list\"><li>Content<\/li><li>Access policies<\/li><li>Usage<\/li><li>Deployment<\/li><li>Web application security<\/li><li>Identity<\/li><li>Operations<\/li><li>Access &amp; authentications<\/li><li>Network security<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d8a7dc e-con-full e-flex e-con e-child\" data-id=\"5d8a7dc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6653c1e elementor-widget elementor-widget-text-editor\" data-id=\"6653c1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row row-with-title equal-height-parent-1\"><div class=\"col-md-5 col-6\"><div class=\"card-text bg-light-gray p-25-d p-10-m equal-height bg-white\"><div class=\"card-list\"><ul class=\"bulleted-list\"><li>Guest OS, data &amp; content<\/li><li>Audit logging<\/li><li>Network<\/li><li>Storage + encryption<\/li><li>Hardened Kernel + IPC<\/li><li>Boot<\/li><li>Hardware<\/li><\/ul><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3651267 e-con-full e-flex e-con e-child\" data-id=\"3651267\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f09263 elementor-widget elementor-widget-heading\" data-id=\"2f09263\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PaaS Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bfe11dc e-con-full e-flex e-con e-child\" data-id=\"bfe11dc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9134fc7 elementor-widget elementor-widget-text-editor\" data-id=\"9134fc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><div id=\"cybersecurity-auditing\" class=\"row pb40 pb15-m\"><div class=\"col-md-7\"><div class=\"row pb30\"><div class=\"col-md-6\"><div id=\"cyber-threat\" class=\"row pb40 pb15-m\"><div class=\"col-md-6\"><div class=\"row pb40\"><div class=\"col-md-7\"><div id=\"cloud4c-intel\" class=\"row pb50\"><div class=\"col-md-7\"><div class=\"row pb30\"><div class=\"col-md-12 text-center\"><div id=\"Business-Continuity-Azure-Cloud\" class=\"row pb50\"><div class=\"col-md-7\"><div class=\"col-left col-lg-6\"><ul class=\"bulleted-list\"><li>Content<\/li><li>Access policies<\/li><li>Usage<\/li><li>Deployment<\/li><li>Web application<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3237ee3 e-con-full e-flex e-con e-child\" data-id=\"3237ee3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9339c11 elementor-widget elementor-widget-text-editor\" data-id=\"9339c11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><div id=\"cybersecurity-auditing\" class=\"row pb40 pb15-m\"><div class=\"col-md-7\"><div class=\"row pb30\"><div class=\"col-md-6\"><div id=\"cyber-threat\" class=\"row pb40 pb15-m\"><div class=\"col-md-6\"><div class=\"row pb40\"><div class=\"col-md-7\"><div id=\"cloud4c-intel\" class=\"row pb50\"><div class=\"col-md-7\"><div class=\"row pb30\"><div class=\"col-md-12 text-center\"><div id=\"Business-Continuity-Azure-Cloud\" class=\"row pb50\"><div class=\"col-md-7\"><div class=\"col-left col-lg-6\"><ul class=\"bulleted-list\"><li>Identity<\/li><li>Operations<\/li><li>Access &amp; authentications<\/li><li>Network security<\/li><li>Guest OS, data &amp; content<\/li><li>Audit logging<\/li><li>Network<\/li><li>Storage + encryption<\/li><li>Hardened Kernel + IPC<\/li><li>Boot<\/li><li>Hardware<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-726ddf0 e-con-full e-flex e-con e-child\" data-id=\"726ddf0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a3b3ce elementor-widget elementor-widget-heading\" data-id=\"5a3b3ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SaaS Security\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-71d308a e-con-full e-flex e-con e-child\" data-id=\"71d308a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e46df5d elementor-widget elementor-widget-text-editor\" data-id=\"e46df5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><div id=\"cybersecurity-auditing\" class=\"row pb40 pb15-m\"><div class=\"col-md-7\"><div class=\"row pb30\"><div class=\"col-md-6\"><div id=\"cyber-threat\" class=\"row pb40 pb15-m\"><div class=\"col-md-6\"><div class=\"row pb40\"><div class=\"col-md-7\"><div id=\"cloud4c-intel\" class=\"row pb50\"><div class=\"col-md-7\"><div class=\"row pb30\"><div class=\"col-md-12 text-center\"><div id=\"Business-Continuity-Azure-Cloud\" class=\"row pb50\"><div class=\"col-md-7\"><div class=\"col-left col-lg-6\"><ul class=\"bulleted-list\"><li>Content<\/li><li>Access policies<\/li><li>Usage<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b2cfe45 e-con-full e-flex e-con e-child\" data-id=\"b2cfe45\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b534d85 elementor-widget elementor-widget-text-editor\" data-id=\"b534d85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><div id=\"cybersecurity-auditing\" class=\"row pb40 pb15-m\"><div class=\"col-md-7\"><div class=\"row pb30\"><div class=\"col-md-6\"><div id=\"cyber-threat\" class=\"row pb40 pb15-m\"><div class=\"col-md-6\"><div class=\"row pb40\"><div class=\"col-md-7\"><div id=\"cloud4c-intel\" class=\"row pb50\"><div class=\"col-md-7\"><div class=\"row pb30\"><div class=\"col-md-12 text-center\"><div id=\"Business-Continuity-Azure-Cloud\" class=\"row pb50\"><div class=\"col-md-7\"><div class=\"col-left col-lg-6\"><ul class=\"bulleted-list\"><li>Deployment<\/li><li>Web application Identity<\/li><li>Operations<\/li><li>Access &amp; authentications<\/li><li>Network security<\/li><li>Guest OS, data &amp; content<\/li><li>Audit logging<\/li><li>Network<\/li><li>Storage + encryption<\/li><li>Hardened Kernel + IPC<\/li><li>Boot<\/li><li>Hardware<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-57f9065 e-flex e-con-boxed e-con e-parent\" data-id=\"57f9065\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-00ddba1 elementor-widget elementor-widget-heading\" data-id=\"00ddba1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">End-to-end GCP Workload Security Management\n<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b9e84cc e-con-full e-flex e-con e-child\" data-id=\"b9e84cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b80d18 elementor-widget elementor-widget-image\" data-id=\"3b80d18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"323\" height=\"201\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/gcp-security-services-14.webp\" class=\"attachment-large size-large wp-image-3816\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/gcp-security-services-14.webp 323w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/gcp-security-services-14-300x187.webp 300w\" sizes=\"(max-width: 323px) 100vw, 323px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-93dd977 e-con-full e-flex e-con e-child\" data-id=\"93dd977\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3e526c5 e-con-full e-flex e-con e-child\" data-id=\"3e526c5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f8590f elementor-widget elementor-widget-text-editor\" data-id=\"8f8590f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Encryption<\/p><p>Asset and Data Classification<\/p><p>Data Discovery<\/p><p>Logging and Reporting<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-92879a9 e-con-full e-flex e-con e-child\" data-id=\"92879a9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-88eae74 e-con-full e-flex e-con e-child\" data-id=\"88eae74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-bc50ecd e-con-full e-flex e-con e-child\" data-id=\"bc50ecd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e7d14b0 elementor-widget elementor-widget-image\" data-id=\"e7d14b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"338\" height=\"200\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/gcp-security-services-15.webp\" class=\"attachment-large size-large wp-image-3817\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/gcp-security-services-15.webp 338w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/gcp-security-services-15-300x178.webp 300w\" sizes=\"(max-width: 338px) 100vw, 338px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a6ea86 e-con-full e-flex e-con e-child\" data-id=\"6a6ea86\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-97131e3 e-con-full e-flex e-con e-child\" data-id=\"97131e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-216fc1b elementor-widget elementor-widget-text-editor\" data-id=\"216fc1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Boundary Enforcement<\/p><p>Logical Segmentation<\/p><p>Configuration Hardening<\/p><p>Key Management<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ac1e9ea e-con-full e-flex e-con e-child\" data-id=\"ac1e9ea\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0f86426 e-con-full e-flex e-con e-child\" data-id=\"0f86426\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-58859bf elementor-widget elementor-widget-image\" data-id=\"58859bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"323\" height=\"200\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/gcp-security-services-16.webp\" class=\"attachment-large size-large wp-image-3818\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/gcp-security-services-16.webp 323w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/gcp-security-services-16-300x186.webp 300w\" sizes=\"(max-width: 323px) 100vw, 323px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0fa64eb e-con-full e-flex e-con e-child\" data-id=\"0fa64eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5930681 e-con-full e-flex e-con e-child\" data-id=\"5930681\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10aa168 elementor-widget elementor-widget-text-editor\" data-id=\"10aa168\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Authentication<\/p><p>Access Controls<\/p><p>Secondary Approval<\/p><p>User Behaviour Analytics<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d9511ba e-flex e-con-boxed e-con e-parent\" data-id=\"d9511ba\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b894976 e-con-full e-flex e-con e-child\" data-id=\"b894976\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42daf44 elementor-widget elementor-widget-heading\" data-id=\"42daf44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">In a Nutshell: CloudEngin End-to-end Managed GCP Security Services\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8db658e e-con-full e-flex e-con e-child\" data-id=\"8db658e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1dd801a elementor-widget elementor-widget-text-editor\" data-id=\"1dd801a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><div id=\"cybersecurity-auditing\" class=\"row pb40 pb15-m\"><div class=\"col-md-7\"><div class=\"row pb30\"><div class=\"col-md-6\"><div id=\"cyber-threat\" class=\"row pb40 pb15-m\"><div class=\"col-md-6\"><div class=\"row pb40\"><div class=\"col-md-7\"><div id=\"cloud4c-intel\" class=\"row pb50\"><div class=\"col-md-7\"><div class=\"row pb30\"><div class=\"col-md-12 text-center\"><div id=\"Business-Continuity-Azure-Cloud\" class=\"row pb50\"><div class=\"col-md-7\"><div class=\"col-left col-lg-6\"><div class=\"row pb50\"><div class=\"col-md-7\"><p>CloudEngin, the world\u2019s largest application-focused cloud managed services provider and one of the leading managed cybersecurity companies, has dedicated years of time and resources to develop a futuristic, highly intelligent end-to-end managed cybersecurity services and solutions bouquet for your assets: devices, networks, servers, applications, systems, workloads, virtual systems, and most importantly data. Gain complete protection of your enterprise IT assets including networks, data centers, dataflows, workloads and traffic load balancing, computing devices, email assets and applications, adopted technology and storage solutions, software, platforms, applications, edge networks, IoT environments on the cloud with advanced Google cloud security services capabilities and solutions.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58da039 e-con-full e-flex e-con e-child\" data-id=\"58da039\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-707b106 e-con-full e-flex e-con e-child\" data-id=\"707b106\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-044baa5 elementor-widget elementor-widget-text-editor\" data-id=\"044baa5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><p>Avail fully compliant, automated, and AI-powered platforms powered by the Google cloud to leverage the best of security and cybersecurity-as-a-service offerings in the market. Experience maximum cloud security benefits with GCP at minimal costs and integrate unique threat management frameworks. Leverage the advanced Google Cloud security services and solutions suite including Access Transparency, Chronicle, Cloud Key Management, Cloud Asset Inventory, Cloud Data Loss Prevention, Cloud Key Management, Firewalls, Google Cloud Audit Logging, StackDriver, Google IAM Recommender, Shielded VMs, VPC Service Controls, Network Telemetry, Cloud Armor, Apigee API Management, Cloud Console, Network Intelligence Center, Kubernetes Monitoring, Cloud Identity, Policy Intelligence, Chronicle, Web Risk, Titan Security Key, Cloud Identity, IAM, and much more.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-19ac22d e-con-full e-flex e-con e-child\" data-id=\"19ac22d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6cbcd0e elementor-widget elementor-widget-text-editor\" data-id=\"6cbcd0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"row card-white--full-height\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"\"><div class=\"row row card-white--full-height pb50-d\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"Google-CAF\"><div class=\"row pb0 card-white--full-height\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div class=\"row card-white--full-height\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><p>Gain 24\/7 automated monitoring, predictive alerting and deep analytics, and cybersecurity consulting services and support. Transform your entire security strategy with state-of-the-art cybersecurity methodologies and frameworks availing CloudEngin unique, AI-driven Managed Detection and Response (MDR) and Security Operations Centre (SOC) offerings on Google Cloud.<\/p><p>Guarantee uncompromised security, uninterrupted continuity, and unstoppable transformative growth with CloudEngin managed cybersecurity services. Deliver a disruption-proof service experience to end customers and users.<\/p><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ef41ff3 e-flex e-con-boxed e-con e-parent\" data-id=\"ef41ff3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2937387 e-con-full e-flex e-con e-child\" data-id=\"2937387\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee384ca elementor-widget__width-initial e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"ee384ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;stretch&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"249791690\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-2497916901\" data-tab-title-id=\"e-n-tab-title-2497916901\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-2497916901\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tEnd-to-end Infra Security<br> with GCP Managed<br> Cybersecurity-as-a-Service\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2497916902\" data-tab-title-id=\"e-n-tab-title-2497916902\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2497916902\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAdvanced Managed<br> Detection and Response<br> (MDR) on GCP\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2497916903\" data-tab-title-id=\"e-n-tab-title-2497916903\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2497916903\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tGCP Security Operations<br> \tCenter (SOC) Managed\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2497916904\" data-tab-title-id=\"e-n-tab-title-2497916904\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2497916904\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tIaaS Security<br> \ton GCP\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2497916905\" data-tab-title-id=\"e-n-tab-title-2497916905\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2497916905\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tPaaS Security<br> on GCP\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-2497916901\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2497916901\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-7e39097 e-con-full e-flex e-con e-child\" data-id=\"7e39097\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;triangle&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e25322f e-con-full e-flex e-con e-child\" data-id=\"e25322f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e07de1 elementor-widget elementor-widget-text-editor\" data-id=\"8e07de1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"chome\" class=\"tab-pane collapsible-tabs-panel active\" role=\"tabpanel\" aria-labelledby=\"chome-tab\"><div id=\"scenarioone\" class=\"tab-pane collapsible-tabs-panel active\" role=\"tabpanel\" aria-labelledby=\"scenarioone-tab\"><div id=\"htab-7\" class=\"tab-pane active\"><div id=\"htab-13\" class=\"tab-pane active\"><p>Avail end-to-end cloud managed cybersecurity services or cybersecurity as a service on Google cloud. CloudEngin provides comprehensive cloud security strategy, blueprinting, POC, and implementation services including hybrid multi-cloud security management. Experience complete protection of your enterprise IT assets including networks, data centers, dataflows, workloads, computing devices, storage solutions, software, platforms, applications, edge networks, IoT environments on GCP.<\/p><p>Surf through tailored solutions and requirements for assets monitoring and security, virtualization security, authentication, and access control management, data classification and segmentation, configuration hardening, key management, boundary enforcement, and more. Streamline access management across all resources with Access Transparency &#8211; Assured Workloads and Cloud Identity &amp; Access Management, elastic and telemetry security with Chronicle, monitor assets with Cloud Asset Inventory and Cloud Console, prevent data risks with Cloud Data Loss Prevention, manage data and key encryption with Cloud Key Management and Confidential Computing, protect sensitive information with VPC Service Controls, administer firewalls with Firewalls manager, Identity Management with Secrets Manager and Cloud Identity, app Identity Management with Identity Platform, prevent malicious attacks with WebRisks. Gain 24\/7 GCP cybersecurity consulting and support. Enhance asset DR management with the fast, automated solution on Google Cloud.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-434c11e e-con-full e-flex e-con e-child\" data-id=\"434c11e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3263e18 elementor-widget elementor-widget-text-editor\" data-id=\"3263e18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"chome\" class=\"tab-pane collapsible-tabs-panel active\" role=\"tabpanel\" aria-labelledby=\"chome-tab\"><div id=\"scenarioone\" class=\"tab-pane collapsible-tabs-panel active\" role=\"tabpanel\" aria-labelledby=\"scenarioone-tab\"><div id=\"htab-7\" class=\"tab-pane active\"><div id=\"htab-13\" class=\"tab-pane active\"><ul class=\"bulleted-list\"><li>GCP Security Services: Strategy and Blueprinting Services<\/li><li>Compliant Google Cloud Security Services Offerings<\/li><li>PaaS Security &#8211; Runtime protection, vulnerability management, Automatic configuration of security policies, network protection, secure endpoint<\/li><li>IaaS Security &#8211; Automated auditing and monitoring, Identity Access Management, Data and Infra protection, Vulnerability Management and File Integrity Monitoring, Micro-Segmentation, Automated Compliance Monitoring<\/li><li>CaaS Security &#8211; Managed Kubernetes security, container workload security management, CI\/CD Scanning, Container-to-container micro-segmentation, Access Controls, incident response, forensic analysis<\/li><li>SaaS Security &#8211; Network, platforms, systems, monitoring, and protection including firewalls, servers, emails, web applications<\/li><li>Cloud Workload Protection Platforms (CWPP) &#8211; VMs, Hosts, IaaS, PaaS, CaaS, SaaS, data<\/li><li>Cloud Security Posture Management (CSPM) &#8211; Multi-cloud security posture, Asset Inventory Management, Misconfiguration Monitoring, and Remediation, Compliance Monitoring and Reporting<\/li><li>Cloud Access Security Broker (CASB) &#8211; Overall visibility, Threat Protection, Data Security, Access Control Management<\/li><li>Hybrid\/Multi-cloud managed security services<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2497916902\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2497916902\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-7d5915e e-con-full e-flex e-con e-child\" data-id=\"7d5915e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;triangle&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-96f5876 e-con-full e-flex e-con e-child\" data-id=\"96f5876\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-44d1fa1 elementor-widget elementor-widget-text-editor\" data-id=\"44d1fa1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"chome\" class=\"tab-pane collapsible-tabs-panel active\" role=\"tabpanel\" aria-labelledby=\"chome-tab\"><div id=\"scenarioone\" class=\"tab-pane collapsible-tabs-panel active\" role=\"tabpanel\" aria-labelledby=\"scenarioone-tab\"><div id=\"htab-7\" class=\"tab-pane active\"><div id=\"htab-13\" class=\"tab-pane active\"><p>CloudEngin advanced Managed Detection and Response solution and services on Google cloud deliver 360-degree protection, smart automating 24\/7 real-time monitoring, threat hunting\/risk prediction alerting, threat detection, and risk mediation. Gain deeper vigilance of your infra assets including data, networks, workloads, traffic, devices with ease and avail end-to-end response management: Threat and Mal Containment, Incident Analysis, Data Exploration, Response Orchestration. Secure your end-point connectivity with AI-powered End-Point Protection and Response Platform powered by Google cloud. Leverage the Cloud Console for end-to-end managing and monitoring of assets and applications, Cloud Armor for security policies and defense against cyber attacks, and Security Command Center to gain a comprehensive platform to defend\/protect Google Cloud Assets. Utilize Cloud Identity to universally manage, monitor, and defend user devices and applications.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0f469b7 e-con-full e-flex e-con e-child\" data-id=\"0f469b7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8900550 elementor-widget elementor-widget-text-editor\" data-id=\"8900550\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"chome\" class=\"tab-pane collapsible-tabs-panel active\" role=\"tabpanel\" aria-labelledby=\"chome-tab\"><div id=\"scenarioone\" class=\"tab-pane collapsible-tabs-panel active\" role=\"tabpanel\" aria-labelledby=\"scenarioone-tab\"><div id=\"htab-7\" class=\"tab-pane active\"><div id=\"htab-13\" class=\"tab-pane active\"><ul class=\"bulleted-list\"><li>Network Traffic Analysis<\/li><li>Host based Security System (HBSS) &#8211; Real-time Monitoring and Protection of Assets on GCP: Hosts infra, web applications, apps, devices, servers, Virtual solutions, Databases, Storage infra, cloud platforms, integrated third-party systems<\/li><li>Next generation Firewall<\/li><li>Endpoint Detection and Response on GCP<\/li><li>Threat Hunting, Threat Investigation and Verification<\/li><li>Threat Research and Intelligence<\/li><li>AI\/ML, Data-powered User Behaviour Analytics<\/li><li>Data Protection and Forensics<\/li><li>Database Activity Monitoring (DAM)<\/li><li>MITRE ATT&amp;CK Mapping<\/li><li>Incident Containment, Analysis, Management<\/li><li>GCP native Security with Multicloud Support<\/li><li>Centralized Remote Response<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2497916903\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2497916903\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-ac2775a e-con-full e-flex e-con e-child\" data-id=\"ac2775a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;triangle&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1c2d30e e-con-full e-flex e-con e-child\" data-id=\"1c2d30e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a2f97cb elementor-widget elementor-widget-text-editor\" data-id=\"a2f97cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><p>Having an in-house, dedicated cybersecurity services monitoring and response team could be a huge expense for any organization. This not only deters cyber threat monitoring, detection, and remediation but also limits the organization\u2019s competency to adopt advanced security solutions and services. As an GCP-managed SOC (Security Operations Center) services provider, CloudEngin acts as an extended Cybersecurity Incident and Response Team (CSIRT) to your security management on Google cloud. The arrangement delivers the entire monitoring and threat management work with ease and assists your organization in the adoption of breakthrough cybersecurity frameworks, methodologies, and intelligent solutions backed on the Google cloud. Leverage the Google Security Command Center for defending all GCP assets and the Risk Protection Program to gain access to an exclusive cybersecurity management and insurance program.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bae52e6 e-con-full e-flex e-con e-child\" data-id=\"bae52e6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ead70e0 elementor-widget elementor-widget-text-editor\" data-id=\"ead70e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><ul class=\"bulleted-list\"><li>SIEM-SOAR<\/li><li>Reliable Security Engineering on GCP Expertise<\/li><li>Identity and Access Management and Privileged Access Management (PAM)<\/li><li>Advanced Threat Protection (ATP)<\/li><li>Assets Security Management: Data, Host, Networks, Apps, Virtualization, Emails, Workloads, Workflows<\/li><li>24\/7 Monitoring and Threat Response<\/li><li>Centralized security management console<\/li><li>Incident Recovery and Remediation<\/li><li>Log Collection and Management<\/li><li>Root Cause Analysis<\/li><li>Vulnerability Assessment, Management, and Preventive Maintenance<\/li><li>AI-powered Cybersecurity Solutions on GCP<\/li><li>Alert Management<\/li><li>Response Orchestration and Automation<\/li><li>Compliance Audits and Management<\/li><li>Reporting and Dashboarding<\/li><li>Advanced Penetration Testing<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2497916904\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2497916904\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-f27efa6 e-con-full e-flex e-con e-child\" data-id=\"f27efa6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;triangle&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d7784eb e-con-full e-flex e-con e-child\" data-id=\"d7784eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0b73f38 elementor-widget elementor-widget-text-editor\" data-id=\"0b73f38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><p>Modernization of backend infrastructure plays a considerable role in improving frontend experiences. However, preserving the security of all IaaS solutions including virtual networks, computing, storage, have, and more is paramount to seamless business continuity. Shift and secure your networks, datacenter assets including databases, compute, storage, and servers infra onto dedicated Google cloud solutions. Leverage special Google cloud-native applications, embrace virtualized GCP infrastructure with Shielded VMs to gain unprecedented agility and scalability of adopted enterprise applications without compromising asset security. Remove all backend physical infra hassles and pay for only what\u2019s utilized.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-87fb554 e-con-full e-flex e-con e-child\" data-id=\"87fb554\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7958f71 elementor-widget elementor-widget-text-editor\" data-id=\"7958f71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><ul class=\"bulleted-list\"><li>Automated auditing and monitoring<\/li><li>Identity Access Management<\/li><li>Data and Infra protection<\/li><li>Vulnerability Management and File Integrity Monitoring<\/li><li>Micro-Segmentation<\/li><li>Automated Compliance Monitoring<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2497916905\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2497916905\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-c509030 e-con-full e-flex e-con e-child\" data-id=\"c509030\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;triangle&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1bba201 e-con-full e-flex e-con e-child\" data-id=\"1bba201\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d6abb5 elementor-widget elementor-widget-text-editor\" data-id=\"7d6abb5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><p>With enterprises now increasingly opting for complex, multi-hybrid-private cloud IT environments, the universality of applications gets hampered. Businesses often fall prey to standalone systems and applications that work well for one backend platform or vertical but don\u2019t function for another adopted cloud environment for a different vertical. This leads to the non-synchronicity of operations and hence catastrophic risk possibilities that could be solved using a pay-as-you-use secure GCP PaaS platform. In addition to virtualizing and modernizing all core infra assets on the cloud, transition middleware, OS, architectures, protocols, APIs, libraries, Microservice modules, containers (Streamline Container Security with Binary Authorization) on GCP with utmost protection and zero disruptions. Leverage existing cloud-native platforms and GCP security architectures to develop, deploy, and run applications anywhere across any IT environment with maximum protection.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b66123 e-con-full e-flex e-con e-child\" data-id=\"6b66123\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-773c5dd elementor-widget elementor-widget-text-editor\" data-id=\"773c5dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><ul class=\"bulleted-list\"><li>Runtime protection<\/li><li>Vulnerability management<\/li><li>Automatic configuration of security policies<\/li><li>Network protection<\/li><li>Secure endpoint environments including IoT, Edge networks<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e0709e8 e-con-full e-flex e-con e-child\" data-id=\"e0709e8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-237e686 elementor-widget__width-initial e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"237e686\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;stretch&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"37217926\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-372179261\" data-tab-title-id=\"e-n-tab-title-372179261\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-372179261\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tApplication and<br> \tSaaS Security on \t<br>GCP\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-372179262\" data-tab-title-id=\"e-n-tab-title-372179262\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-372179262\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tCaaS Security on<br>GCP\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-372179263\" data-tab-title-id=\"e-n-tab-title-372179263\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-372179263\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tStorage and Data<br> \tSecurity on GCP\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-372179264\" data-tab-title-id=\"e-n-tab-title-372179264\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-372179264\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tNetwork Security<br>on GCP\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-372179265\" data-tab-title-id=\"e-n-tab-title-372179265\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-372179265\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tHybrid and<br> \tMulticloud Security<br>\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-372179261\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-372179261\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-3fa5d1f e-con-full e-flex e-con e-child\" data-id=\"3fa5d1f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;triangle&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ef76152 e-con-full e-flex e-con e-child\" data-id=\"ef76152\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c7c96f elementor-widget elementor-widget-text-editor\" data-id=\"3c7c96f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><p>To shield enterprises from the innumerable challenges and resultant risks of application development, maintenance, administration, and resultant data management, adoption of web applications or GCP SaaS applications have become the new norm. Assess application software codes, backend logic, architectures, and UI vulnerabilities with ease via dedicated Google cloud security solutions. CloudEngin helps a client surf through advanced GCP security services and solutions and embraces protected, compliant-ready SaaS enterprise applications that best fit immediate needs and future goals. The entire application lifecycle in terms of maintenance, security, upgrades, and asset management is administered by CloudEngin while the client leverages the functional benefits with ease. Leverage Web Risks to protect malicious activities on web applications, Apigee API Management for secure application development, and Secret Manager and VPC Controls to store and shield sensitive app information.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-41e92a2 e-con-full e-flex e-con e-child\" data-id=\"41e92a2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-01cc03c elementor-widget elementor-widget-text-editor\" data-id=\"01cc03c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><ul class=\"bulleted-list\"><li>Application network monitoring and security<\/li><li>Core platforms monitoring and protection<\/li><li>Backend application systems monitoring and protection<\/li><li>Analyze, govern, and manage firewalls, servers, emails, web applications<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-372179262\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-372179262\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-792f7eb e-con-full e-flex e-con e-child\" data-id=\"792f7eb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;triangle&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b2daad6 e-con-full e-flex e-con e-child\" data-id=\"b2daad6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a8c78d elementor-widget elementor-widget-text-editor\" data-id=\"5a8c78d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><p>Application modernization on the cloud has transformed enterprise operations across key verticals such as CRM, workflow management, supply chain management, compliance checking, financial audits, productions and manufacturing, IT administration, and more. To seamlessly achieve the same and administer applications and databases monitoring across multiple IT landscapes with ease, modern application development solutions are imperative &#8211; microservices, containers, functions. With CaaS security on GCP, gain cutting-edge protection over Docker or Kubernetes containers, streamline development workflow security, architecture scanning, access controls, and more. Leverage Binary Authorization to deploy only trusted containers on Kubernetes Engine, policy creation based on security needs, audit logging, and policy verification and enforcement.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58cb684 e-con-full e-flex e-con e-child\" data-id=\"58cb684\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ac8d7eb elementor-widget elementor-widget-text-editor\" data-id=\"ac8d7eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><ul class=\"bulleted-list\"><li>Managed Kubernetes security<\/li><li>Container workload security management<\/li><li>CI\/CD Scanning<\/li><li>Container-to-container micro-segmentation<\/li><li>Access Controls<\/li><li>Incident response<\/li><li>Forensic analysis<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-372179263\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-372179263\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-b4b2023 e-con-full e-flex e-con e-child\" data-id=\"b4b2023\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;triangle&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-68fe184 e-flex e-con-boxed e-con e-child\" data-id=\"68fe184\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b14ae6d elementor-widget elementor-widget-text-editor\" data-id=\"b14ae6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"chome\" class=\"tab-pane collapsible-tabs-panel active\" role=\"tabpanel\" aria-labelledby=\"chome-tab\"><div id=\"scenarioone\" class=\"tab-pane active collapsible-tabs-panel\" role=\"tabpanel\" aria-labelledby=\"scenarioone-tab\"><div id=\"htab-9\" class=\"tab-pane active\"><div id=\"htab-15\" class=\"tab-pane active\"><div id=\"htab-8\" class=\"tab-pane active\"><p>CloudEngin ensures military-grade data security during migration with end-to-end pre-backup, secure data transport, end-to-end encryption, data integrity management, thorough testing, and vulnerability assessment, and proper access management functionalities. Add extra layers of security to your GCP Storage solutions including files, blocks, objects, databases, database management software, etc. Monitor assets with Cloud Console and Cloud Asset Inventory, Manage access levels with Access Transparency and Context-aware Access, sensitive data inspection and administration with Cloud Data Loss Prevention, Data and key encryption with Cloud Key Management and Confidential Computing, and Secrets Manager to safely store hyper-sensitive data such as passwords, keys, etc. Avail 24\/7 Monitoring, Identity and Access Management with dedicated cloud-native tools such as GCP IAM, Cloud Identity, etc. Embed threat intelligence and move the needle further to predict, avoid risks even before they occur. Embrace game-changing preventive maintenance capabilities (Self-Healing Operations).<\/p><\/div><div id=\"htab-9\" class=\"tab-pane\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-372179264\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-372179264\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-8ded52a e-con-full e-flex e-con e-child\" data-id=\"8ded52a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;triangle&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-780e128 e-flex e-con-boxed e-con e-child\" data-id=\"780e128\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54b4f34 elementor-widget elementor-widget-text-editor\" data-id=\"54b4f34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"chome\" class=\"tab-pane collapsible-tabs-panel active\" role=\"tabpanel\" aria-labelledby=\"chome-tab\"><div id=\"scenarioone\" class=\"tab-pane active collapsible-tabs-panel\" role=\"tabpanel\" aria-labelledby=\"scenarioone-tab\"><div id=\"htab-10\" class=\"tab-pane active\"><div id=\"htab-16\" class=\"tab-pane active\"><div id=\"htab-9\" class=\"tab-pane active\"><p>Complexity of organizational networks and connectivity infra has increased multifold over the years. Rapid digitalization has enabled organizations to fast scale up operations, embed variant systems and IT solutions, decentralize processes across multiple locations, develop private network architectures to stay connected 24\/7, and deploy global remote workforces. Needless to mention, network assets are the foundations of such a corporate labyrinth, enabling firms to seamlessly operate each day without a hitch. Hence, real-time network security attention for IT systems, workflows, enterprise applications, web assets, and more is paramount. Achieve smart network monitoring, verification, and optimization with Network Intelligence Center. Manage VPC Flow logs for network monitoring, forensics, and security with Network Telemetry.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-372179265\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-372179265\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-2fcff80 e-con-full e-flex e-con e-child\" data-id=\"2fcff80\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;triangle&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c36ab37 e-flex e-con-boxed e-con e-child\" data-id=\"c36ab37\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c3e0e45 elementor-widget elementor-widget-text-editor\" data-id=\"c3e0e45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"chome\" class=\"tab-pane collapsible-tabs-panel active\" role=\"tabpanel\" aria-labelledby=\"chome-tab\"><div id=\"scenarioone\" class=\"tab-pane active collapsible-tabs-panel\" role=\"tabpanel\" aria-labelledby=\"scenarioone-tab\"><div id=\"htab-11\" class=\"tab-pane active\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"show_desktop\"><div id=\"myTab\" class=\"custom-tabs small-font\"><div class=\"pb0\"><div class=\"tab-content\"><div id=\"htab-17\" class=\"tab-pane active\"><div class=\"pb50\"><div class=\"tab-content\"><div id=\"htab-10\" class=\"tab-pane active\"><p>Adoption of Hybrid and multicloud environments is fast increasing owing to clear-cut benefits, the flexibility of IT adoptions, enhanced anti-risk postures, and more. Shield your GCP Anthos architecture with advanced cloud-native solutions. Gain the benefits of on-prem reliability and world-class GCP security. Shift security and monitoring check reliably between private and public workloads, touchpoints, assets. Comply with data locality-residency regulations, gain ultra-low latency, and experience an uninterrupted, consistent performance of hosted workloads, applications, and systems with utmost security. Leverage Apigee API Management for secure API development and administration, Cloud Build for executing protected constructions on Google Cloud Infra, and Looker Platform for sensitive BI and embedded Data Analytics management.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c0509ba e-con-full e-flex e-con e-child\" data-id=\"c0509ba\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ad3937 elementor-widget__width-initial e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"0ad3937\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;stretch&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"11352375\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-113523751\" data-tab-title-id=\"e-n-tab-title-113523751\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-113523751\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tGCP <br>DevSecOps\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-113523752\" data-tab-title-id=\"e-n-tab-title-113523752\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-113523752\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tDark Web Monitoring<br> and Protection\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-113523753\" data-tab-title-id=\"e-n-tab-title-113523753\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-113523753\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tGCP Cybersecurity<br> \tAssessment Services\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-113523754\" data-tab-title-id=\"e-n-tab-title-113523754\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-113523754\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tGCP Governance and<br> Compliance-as-a-Service\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-113523755\" data-tab-title-id=\"e-n-tab-title-113523755\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-113523755\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tThreat Intelligence<br>Solutions\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-113523751\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-113523751\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-304eb3f e-con-full e-flex e-con e-child\" data-id=\"304eb3f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;triangle&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-44ee5bb e-con-full e-flex e-con e-child\" data-id=\"44ee5bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bc2f7cb elementor-widget elementor-widget-text-editor\" data-id=\"bc2f7cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><p>The age-old notion of security being an overarching boundary to the software development lifecycle is now slowly getting blurred. With the development processes now getting more complicated and cyberthreats exponentially rising, it\u2019s wiser to integrate continual security policies, processes, and technologies into the DevOps culture and workflows. CloudEngin ensures \u2018Security by Design\u2019 on the Google Cloud platform and helps embed security as a core discipline in the development and management of IT systems, tools, microservices, containers, automation, APIs, testing tools. Utilize Artifact Registry to store, manage, and secure container packages. Avail Binary Authorization to deploy trusted containers on Kubernetes Engine. Leverage Operations Suite to monitor, troubleshoot, and improve infra and app performances. Below is the Cloud4C DevSecOps overview for Google Cloud:<\/p><\/div><div class=\"col-md-6\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b68ecb3 e-con-full e-flex e-con e-child\" data-id=\"b68ecb3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c44780 elementor-widget elementor-widget-text-editor\" data-id=\"7c44780\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><ul class=\"bulleted-list\"><li>Address Security Objectives and Threat Modelling<\/li><li>IDE Security Plug-ins<\/li><li>SAST\/DAST\/IAST SCA<\/li><li>Integration Testing<\/li><li>Software Signing.<\/li><li>Signature Verification and Defense Depth Measurement<\/li><li>RASP UEBA\/Network Monitoring Pen Test<\/li><li>Security Orchestration, RASP\/WAF Shielding Obfuscation<\/li><li>Dev Consumable Correlated Vulnerability Analysis: IoC\/TI STIX TAXI<\/li><li>Modified Incident Response Management<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-113523752\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-113523752\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-fd8a665 e-con-full e-flex e-con e-child\" data-id=\"fd8a665\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;triangle&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-24db20b e-con-full e-flex e-con e-child\" data-id=\"24db20b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df91f34 elementor-widget elementor-widget-text-editor\" data-id=\"df91f34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><p>The threat of the dark web cannot be underestimated. Hackers, cyber-criminals usually attack organizational databases, platforms to retrieve sensitive data such as user information, business records and IDs, log-in info to different platforms, financial data, social security numbers, and more and sell them at maximum prices on the dark web. With CloudEngin Dark Web Monitoring and Protection Solutions powered by the GCP architecture, track your enterprise data and get immediate alerts if your organization\u2019s information is found on such threatening online sites. Take immediate action and bolster your firm\u2019s security, preventing further attempts along similar lines<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-994b57e e-con-full e-flex e-con e-child\" data-id=\"994b57e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aa93284 elementor-widget elementor-widget-text-editor\" data-id=\"aa93284\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><ul class=\"bulleted-list\"><li>Dark Web Scan: Scan through the dark web for stolen usernames, passwords, Social Security numbers, credit card numbers for sale. Enterprise will be notified if organization information is found on the dark web.<\/li><li>Dark Web Monitoring: Dark web monitoring is a continued dark web scan. This helps you consistently monitor activity on the dark web on a larger scale. Receive immediate alerts from the dark web monitoring service if your information is found.<\/li><li>Dark Web Protection: Identity theft, Prevent data loss, Activation, and transfer of malware management over the Dark Web<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-113523753\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-113523753\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-4844112 e-con-full e-flex e-con e-child\" data-id=\"4844112\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;triangle&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-97d740e e-con-full e-flex e-con e-child\" data-id=\"97d740e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7056178 elementor-widget elementor-widget-text-editor\" data-id=\"7056178\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"chome\" class=\"tab-pane collapsible-tabs-panel active\" role=\"tabpanel\" aria-labelledby=\"chome-tab\"><div id=\"scenarioone\" class=\"tab-pane active collapsible-tabs-panel\" role=\"tabpanel\" aria-labelledby=\"scenarioone-tab\"><div id=\"htab-11\" class=\"tab-pane active\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"show_desktop\"><div id=\"myTab\" class=\"custom-tabs small-font\"><div class=\"pb0\"><div class=\"tab-content\"><div id=\"htab-17\" class=\"tab-pane active\"><div class=\"pb50\"><div class=\"tab-content\"><div id=\"htab-10\" class=\"tab-pane active\"><div class=\"col-md-6\"><p>Avail strategic recommendations from CloudEngin to better monitor and manage your organizational security on-premise or on the GCP cloud. Gain continuous monitoring of GCP assets, resources, and systems, readiness interviews and assessments workshops on the overall security postures, access control review and key management, incident response management policy reviews, compliance audits and reporting, technical implementation inputs for greater data protection, advisory services for networking-server-assets misconfiguration, and more. CloudEngin extensive Google cloud security services consulting, managed cybersecurity services, cybersecurity as a service offerings help better streamline and transform your organizational security at ease. Gain a thorough understanding of the use-cases and applications of leading GCP compliance and security solutions.<\/p><\/div><div class=\"col-md-6\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bde5346 e-con-full e-flex e-con e-child\" data-id=\"bde5346\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8a89447 elementor-widget elementor-widget-text-editor\" data-id=\"8a89447\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"chome\" class=\"tab-pane collapsible-tabs-panel active\" role=\"tabpanel\" aria-labelledby=\"chome-tab\"><div id=\"scenarioone\" class=\"tab-pane active collapsible-tabs-panel\" role=\"tabpanel\" aria-labelledby=\"scenarioone-tab\"><div id=\"htab-11\" class=\"tab-pane active\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"show_desktop\"><div id=\"myTab\" class=\"custom-tabs small-font\"><div class=\"pb0\"><div class=\"tab-content\"><div id=\"htab-17\" class=\"tab-pane active\"><div class=\"pb50\"><div class=\"tab-content\"><div id=\"htab-10\" class=\"tab-pane active\"><ul class=\"bulleted-list\"><li>Public Discovery Scanning Services<\/li><li>Vulnerability Assessment Services<\/li><li>Compliance audits and reporting<\/li><li>Data classification and segmentation<\/li><li>Assets (Databases, Networks, Host-based Security Systems, Virtualization) security review, monitoring, and misconfiguration management<\/li><li>Web application security testing services<\/li><li>PCI-DSS ASV Scanning<\/li><li>Advanced Black Box Penetration Testing Services<\/li><li>Malware-Ransomware Detection and Scanning<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-113523754\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-113523754\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-029dbda e-con-full e-flex e-con e-child\" data-id=\"029dbda\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;triangle&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0d3648c e-con-full e-flex e-con e-child\" data-id=\"0d3648c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fe92d58 elementor-widget elementor-widget-text-editor\" data-id=\"fe92d58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"chome\" class=\"tab-pane collapsible-tabs-panel active\" role=\"tabpanel\" aria-labelledby=\"chome-tab\"><div id=\"scenarioone\" class=\"tab-pane active collapsible-tabs-panel\" role=\"tabpanel\" aria-labelledby=\"scenarioone-tab\"><div id=\"htab-11\" class=\"tab-pane active\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"show_desktop\"><div id=\"myTab\" class=\"custom-tabs small-font\"><div class=\"pb0\"><div class=\"tab-content\"><div id=\"htab-17\" class=\"tab-pane active\"><div class=\"pb50\"><div class=\"tab-content\"><div id=\"htab-10\" class=\"tab-pane active\"><p>Compliance-related complications often result in major loopholes in an organization\u2019s IT workflows. This might be an inviting proposition to cybercriminals. CloudEngin compliant-ready offerings on the Google cloud along with dedicated Quality Management and Security teams ensure client facilities are duly compliant with data localization-residency commitments, national regulations, local compliances, and international certifications. CloudEngin augments your IT security to truly world-class standards. Embrace Avail Policy Intelligence to gain smart access control management, understand and manage policies better, and integrate key automation technologies. Lay hands on Sole-tenant Nodes &#8211; dedicated hardware for compliance, licensing, and management. Utilize Assured Workloads for compliance and security controls for sensitive workloads. Leverage Binary Authorization to deploy only trusted containers and security need-based policies on the Kubernetes Engine. Compliance adherences, not limited to are:<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ea7b0d7 e-con-full e-flex e-con e-child\" data-id=\"ea7b0d7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7de96e7 elementor-widget elementor-widget-text-editor\" data-id=\"7de96e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"chome\" class=\"tab-pane collapsible-tabs-panel active\" role=\"tabpanel\" aria-labelledby=\"chome-tab\"><div id=\"scenarioone\" class=\"tab-pane active collapsible-tabs-panel\" role=\"tabpanel\" aria-labelledby=\"scenarioone-tab\"><div id=\"htab-11\" class=\"tab-pane active\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"show_desktop\"><div id=\"myTab\" class=\"custom-tabs small-font\"><div class=\"pb0\"><div class=\"tab-content\"><div id=\"htab-17\" class=\"tab-pane active\"><div class=\"pb50\"><div class=\"tab-content\"><div id=\"htab-10\" class=\"tab-pane active\"><ul class=\"bulleted-list\"><li>IRAP<\/li><li>Bank Negara<\/li><li>Central Bank of Oman<\/li><li>SAMA<\/li><li>FINMA<\/li><li>UAE Compliances<\/li><li>RBI<\/li><li>MAS<\/li><li>OJK<\/li><li>GDPR<\/li><li>CSA<\/li><li>PCI-DSS<\/li><li>HIPAA<\/li><li>GXP<\/li><li>International Standards: ISO-27001, ISO-27017, ISO-27018, ISO-22301, ISO-20000, AICPA SOC, AICPA SOC2<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-113523755\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-113523755\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-477a72e e-con-full e-flex e-con e-child\" data-id=\"477a72e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;triangle&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b205619 e-con-full e-flex e-con e-child\" data-id=\"b205619\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-924c4aa elementor-widget elementor-widget-text-editor\" data-id=\"924c4aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"chome\" class=\"tab-pane collapsible-tabs-panel active\" role=\"tabpanel\" aria-labelledby=\"chome-tab\"><div id=\"scenarioone\" class=\"tab-pane active collapsible-tabs-panel\" role=\"tabpanel\" aria-labelledby=\"scenarioone-tab\"><div id=\"htab-11\" class=\"tab-pane active\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"show_desktop\"><div id=\"myTab\" class=\"custom-tabs small-font\"><div class=\"pb0\"><div class=\"tab-content\"><div id=\"htab-17\" class=\"tab-pane active\"><div class=\"pb50\"><div class=\"tab-content\"><div id=\"htab-10\" class=\"tab-pane active\"><p>Move over from traditional cybersecurity services and solutions and embrace AI-driven cybersecurity with ease for end-to-end asset management and monitoring on the Google cloud including last-mile connectivity and end device protection. CloudEngin advanced security intelligence solutions powered by the Google cloud offer deep threat hunting, advanced data forensics, anomaly detection, and automated response management with ease. Consolidate cybersecurity management for IP\/Domain Reputation, File Reputation, CWPP, CSPM, CASB, Phishing-malware-ransomware feeds, IT assets. Avail the proprietary Self Healing or Preventive Maintenance Platform (SHOP) to not only reduce Meantime to Detect and Meantime to Repair but do away with threats via advanced risk prediction and automated risk healing processes.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3634fde e-con-full e-flex e-con e-child\" data-id=\"3634fde\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d77a2ed elementor-widget elementor-widget-text-editor\" data-id=\"d77a2ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"first\" class=\"tab-pane active\"><div id=\"chome\" class=\"tab-pane collapsible-tabs-panel active\" role=\"tabpanel\" aria-labelledby=\"chome-tab\"><div id=\"scenarioone\" class=\"tab-pane active collapsible-tabs-panel\" role=\"tabpanel\" aria-labelledby=\"scenarioone-tab\"><div id=\"htab-11\" class=\"tab-pane active\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"show_desktop\"><div id=\"myTab\" class=\"custom-tabs small-font\"><div class=\"pb0\"><div class=\"tab-content\"><div id=\"htab-17\" class=\"tab-pane active\"><div class=\"pb50\"><div class=\"tab-content\"><div id=\"htab-10\" class=\"tab-pane active\"><ul class=\"bulleted-list\"><li>Powered by Industry-leading platforms such as Microsoft, OSINT, STIX&amp;TAXI, MIS<\/li><li>Up-to-date threat intelligence consolidated from multiple sources<\/li><li>Segregation based on customer industry and vertical for focused analysis<\/li><li>Improves threat-hunting and forensic capabilities with contextual, actionable threat indicators<\/li><li>Augment your security capability with our rigorous analysis by CloudEngin security Experts.<\/li><li>Seamless integration with major TIP, SIEM, and SOAR<\/li><li>Automated Threat Research and Analysis<\/li><li>Last-mile data extraction and protection<\/li><li>Automated Threat Prediction, Detection, Mitigation, and Preventive Maintenance (Self-Healing Operations)<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-78d6749 e-flex e-con-boxed e-con e-parent\" data-id=\"78d6749\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-13d9e47 e-con-full e-flex e-con e-child\" data-id=\"13d9e47\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e324d11 elementor-widget elementor-widget-heading\" data-id=\"e324d11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Proprietary GCP Automation Solutions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e434b1 e-con-full e-flex e-con e-child\" data-id=\"7e434b1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-70b2a7d elementor-widget elementor-widget-text-editor\" data-id=\"70b2a7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"Services\"><div class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel6\" class=\"collapsible-tabs-panel js-panel\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text text-with-out-title\"><div class=\"col-md-6\"><div class=\"row pb50\"><div class=\"col-md-6\"><div class=\"row pb50\"><div class=\"col-md-7\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"why-aws-outposts\" class=\"row\"><div class=\"col-md-8\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"row pb40 outposts-key-services\"><div class=\"col-md-8\"><div id=\"methodology\" class=\"row pb20\"><div class=\"col-md-7\"><div class=\"row pb50\"><div class=\"col-md-7\"><p>Streamline Google cloud security management for your operations and unleash fail-proof innovations with CloudEngin proprietary automation solutions. Leverage AI maintained by CloudEngin world-class Site Reliability and Security Engineers for N-tier architecture, heterogeneous systems management with multiple frontends, backends, middleware for caching, searching, queuing relational and non-relational databases. CloudEngin automation solutions for GCP-managed security operations assist in the continuous monitoring of data platforms and applications, proactive alerting in risk management terms, ensuring maximum availability, and self-healing.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-threat-detection-SIEMpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-log-management-ManagedSOCpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alert-management-ManagedSOCpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/threat-monitoring-ManagedSOCpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-65cea36 e-con-full e-flex e-con e-child\" data-id=\"65cea36\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-05ef00b e-con-full e-flex e-con e-child\" data-id=\"05ef00b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ff299f3 e-con-full e-flex e-con e-child\" data-id=\"ff299f3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-58513d4 e-con-full e-flex e-con e-child\" data-id=\"58513d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-072ab14 e-con-full e-flex e-con e-child\" data-id=\"072ab14\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-212204f e-con-full e-flex e-con e-child\" data-id=\"212204f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da2d2df elementor-widget elementor-widget-heading\" data-id=\"da2d2df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CloudEngin Cloud Management Tool\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c3fc707 e-con-full e-flex e-con e-child\" data-id=\"c3fc707\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-4f5324a e-con-full e-flex e-con e-child\" data-id=\"4f5324a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-01a4811 elementor-widget elementor-widget-text-editor\" data-id=\"01a4811\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"card-list equal-height-parent-15 different-height-lg\"><div class=\"col-md-3\"><div class=\"equal-height-parent-4\"><div class=\"card-text bg-light-gray p-25 equal-height\"><div class=\"card-list \"><div class=\"card-list equal-height-parent-15 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-17 different-height-lg\"><div class=\"card-list equal-height-parent-5 different-height-lg\"><div class=\"card-list equal-height-parent-6 different-height-lg\"><div class=\"card-list equal-height-parent-7 different-height-lg\"><div class=\"card-list equal-height-parent-8 different-height-lg\"><div class=\"col-lg-6 pb10-d\"><div class=\"card-text bg-white border border-black p-25\"><div class=\"card-list equal-height-parent-9 different-height-lg\"><div class=\"col-md-3\"><div class=\"card-text bg-light-gray p-25\"><div class=\"card-list\"><div class=\"col-md-4\"><div class=\"equal-height-parent-3\"><div class=\"card-text bg-white p-25 equal-height\"><div class=\"card-list\"><div class=\"col-md-3\"><div class=\"card-text bg-light-gray p-25\"><div class=\"card-list\"><p>The tool offers a comprehensive solution and service portfolio for simplifying security management and maximizing value to the business by consolidating all core IT processes including incident, problem, and knowledge management.<\/p><ul class=\"bulleted-list\"><li>Incident Management<\/li><li>Operational and TAT Reports<\/li><li>Integration with CSP Reports<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-915147b e-con-full e-flex e-con e-child\" data-id=\"915147b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-977a8e0 e-con-full e-flex e-con e-child\" data-id=\"977a8e0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6873fed elementor-widget elementor-widget-heading\" data-id=\"6873fed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CSP Portal\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46f9577 e-con-full e-flex e-con e-child\" data-id=\"46f9577\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-6354869 e-con-full e-flex e-con e-child\" data-id=\"6354869\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d407a3 elementor-widget elementor-widget-text-editor\" data-id=\"3d407a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"card-list\"><p class=\"pb20\">CloudEngin CSP (Customer Support Portal) has information about customer-related infrastructure, operations, monitoring, and support of services. The dashboard securely stores critical info such as devices assigned to the customer, support tickets summary, customer user management, and reports.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-84e640d e-con-full e-flex e-con e-child\" data-id=\"84e640d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1cadaf7 e-con-full e-flex e-con e-child\" data-id=\"1cadaf7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c44edab elementor-widget elementor-widget-heading\" data-id=\"c44edab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CMDB\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4ee5f32 e-con-full e-flex e-con e-child\" data-id=\"4ee5f32\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-5c1235a e-con-full e-flex e-con e-child\" data-id=\"5c1235a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e0f081e elementor-widget elementor-widget-text-editor\" data-id=\"e0f081e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"card-list\">Configuration Management Database (CMDB) portal is a repository that acts like a hyper-protected data warehouse for IT installations. All the hardware utilized for order implementation is recorded in this CMDB application. Complete Asset management can be done through this app.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-394f779 e-con-full e-flex e-con e-child\" data-id=\"394f779\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-858f3d3 elementor-widget elementor-widget-heading\" data-id=\"858f3d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Automate. Administer. Advance: CloudEngin Google Cloud Security Adoption Framework<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5454a13 e-con-full e-flex e-con e-child\" data-id=\"5454a13\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f980324 e-con-full e-flex e-con e-child\" data-id=\"f980324\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-be84d62 e-con-full e-flex e-con e-child\" data-id=\"be84d62\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-630dda4 e-con-full e-flex e-con e-child\" data-id=\"630dda4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7f94fb4 e-con-full e-flex e-con e-child\" data-id=\"7f94fb4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d40fa39 e-con-full e-flex e-con e-child\" data-id=\"d40fa39\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a6c270 elementor-widget elementor-widget-heading\" data-id=\"2a6c270\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DIRECTIVE\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e3833c e-con-full e-flex e-con e-child\" data-id=\"1e3833c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-8697516 e-con-full e-flex e-con e-child\" data-id=\"8697516\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7626e7d elementor-widget elementor-widget-text-editor\" data-id=\"7626e7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"card-list equal-height-parent-15 different-height-lg\"><div class=\"col-md-3\"><div class=\"equal-height-parent-4\"><div class=\"card-text bg-light-gray p-25 equal-height\"><div class=\"card-list \"><div class=\"card-list equal-height-parent-15 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-17 different-height-lg\"><div class=\"card-list equal-height-parent-5 different-height-lg\"><div class=\"card-list equal-height-parent-6 different-height-lg\"><div class=\"card-list equal-height-parent-7 different-height-lg\"><div class=\"card-list equal-height-parent-8 different-height-lg\"><div class=\"col-lg-6 pb10-d\"><div class=\"card-text bg-white border border-black p-25\"><div class=\"card-list equal-height-parent-9 different-height-lg\"><div class=\"col-md-3\"><div class=\"card-text bg-light-gray p-25\"><div class=\"card-list\"><div class=\"col-md-4\"><div class=\"equal-height-parent-3\"><div class=\"card-text bg-white p-25 equal-height\"><div class=\"card-list\"><div class=\"col-md-3\"><div class=\"card-text bg-light-gray p-25\"><div class=\"card-list\"><div class=\"card-list\"><p>GCP Account Governance<\/p><\/div><div class=\"card-list\"><p>GRC Control Framework<\/p><\/div><div class=\"card-list\"><p>Data Classification<\/p><\/div><div class=\"card-list\"><p>Change and Asset Management<\/p><\/div><div class=\"card-list\"><p>Data Locality<\/p><\/div><div class=\"card-list\"><p>IAM and Least Privilege Access<\/p><\/div><div class=\"card-list\"><p>Security Operations Playbook and Runbooks<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-166d0bb e-con-full e-flex e-con e-child\" data-id=\"166d0bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1f085cf e-con-full e-flex e-con e-child\" data-id=\"1f085cf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3209927 elementor-widget elementor-widget-heading\" data-id=\"3209927\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PREVENTIVE\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e431099 e-con-full e-flex e-con e-child\" data-id=\"e431099\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-1c3df19 e-con-full e-flex e-con e-child\" data-id=\"1c3df19\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63e46b3 elementor-widget elementor-widget-text-editor\" data-id=\"63e46b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"card-list equal-height-parent-15 different-height-lg\"><div class=\"col-md-3\"><div class=\"equal-height-parent-4\"><div class=\"card-text bg-light-gray p-25 equal-height\"><div class=\"card-list \"><div class=\"card-list equal-height-parent-15 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-17 different-height-lg\"><div class=\"card-list equal-height-parent-5 different-height-lg\"><div class=\"card-list equal-height-parent-6 different-height-lg\"><div class=\"card-list equal-height-parent-7 different-height-lg\"><div class=\"card-list equal-height-parent-8 different-height-lg\"><div class=\"col-lg-6 pb10-d\"><div class=\"card-text bg-white border border-black p-25\"><div class=\"card-list equal-height-parent-9 different-height-lg\"><div class=\"col-md-3\"><div class=\"card-text bg-light-gray p-25\"><div class=\"card-list\"><div class=\"col-md-4\"><div class=\"equal-height-parent-3\"><div class=\"card-text bg-white p-25 equal-height\"><div class=\"card-list\"><div class=\"col-md-3\"><div class=\"card-text bg-light-gray p-25\"><div class=\"card-list\"><div class=\"card-list\"><p>Identity and Access<\/p><\/div><div class=\"card-list\"><p>Infrastructure Protection<\/p><\/div><div class=\"card-list\"><p>Data Protection<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0e437bf e-con-full e-flex e-con e-child\" data-id=\"0e437bf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fea2770 e-con-full e-flex e-con e-child\" data-id=\"fea2770\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e96f79 elementor-widget elementor-widget-heading\" data-id=\"3e96f79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DETECTIVE\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-72dd0b6 e-con-full e-flex e-con e-child\" data-id=\"72dd0b6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-f783237 e-con-full e-flex e-con e-child\" data-id=\"f783237\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cbd1fc9 elementor-widget elementor-widget-text-editor\" data-id=\"cbd1fc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"card-list\"><div class=\"card-list\"><p>Logging and Monitoring<\/p><\/div><div class=\"card-list\"><p>Security Testing<\/p><\/div><div class=\"card-list\"><p>Asset Inventory<\/p><\/div><div class=\"card-list\"><p>Change Detection<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fb7aed8 e-con-full e-flex e-con e-child\" data-id=\"fb7aed8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-678bb0a e-con-full e-flex e-con e-child\" data-id=\"678bb0a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd6be0a elementor-widget elementor-widget-heading\" data-id=\"cd6be0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">RESPONSIVE\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7656b5c e-con-full e-flex e-con e-child\" data-id=\"7656b5c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-37acff8 e-con-full e-flex e-con e-child\" data-id=\"37acff8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7179d0 elementor-widget elementor-widget-text-editor\" data-id=\"c7179d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"card-list\"><div class=\"card-list\"><p>Incident Response<\/p><\/div><div class=\"card-list\"><p>Security Incident Response Simulations<\/p><\/div><div class=\"card-list\"><p>Forensics<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c032458 e-con-full e-flex e-con e-child\" data-id=\"c032458\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-62d9386 e-con-full e-flex e-con e-child\" data-id=\"62d9386\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a46dc40 e-con-full e-flex e-con e-child\" data-id=\"a46dc40\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-22806dc e-con-full e-flex e-con e-child\" data-id=\"22806dc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48d7139 elementor-widget elementor-widget-heading\" data-id=\"48d7139\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">LEVEL 1:\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aefe398 e-con-full e-flex e-con e-child\" data-id=\"aefe398\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-4ceadf5 e-con-full e-flex e-con e-child\" data-id=\"4ceadf5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0cbfc9d elementor-widget elementor-widget-text-editor\" data-id=\"0cbfc9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"card-list equal-height-parent-15 different-height-lg\"><div class=\"col-md-3\"><div class=\"equal-height-parent-4\"><div class=\"card-text bg-light-gray p-25 equal-height\"><div class=\"card-list \"><div class=\"card-list equal-height-parent-15 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-17 different-height-lg\"><div class=\"card-list equal-height-parent-5 different-height-lg\"><div class=\"card-list equal-height-parent-6 different-height-lg\"><div class=\"card-list equal-height-parent-7 different-height-lg\"><div class=\"card-list equal-height-parent-8 different-height-lg\"><div class=\"col-lg-6 pb10-d\"><div class=\"card-text bg-white border border-black p-25\"><div class=\"card-list equal-height-parent-9 different-height-lg\"><div class=\"col-md-3\"><div class=\"card-text bg-light-gray p-25\"><div class=\"card-list\"><div class=\"col-md-4\"><div class=\"equal-height-parent-3\"><div class=\"card-text bg-white p-25 equal-height\"><div class=\"card-list\"><div class=\"col-md-3\"><div class=\"card-text bg-light-gray p-25\"><div class=\"card-list\"><div class=\"card-list\"><ul class=\"bulleted-list\"><li>Monitoring<\/li><li>Open Tickets<\/li><li>Investigation and Mitigation<\/li><li>Addressing False Positives<\/li><li>Automated Policies for Actions<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-92303fa e-con-full e-flex e-con e-child\" data-id=\"92303fa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3e8e2f4 e-con-full e-flex e-con e-child\" data-id=\"3e8e2f4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2417711 elementor-widget elementor-widget-heading\" data-id=\"2417711\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">LEVEL 2:\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e1ba19f e-con-full e-flex e-con e-child\" data-id=\"e1ba19f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-c209f60 e-con-full e-flex e-con e-child\" data-id=\"c209f60\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-373bf22 elementor-widget elementor-widget-text-editor\" data-id=\"373bf22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"card-list equal-height-parent-15 different-height-lg\"><div class=\"col-md-3\"><div class=\"equal-height-parent-4\"><div class=\"card-text bg-light-gray p-25 equal-height\"><div class=\"card-list \"><div class=\"card-list equal-height-parent-15 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-17 different-height-lg\"><div class=\"card-list equal-height-parent-5 different-height-lg\"><div class=\"card-list equal-height-parent-6 different-height-lg\"><div class=\"card-list equal-height-parent-7 different-height-lg\"><div class=\"card-list equal-height-parent-8 different-height-lg\"><div class=\"col-lg-6 pb10-d\"><div class=\"card-text bg-white border border-black p-25\"><div class=\"card-list equal-height-parent-9 different-height-lg\"><div class=\"col-md-3\"><div class=\"card-text bg-light-gray p-25\"><div class=\"card-list\"><div class=\"col-md-4\"><div class=\"equal-height-parent-3\"><div class=\"card-text bg-white p-25 equal-height\"><div class=\"card-list\"><div class=\"col-md-3\"><div class=\"card-text bg-light-gray p-25\"><div class=\"card-list\"><div class=\"card-list\"><ul class=\"bulleted-list\"><li>Deep Investigation\/CSIRT<\/li><li>Automated\/Manual<\/li><li>Mitigation<\/li><li>Recommended Changes<\/li><li>Reporting<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c4159c6 e-con-full e-flex e-con e-child\" data-id=\"c4159c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1d4931d e-con-full e-flex e-con e-child\" data-id=\"1d4931d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c99c262 elementor-widget elementor-widget-heading\" data-id=\"c99c262\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">LEVEL 3:\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-551b910 e-con-full e-flex e-con e-child\" data-id=\"551b910\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-6a389de e-con-full e-flex e-con e-child\" data-id=\"6a389de\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f07f919 elementor-widget elementor-widget-text-editor\" data-id=\"f07f919\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"card-list\"><div class=\"card-list\"><ul class=\"bulleted-list\"><li>Advanced Investigation\/CSIRT<\/li><li>Business Threat Hunting and Prevention<\/li><li>Forensics<\/li><li>Counter Intelligence<\/li><li>Identity and Theft Protection<\/li><\/ul><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e26a83 e-flex e-con-boxed e-con e-parent\" data-id=\"3e26a83\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df76103 elementor-widget elementor-widget-heading\" data-id=\"df76103\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Partner with CloudEngin and Azure Cloud for your DR and BCP requirements?<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5efb197 e-con-full e-flex e-con e-child\" data-id=\"5efb197\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4d77899 e-con-full e-flex e-con e-child\" data-id=\"4d77899\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-96d6b50 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"96d6b50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/11972160.png\" class=\"attachment-large size-large wp-image-2214\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/11972160.png 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/11972160-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/11972160-150x150.png 150w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/11972160-768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec33726 elementor-widget elementor-widget-text-editor\" data-id=\"ec33726\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Global leader in platform-based, automation-driven, application-centric managed services and cloud infrastructure<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e22104 e-con-full e-flex e-con e-child\" data-id=\"5e22104\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9f43497 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"9f43497\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435-4.png\" class=\"attachment-large size-large wp-image-1900\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435-4.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435-4-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435-4-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-074205e elementor-widget elementor-widget-text-editor\" data-id=\"074205e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"card-white__wrapper height-100 no-shadow\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Serving 2500+ enterprises including 50+ Global Fortune 1000 Companies in 29 countries across Americas, Europe, Middle East, and APAC for 12+ years<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-161ddd7 e-con-full e-flex e-con e-child\" data-id=\"161ddd7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a9ddc2 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"5a9ddc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435.png\" class=\"attachment-large size-large wp-image-1158\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e244fa elementor-widget elementor-widget-text-editor\" data-id=\"8e244fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Dedicated GCP Security Services Management expertise with 40+ Security Controls, 25 Centres of Excellence, 1600+ cloud experts<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-06791f8 e-con-full e-flex e-con e-child\" data-id=\"06791f8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e2b53ad e-con-full e-flex e-con e-child\" data-id=\"e2b53ad\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d0b2bd elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"0d0b2bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/1799177.png\" class=\"attachment-large size-large wp-image-3367\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/1799177.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/1799177-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/1799177-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-799d672 elementor-widget elementor-widget-text-editor\" data-id=\"799d672\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Pre-met compliance needs for local, national, and global compliance requirements including IRAP, GDPR, HIPAA, SAMA, CSA, GXP, and ISO Certifications<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-94588dc e-con-full e-flex e-con e-child\" data-id=\"94588dc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1295ee7 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"1295ee7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-19_09-00-51.jpg\" class=\"attachment-large size-large wp-image-1202\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-19_09-00-51.jpg 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-19_09-00-51-300x300.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-19_09-00-51-150x150.jpg 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f50a929 elementor-widget elementor-widget-text-editor\" data-id=\"f50a929\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>3200 UTMs, 13000 HBSS Instances Managed, 800000 Events Per Second<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f6a9a45 e-con-full e-flex e-con e-child\" data-id=\"f6a9a45\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-605467d elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"605467d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/pattern_deployment_icon_215838.png\" class=\"attachment-large size-large wp-image-965\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/pattern_deployment_icon_215838.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/pattern_deployment_icon_215838-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/pattern_deployment_icon_215838-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1e9fab elementor-widget elementor-widget-text-editor\" data-id=\"c1e9fab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>7 Security frameworks utilizing the MITRE ATT&amp;CK, CIS Critical Security Controls, and more<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e58d4e9 e-con-full e-flex e-con e-child\" data-id=\"e58d4e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d28bb5e e-con-full e-flex e-con e-child\" data-id=\"d28bb5e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b3c0c38 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"b3c0c38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"222\" height=\"227\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/25.jpg\" class=\"attachment-large size-large wp-image-1006\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13d396d elementor-widget elementor-widget-text-editor\" data-id=\"13d396d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Comprehensive 24&#215;7 GCP Security monitoring and Management program<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c4db50f e-con-full e-flex e-con e-child\" data-id=\"c4db50f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66643b2 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"66643b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9536733-1.png\" class=\"attachment-large size-large wp-image-1957\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9536733-1.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9536733-1-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9536733-1-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-093bda5 elementor-widget elementor-widget-text-editor\" data-id=\"093bda5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Automated Security Solutions and GCP native tools management for threat prediction, detection, and response: Advanced Managed Detection and Response Solutions (MDR)<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e8a5a80 e-con-full e-flex e-con e-child\" data-id=\"e8a5a80\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ad0773 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"5ad0773\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"474\" height=\"474\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75.jpg\" class=\"attachment-large size-large wp-image-1045\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75.jpg 474w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75-300x300.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75-150x150.jpg 150w\" sizes=\"(max-width: 474px) 100vw, 474px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fd630c elementor-widget elementor-widget-text-editor\" data-id=\"1fd630c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Global expertise in GCP managed SOC (Security Operations Center) services and solutions with complementary GCP Security Assessment Workshops<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0727cf e-con-full e-flex e-con e-child\" data-id=\"f0727cf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8d816cc e-con-full e-flex e-con e-child\" data-id=\"8d816cc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dc17472 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"dc17472\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/7596514.png\" class=\"attachment-large size-large wp-image-1953\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/7596514.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/7596514-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/7596514-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61b6320 elementor-widget elementor-widget-text-editor\" data-id=\"61b6320\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Dedicated DevSecOps on Google cloud portfolio<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-119d8b3 e-con-full e-flex e-con e-child\" data-id=\"119d8b3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b329a84 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"b329a84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/repeat_121124.png\" class=\"attachment-large size-large wp-image-2732\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/repeat_121124.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/repeat_121124-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/repeat_121124-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b7298a elementor-widget elementor-widget-text-editor\" data-id=\"4b7298a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Dedicated GCP Cybersecurity Consulting and Compliance Audit Reporting offerings<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32f452e e-con-full e-flex e-con e-child\" data-id=\"32f452e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3fd8faf elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"3fd8faf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/08dbb3cd-17cb-44fc-8013-f7705d93bf3f.svg\" class=\"attachment-large size-large wp-image-970\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02dda4d elementor-widget elementor-widget-text-editor\" data-id=\"02dda4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"differentiators\"><div class=\"row justify-content-center equal-height-parent-12\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"Why-Cloud4C\"><div class=\"row grid-center equal-height-parent-4\"><div class=\"col-md-4 col-sm-6 \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Advanced CloudEngin Cybersecurity Incident and Response (CSIRT) team dedicated to GCP Security Management<\/p><\/div><\/div><\/div><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c265236 e-con-full e-flex e-con e-child\" data-id=\"c265236\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-377672b e-con-full e-flex e-con e-child\" data-id=\"377672b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-03a69cb elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"03a69cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"612\" height=\"612\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/istockphoto-1337090948-612x612-1.jpg\" class=\"attachment-large size-large wp-image-1896\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/istockphoto-1337090948-612x612-1.jpg 612w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/istockphoto-1337090948-612x612-1-300x300.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/istockphoto-1337090948-612x612-1-150x150.jpg 150w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-097d42b elementor-widget elementor-widget-text-editor\" data-id=\"097d42b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Threat Intelligence powered by Industry-leading platforms such as Microsoft, OSINT, STIX&amp;TAXI, MISP, etc. and CloudEngin Threat experts<\/p><\/div><\/div><\/div><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a315339 e-con-full e-flex e-con e-child\" data-id=\"a315339\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-06bfd86 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"06bfd86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"256\" height=\"256\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/icons_693536.svg\" class=\"attachment-large size-large wp-image-2215\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06391f6 elementor-widget elementor-widget-text-editor\" data-id=\"06391f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Considerable threat management expertise in securing large and complex environments and using advanced functionalities of leading industry tools as well as Cloud-Native GCP Security tools<\/p><\/div><\/div><\/div><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9db6b91 e-con-full e-flex e-con e-child\" data-id=\"9db6b91\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77c303d elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"77c303d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/rain_weather_13175.png\" class=\"attachment-large size-large wp-image-3033\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/rain_weather_13175.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/rain_weather_13175-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/12\/rain_weather_13175-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1969c1e elementor-widget elementor-widget-text-editor\" data-id=\"1969c1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"differentiators\"><div class=\"row justify-content-center equal-height-parent-12\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"Why-Cloud4C\"><div class=\"row grid-center equal-height-parent-4\"><div class=\"col-md-4 col-sm-6 \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 col-sm-6 pb15-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper\"><div class=\"col-md-4 \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"Differentiators\"><div class=\"row justify-content-center equal-height-parent-11\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Experience in deploying and managing robust SIEM on Google Cloud \u2013 helping enterprises to proactively assess vulnerabilities and automate, accelerate incident response on the Google Cloud<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section p-none bg-black\"><div class=\"container-fluid fullWidthContainer\"><div class=\"\"><div class=\"Success-Stories\"><div class=\"tabs-bottom-content-top bottom-tabs-with-bg tabs-with-img--dropdown\"><div class=\"container\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ae666c0 e-flex e-con-boxed e-con e-parent\" data-id=\"ae666c0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba289d8 elementor-widget elementor-widget-heading\" data-id=\"ba289d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">GCP Security - FAQs\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4aa776b elementor-widget elementor-widget-n-accordion\" data-id=\"4aa776b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7820\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-7820\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What does security mean in GCP? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7820\" class=\"elementor-element elementor-element-e2a45e2 e-con-full e-flex e-con e-child\" data-id=\"e2a45e2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34b01f3 elementor-widget elementor-widget-text-editor\" data-id=\"34b01f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><p>Security within Google Cloud Platform (GCP) encompasses the inherent safeguards and resources designed to protect your data, applications, and infrastructure. This includes default encryption, identity and access management, DDoS mitigation, secure networking, threat detection, and adherence to international standards. GCP operates under a shared responsibility framework-Google is responsible for securing the infrastructure, while you are responsible for securing your workloads, supported by a variety of tools.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7821\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7821\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Is the security of Google Cloud effective? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7821\" class=\"elementor-element elementor-element-030041a e-con-full e-flex e-con e-child\" data-id=\"030041a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e9bad7b elementor-widget elementor-widget-text-editor\" data-id=\"e9bad7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"faq\" class=\"faq-wrapper\"><div class=\"coll-pos\"><p>Yes, Google Cloud is regarded as one of the most secure cloud platforms in the world. It is relied upon by leading banks, government entities, and Fortune 500 companies. GCP makes substantial investments in security, featuring elements such as zero-trust architecture, advanced encryption, real-time threat detection, and compliance with ISO, SOC, GDPR, HIPAA, among others.<\/p><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aacb416 e-flex e-con-boxed e-con e-parent\" data-id=\"aacb416\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dc54c0b e-con-full e-flex e-con e-child\" data-id=\"dc54c0b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-da15475 e-con-full e-flex e-con e-child\" data-id=\"da15475\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40773e8 elementor-widget elementor-widget-heading\" data-id=\"40773e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Secure your enterprise Google Cloud Infrastructure\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-42cb29b e-con-full e-flex e-con e-child\" data-id=\"42cb29b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48f4089 elementor-widget elementor-widget-text-editor\" data-id=\"48f4089\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Schedule a consultation with our Cloud experts and get answers for any specific queries you may have. You can also schedule a visit to our Datacenters, or share feedback on our website and services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4bff6c8 e-con-full e-flex e-con e-child\" data-id=\"4bff6c8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26d6fe4 elementor-widget elementor-widget-heading\" data-id=\"26d6fe4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Get in Touch<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8bffda elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"b8bffda\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"New Form\" aria-label=\"New Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"3638\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"b8bffda\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Security\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"3638\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tName\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Name\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Email\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_815e145 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_815e145\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tTel\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_815e145]\" id=\"form-field-field_815e145\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Tel\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Only numbers and phone characters (#, -, *, etc) are accepted.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_169bf39 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_169bf39\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCompany\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_169bf39]\" id=\"form-field-field_169bf39\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Company\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tMessage\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"5\" placeholder=\"Your Message...\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_2c751e3 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_2c751e3]\" id=\"form-field-field_2c751e3\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-field_2c751e3\">I\u2019d like to receive more information from CloudEngin. By submitting this form, I am providing consent to receive marketing communications and I understand and agree to the usage of my corporate contact information in accordance with CloudEngin privacy statement.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Submit<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60df4ff elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"60df4ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"form\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Google Cloud Platform Security Services Detect, Investigate, and Mitigate cyberthreats with Advanced GCP Security Intelligence Contact Us CloudEngin Cybersecurity Management [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-3638","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/3638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3638"}],"version-history":[{"count":7,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/3638\/revisions"}],"predecessor-version":[{"id":4457,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/3638\/revisions\/4457"}],"wp:attachment":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}