{"id":495,"date":"2025-11-07T11:58:52","date_gmt":"2025-11-07T11:58:52","guid":{"rendered":"https:\/\/dev.cloudengin.com\/?page_id=495"},"modified":"2026-01-14T14:49:35","modified_gmt":"2026-01-14T14:49:35","slug":"audit-and-reporting","status":"publish","type":"page","link":"https:\/\/www.cloudengin.com\/?page_id=495","title":{"rendered":"Audit and Reporting"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"495\" class=\"elementor elementor-495\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-93946d8 e-flex e-con-boxed e-con e-parent\" data-id=\"93946d8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-daaa5ba elementor-widget elementor-widget-heading\" data-id=\"daaa5ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Audit and Reporting Services\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-345062f elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"345062f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"pb30\">Deeply analyze organizational cybersecurity posture. Get a lowdown on the deep threats and know what it takes to mitigate them. Unlock intelligent risk management.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab08be8 elementor-widget elementor-widget-button\" data-id=\"ab08be8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a40239 e-flex e-con-boxed e-con e-parent\" data-id=\"5a40239\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3bbeda2 e-con-full e-flex e-con e-child\" data-id=\"3bbeda2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d397b16 elementor-widget elementor-widget-heading\" data-id=\"d397b16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Secure, Agile, Intelligent: Astute Cybersecurity Audits and Cybersecurity Assessment for Future-proof Business Progress<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-83a788d e-con-full e-flex e-con e-child\" data-id=\"83a788d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b1072dc elementor-widget elementor-widget-text-editor\" data-id=\"b1072dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><p>Cyber security is indeed the top concern for a lot of organizations today. Data breaches are growing at a much faster pace than before. Cyber attackers are always on the lookout for organizational loopholes to get access to valuable data which they can use for their own profitable ends. They are constantly deploying new techniques to encroach apps and networks and steal confidential data.<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1abf697 elementor-widget elementor-widget-text-editor\" data-id=\"1abf697\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><p>Because of this, organizations are losing millions every year in money and more importantly, credibility in the market. The situation is getting worse as most companies are not aware of the latest techniques of hackers. This makes conducting a cyber-security audit and decoding the audit report all the more vital in sustaining business security. Organizations must conduct sharp-witted security audits on a regular basis to make sure that confidential data is not leaked to hackers.<\/p><\/div><div class=\"col-right col-lg-6\"><div class=\"left-blue-border card-white__wrapper equal-height\"><div class=\"fullheight\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-617699a e-flex e-con-boxed e-con e-parent\" data-id=\"617699a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-91ea4bd e-con-full e-flex e-con e-child\" data-id=\"91ea4bd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0b1d1c4 elementor-widget elementor-widget-heading\" data-id=\"0b1d1c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What does Cybersecurity Auditing exactly cover and how CloudEngin help\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c354aa6 e-con-full e-flex e-con e-child\" data-id=\"c354aa6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-758a570 elementor-widget elementor-widget-text-editor\" data-id=\"758a570\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><div id=\"cybersecurity-auditing\" class=\"row pb40 pb15-m\"><div class=\"col-md-7\"><p class=\"pt15-m\">A cyber security audit is designed to be a comprehensive review and assessment of your business\u2019s IT infrastructure. The exercise identifies threats and vulnerabilities, exposing weaknesses and high-risk practices. It helps contain the consequences of a breach and demonstrate if your organisation has taken the necessary steps to protect client and company data. CloudEngin cybersecurity audit services combine industry acumen with advanced business insights that help you to unlock true IT resilience.<\/p><\/div><\/div><div class=\"row\"><div class=\"col-md-12\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-51402c0 e-con-full e-flex e-con e-child\" data-id=\"51402c0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c5529b4 elementor-widget elementor-widget-text-editor\" data-id=\"c5529b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div class=\"row\"><div class=\"col-md-12\"><p>We ensure the cybersecurity solutions are fully dedicated to its risk profile and technology landscape. Based on our experience, we believe that a sound way to begin an internal audit is to conduct a cyber risk assessment and use the findings to drive a cybersecurity internal audit plan from time to time. Indeed, the right strategy can unlock more achievement and long term success in cybersecurity. Gain advanced cybersecurity audits with automted security controls. Make your business cybersecurity risk proof.<\/p><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a8c584c e-flex e-con-boxed e-con e-parent\" data-id=\"a8c584c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84552d5 elementor-widget elementor-widget-heading\" data-id=\"84552d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Signs Your Organization Needs\na Cybersecurity Audit Now<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-86865b9 e-flex e-con-boxed e-con e-parent\" data-id=\"86865b9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e13a459 e-con-full e-flex e-con e-child\" data-id=\"e13a459\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-cc03dc7 e-con-full e-flex e-con e-child\" data-id=\"cc03dc7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4e5f6c3 e-con-full e-flex e-con e-child\" data-id=\"4e5f6c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d860e4b elementor-widget elementor-widget-image\" data-id=\"d860e4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"256\" height=\"256\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1306963.png\" class=\"attachment-large size-large wp-image-1024\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1306963.png 256w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1306963-150x150.png 150w\" sizes=\"(max-width: 256px) 100vw, 256px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-982faa1 e-con-full e-flex e-con e-child\" data-id=\"982faa1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b1bd4de elementor-widget elementor-widget-heading\" data-id=\"b1bd4de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Outdated technologies struggling to tackle evolving threats\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-12b44ce e-con-full e-flex e-con e-child\" data-id=\"12b44ce\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-dd35700 e-con-full e-flex e-con e-child\" data-id=\"dd35700\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-cecebe2 e-con-full e-flex e-con e-child\" data-id=\"cecebe2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b82b0d5 elementor-widget elementor-widget-image\" data-id=\"b82b0d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/development.png\" class=\"attachment-large size-large wp-image-1025\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/development.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/development-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/development-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3878f09 e-con-full e-flex e-con e-child\" data-id=\"3878f09\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d576eaa elementor-widget elementor-widget-heading\" data-id=\"d576eaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Inability to innovate and grow because resources are wasted in fire-fighting\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-efa2783 e-con-full e-flex e-con e-child\" data-id=\"efa2783\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fae418c e-con-full e-flex e-con e-child\" data-id=\"fae418c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f108627 e-con-full e-flex e-con e-child\" data-id=\"f108627\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-38b2846 elementor-widget elementor-widget-image\" data-id=\"38b2846\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/audit.png\" class=\"attachment-large size-large wp-image-1026\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/audit.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/audit-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/audit-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-baa9e0e e-con-full e-flex e-con e-child\" data-id=\"baa9e0e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b4c3286 elementor-widget elementor-widget-heading\" data-id=\"b4c3286\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Delaying the audit because you think your organization is too small to be targeted\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a6506f5 e-flex e-con-boxed e-con e-parent\" data-id=\"a6506f5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1cdbfe7 elementor-widget elementor-widget-heading\" data-id=\"1cdbfe7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Benefits of Cybersecurity Auditing: <br>\nDiscover the CloudEngin Edge<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9dcb4fe e-flex e-con-boxed e-con e-parent\" data-id=\"9dcb4fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-602fb31 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"602fb31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"100858673\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1008586731\" data-tab-title-id=\"e-n-tab-title-1008586731\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1008586731\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tIn-depth analysis on organization\u2019s risk standards\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1008586732\" data-tab-title-id=\"e-n-tab-title-1008586732\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1008586732\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAssessments carried out by world-class cybersecurity experts\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1008586733\" data-tab-title-id=\"e-n-tab-title-1008586733\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1008586733\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tActionable insights to prioritize and reduce cyber risks\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1008586734\" data-tab-title-id=\"e-n-tab-title-1008586734\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1008586734\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tValuable education and enhanced security awareness\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1008586735\" data-tab-title-id=\"e-n-tab-title-1008586735\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1008586735\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAssess the right stack of security technologies\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1008586736\" data-tab-title-id=\"e-n-tab-title-1008586736\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1008586736\" style=\"--n-tabs-title-order: 6;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tMap Cybersecurity Standards to Modernized Frameworks\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1008586737\" data-tab-title-id=\"e-n-tab-title-1008586737\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1008586737\" style=\"--n-tabs-title-order: 7;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tCheck for Compliance Gaps\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1008586731\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1008586731\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-a59896b e-con-full e-flex e-con e-child\" data-id=\"a59896b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f678a76 e-flex e-con-boxed e-con e-child\" data-id=\"f678a76\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8c5f6ff elementor-widget elementor-widget-image\" data-id=\"8c5f6ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"453\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/budget_leadd-1024x453.jpg\" class=\"attachment-large size-large wp-image-1032\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/budget_leadd-1024x453.jpg 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/budget_leadd-300x133.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/budget_leadd-768x340.jpg 768w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/budget_leadd-1536x680.jpg 1536w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/budget_leadd.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1105c62 elementor-widget elementor-widget-text-editor\" data-id=\"1105c62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><p>Minimize your risk before a catastrophic IT event by finding out your cyber security vulnerabilities via vulnerability assessment. Assess data security, network security, IT asset security, modernized policies and procedures according to security best practices.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-black\"><div class=\"container\"><div class=\"\"><div class=\"info-section max-width\">\u00a0<\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1008586732\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1008586732\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-8e5e969 e-con-full e-flex e-con e-child\" data-id=\"8e5e969\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1133bb6 e-flex e-con-boxed e-con e-child\" data-id=\"1133bb6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1233ad8 elementor-widget elementor-widget-image\" data-id=\"1233ad8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"421\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/degcert-cybr-cybersecurity-fundamentals-750.jpg\" class=\"attachment-large size-large wp-image-1033\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/degcert-cybr-cybersecurity-fundamentals-750.jpg 750w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/degcert-cybr-cybersecurity-fundamentals-750-300x168.jpg 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b671b3 elementor-widget elementor-widget-text-editor\" data-id=\"9b671b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><p>Maintaining a secure IT environment is not simple. Business owners and managers need to ensure that their critical applications and data are always available, always secure. It would not thus be wise to rely on in-house guesswork, especially when there is the option to engage with an experienced independent IT security audit team.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-black\"><div class=\"container\"><div class=\"\"><div class=\"info-section max-width\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1008586733\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1008586733\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-f6e73bb e-con-full e-flex e-con e-child\" data-id=\"f6e73bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3e4f538 e-flex e-con-boxed e-con e-child\" data-id=\"3e4f538\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83ebcd9 elementor-widget elementor-widget-image\" data-id=\"83ebcd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1020\" height=\"574\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/755417551994827.jpg\" class=\"attachment-large size-large wp-image-1034\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/755417551994827.jpg 1020w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/755417551994827-300x169.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/755417551994827-768x432.jpg 768w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b45bd21 elementor-widget elementor-widget-text-editor\" data-id=\"b45bd21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel2\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><p>As a seasoned SOC expert and MSSP, we have the tools and experience to identify your security weaknesses. From this, we will provide you with a report that will help guide a strategy to overcome those weaknesses. Prioritize data security, network security, information security, IT infra security. Avail a complete picture on your organizational cybersecurity posture.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-black\"><div class=\"container\"><div class=\"\"><div class=\"info-section max-width\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1008586734\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1008586734\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-8cf2976 e-flex e-con-boxed e-con e-child\" data-id=\"8cf2976\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f1c8b75 e-con-full e-flex e-con e-child\" data-id=\"f1c8b75\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6643673 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"6643673\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/IMG_PO08_digital_2_1_HQDMCIVP-ren78ktd8mhwdsv4nzhsp4viqm2cz2hfdqbaskl1mk.webp\" title=\"IMG_PO08_digital_2_1_HQDMCIVP\" alt=\"IMG_PO08_digital_2_1_HQDMCIVP\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1766610 elementor-widget elementor-widget-text-editor\" data-id=\"1766610\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel3\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><p>The comprehensive audit process covers a thorough scrutiny of enterprise security and enlightens your team on what they can do to bolster their enterprise security. The more your team is aware of the evolving threats to their organizational IT set-up, the more they will embrace habit-forming changes. This could make a significant difference in preventing catastrophic IT events in the long run. The audit will also appraise your existing backup and business continuity plans, which could detect the inadequacies that you need to overcome.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-black\"><div class=\"container\"><div class=\"\"><div class=\"info-section max-width\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1008586735\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1008586735\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-5c2405a e-flex e-con-boxed e-con e-child\" data-id=\"5c2405a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9075ed1 e-con-full e-flex e-con e-child\" data-id=\"9075ed1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8c000c5 elementor-widget elementor-widget-image\" data-id=\"8c000c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/business-with-compliance-rules-law-regulation-policy-business-technology-concept-business-technology-compliance-with-standards-regulations-and-requirements-to-pass-audits-and-manage-quality-photo-1024x512.jpg\" class=\"attachment-large size-large wp-image-1030\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/business-with-compliance-rules-law-regulation-policy-business-technology-concept-business-technology-compliance-with-standards-regulations-and-requirements-to-pass-audits-and-manage-quality-photo-1024x512.jpg 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/business-with-compliance-rules-law-regulation-policy-business-technology-concept-business-technology-compliance-with-standards-regulations-and-requirements-to-pass-audits-and-manage-quality-photo-300x150.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/business-with-compliance-rules-law-regulation-policy-business-technology-concept-business-technology-compliance-with-standards-regulations-and-requirements-to-pass-audits-and-manage-quality-photo-768x384.jpg 768w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/business-with-compliance-rules-law-regulation-policy-business-technology-concept-business-technology-compliance-with-standards-regulations-and-requirements-to-pass-audits-and-manage-quality-photo-1536x768.jpg 1536w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/business-with-compliance-rules-law-regulation-policy-business-technology-concept-business-technology-compliance-with-standards-regulations-and-requirements-to-pass-audits-and-manage-quality-photo.jpg 1961w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cd0a5e elementor-widget elementor-widget-text-editor\" data-id=\"3cd0a5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel4\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><p>Organizations often falter in analyzing, filtering, and deploying the right stack of security tools and technologies required for their IT operations. This often results in redundant workflows and a barrage of false positive alerts that stress internal security teams. CloudEngin dedicated auditing and reporting allows firms to identify and finally integrate the security solutions their IT landscapes and assets really require.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-black\"><div class=\"container\"><div class=\"\"><div class=\"info-section max-width\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1008586736\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1008586736\" data-tab-index=\"6\" style=\"--n-tabs-title-order: 6;\" class=\" elementor-element elementor-element-c3f01ad e-flex e-con-boxed e-con e-child\" data-id=\"c3f01ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2fcfe98 e-con-full e-flex e-con e-child\" data-id=\"2fcfe98\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-adae901 elementor-widget elementor-widget-image\" data-id=\"adae901\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/AI-Supply-Chain-Planning-1-rejptqguga0mp2xc6f4mafuobn5h0mvbzbzeyasccc.jpg\" title=\"AI-Supply-Chain-Planning-1\" alt=\"AI-Supply-Chain-Planning-1\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e620c6c elementor-widget elementor-widget-text-editor\" data-id=\"e620c6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><p>To appropriately enhance an organization\u2019s risk management standards, its imperative to comply its operational and cybersecurity policies with modern cybersecurity protocols, standards, and frameworks such as MITRE ATT&amp;CK. The comprehensive audit exercise allows companies to map its existing cybersecurity standards with modernized protocols and implement framework-driven solutions to bolster risk and threat management.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-black\"><div class=\"container\"><div class=\"\"><div class=\"info-section max-width\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1008586737\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1008586737\" data-tab-index=\"7\" style=\"--n-tabs-title-order: 7;\" class=\" elementor-element elementor-element-aded40b e-flex e-con-boxed e-con e-child\" data-id=\"aded40b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1d72057 e-con-full e-flex e-con e-child\" data-id=\"1d72057\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c82a36 elementor-widget elementor-widget-image\" data-id=\"7c82a36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/business-with-compliance-rules-law-regulation-policy-business-technology-concept-business-technology-compliance-with-standards-regulations-and-requirements-to-pass-audits-and-manage-quality-photo-1024x512.jpg\" class=\"attachment-large size-large wp-image-1030\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/business-with-compliance-rules-law-regulation-policy-business-technology-concept-business-technology-compliance-with-standards-regulations-and-requirements-to-pass-audits-and-manage-quality-photo-1024x512.jpg 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/business-with-compliance-rules-law-regulation-policy-business-technology-concept-business-technology-compliance-with-standards-regulations-and-requirements-to-pass-audits-and-manage-quality-photo-300x150.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/business-with-compliance-rules-law-regulation-policy-business-technology-concept-business-technology-compliance-with-standards-regulations-and-requirements-to-pass-audits-and-manage-quality-photo-768x384.jpg 768w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/business-with-compliance-rules-law-regulation-policy-business-technology-concept-business-technology-compliance-with-standards-regulations-and-requirements-to-pass-audits-and-manage-quality-photo-1536x768.jpg 1536w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/business-with-compliance-rules-law-regulation-policy-business-technology-concept-business-technology-compliance-with-standards-regulations-and-requirements-to-pass-audits-and-manage-quality-photo.jpg 1961w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4947d25 elementor-widget elementor-widget-text-editor\" data-id=\"4947d25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel6\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><p>Compliance loopholes and data regulatory gaps can prove unprecedentedly expensive for any firm\u2019s balance sheets and future progress. With CloudEngin comprehensive cybersecurity audit and risk assessment, analyze such compliance misses and develop a rock solid risk management foundation across the enterprise landscape.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-black\"><div class=\"container\"><div class=\"\"><div class=\"info-section max-width\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aada823 e-flex e-con-boxed e-con e-parent\" data-id=\"aada823\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-adfb7f4 e-con-full e-flex e-con e-child\" data-id=\"adfb7f4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e2d349 elementor-widget elementor-widget-heading\" data-id=\"4e2d349\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Connect with our Cybersecurity Experts\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2e7d959 e-con-full e-flex e-con e-child\" data-id=\"2e7d959\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0b1e0cd elementor-align-center elementor-widget elementor-widget-button\" data-id=\"0b1e0cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cloudengin.com\/?page_id=57\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce16023 e-flex e-con-boxed e-con e-parent\" data-id=\"ce16023\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52574bc elementor-widget elementor-widget-heading\" data-id=\"52574bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Benefits of Cybersecurity Auditing: <br>\nDiscover the CloudEngin Edge<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a85361d e-flex e-con-boxed e-con e-parent\" data-id=\"a85361d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-96cb1a9 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"96cb1a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"158118313\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1581183131\" data-tab-title-id=\"e-n-tab-title-1581183131\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1581183131\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tWeb Security Audit\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1581183132\" data-tab-title-id=\"e-n-tab-title-1581183132\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1581183132\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tMobility Security Audit\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1581183133\" data-tab-title-id=\"e-n-tab-title-1581183133\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1581183133\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tCloud Security Audit\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1581183134\" data-tab-title-id=\"e-n-tab-title-1581183134\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1581183134\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tCompliance Management\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1581183135\" data-tab-title-id=\"e-n-tab-title-1581183135\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1581183135\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tComplete cyber-security audit of IT Infrastructure\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1581183131\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1581183131\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-a27d1dc e-con-full e-flex e-con e-child\" data-id=\"a27d1dc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-371d83b e-flex e-con-boxed e-con e-child\" data-id=\"371d83b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ed6325 elementor-widget elementor-widget-text-editor\" data-id=\"0ed6325\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The website security audit services enables organization to prevent breaches and downtimes by protecting their data in web applications. It includes:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-647d237 elementor-widget elementor-widget-text-editor\" data-id=\"647d237\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>Security against various web attacks, DDoS &amp; site scraping<\/li><li>Vulnerability assessment of web applications<\/li><li>Protecting data against unauthorized access<\/li><li>Security review of apps handling critical data<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1581183132\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1581183132\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-96ad1b4 e-con-full e-flex e-con e-child\" data-id=\"96ad1b4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b6aec19 e-flex e-con-boxed e-con e-child\" data-id=\"b6aec19\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-394f649 elementor-widget elementor-widget-text-editor\" data-id=\"394f649\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The mobility security audit offers end-to-end services including application mapping and reverse engineering to identify technical vulnerabilities in your mobile applications.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ed8750 elementor-widget elementor-widget-text-editor\" data-id=\"0ed8750\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>Review mobile app security requirements<\/li><li>Identify risk with newly built mobile apps<\/li><li>Eliminate security vulnerabilities<\/li><li>Uncover gap in existing security defenses<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1581183133\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1581183133\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-bea7f31 e-con-full e-flex e-con e-child\" data-id=\"bea7f31\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d36959c e-flex e-con-boxed e-con e-child\" data-id=\"d36959c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a3995af elementor-widget elementor-widget-text-editor\" data-id=\"a3995af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We all know how even an apparently small glitch in the enterprise network can lead to a significant economic loss in a short span. The auditors make use of robust cybersecurity services to secure operations and protect existing systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5bbbb8 elementor-widget elementor-widget-text-editor\" data-id=\"b5bbbb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>Cyber and Virtualization Security<\/li><li>Proactive Network Risk Assessment<\/li><li>Host and Endpoint Security<\/li><li>Datacenter &amp; Perimeter Security<\/li><li>Data and Information Security<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1581183134\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1581183134\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-9dedf79 e-flex e-con-boxed e-con e-child\" data-id=\"9dedf79\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ba0dad4 e-con-full e-flex e-con e-child\" data-id=\"ba0dad4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88c8cfa elementor-widget elementor-widget-text-editor\" data-id=\"88c8cfa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We deploy an integrated approach to enhance enterprise security that protects information and integrates all the necessary tools needed for governance and compliance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-107cda4 elementor-widget elementor-widget-text-editor\" data-id=\"107cda4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>Retail &amp; business &#8211; PCI-DSS compliance<\/li><li>Healthcare &#8211; HIPAA, HITECH compliance<\/li><li>Government compliance<\/li><li>Auditing &amp; Reporting<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1581183135\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1581183135\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-f3e72e1 e-flex e-con-boxed e-con e-child\" data-id=\"f3e72e1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-04ebd6a e-con-full e-flex e-con e-child\" data-id=\"04ebd6a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bbca575 elementor-widget elementor-widget-text-editor\" data-id=\"bbca575\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>Identification of risks, vulnerabilities and threat exposure.<\/li><li>High-level summary report of findings and priorities.<\/li><li>Minimal disruption to your business operations.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32d2849 e-flex e-con-boxed e-con e-parent\" data-id=\"32d2849\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-07d2d20 e-con-full e-flex e-con e-child\" data-id=\"07d2d20\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a7d5d32 elementor-widget elementor-widget-heading\" data-id=\"a7d5d32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CloudEngin Cybersecurity Audit Process Framework: A Snapshot<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-56fa31e e-con-full e-flex e-con e-child\" data-id=\"56fa31e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-630fb12 elementor-widget elementor-widget-text-editor\" data-id=\"630fb12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><div id=\"cybersecurity-auditing\" class=\"row pb40 pb15-m\"><div class=\"col-md-7\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"audit-process-framework\" class=\"row pb15-m\"><div class=\"col-md-6\"><p class=\"pt15-m\">At CloudEngin, the audit is divided into two distinct phases: Gap Analysis and Vulnerability Assessment. A Gap Analysis identifies the underlying discrepancies between compliance obligations and overall security hygiene. The Vulnerability Assessment service assists in preventing attacks by identifying the vulnerabilities and configuration issues that hackers exploit to penetrate an enterprise\u2019s network.<\/p><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"outline-table mob-table-horz atp-table pb50\"><div class=\"row outline-table-mdr-row equal-height-parent-2\">\u00a0<\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b291721 e-flex e-con-boxed e-con e-parent\" data-id=\"b291721\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8205b1b e-con-full e-flex e-con e-child\" data-id=\"8205b1b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3b0a784 e-con-full e-flex e-con e-child\" data-id=\"3b0a784\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-266a563 elementor-widget elementor-widget-heading\" data-id=\"266a563\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phase 1 - Cybersecurity Gap Analysis\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c874333 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c874333\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d96f063 elementor-widget elementor-widget-text-editor\" data-id=\"d96f063\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list ml-2\"><li>Remediation action-points<\/li><li>Breach response plan<\/li><li>Staff training and awareness<\/li><li>Detailed report including strategy overview<\/li><li>Cyber resilience assessment<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f581f76 e-con-full e-flex e-con e-child\" data-id=\"f581f76\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e199e57 elementor-widget elementor-widget-heading\" data-id=\"e199e57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phase 2 - Vulnerability Assessment\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a565d36 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a565d36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afe6658 elementor-widget elementor-widget-text-editor\" data-id=\"afe6658\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list ml-2\"><li>Vulnerability scanning and identification<\/li><li>Configuration and compliance checks<\/li><li>Malware detection<\/li><li>Web application scanning<\/li><li>Data backup review and analysis<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4107e7b e-flex e-con-boxed e-con e-parent\" data-id=\"4107e7b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b5779a3 e-flex e-con-boxed e-con e-parent\" data-id=\"b5779a3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d53c92 elementor-widget elementor-widget-heading\" data-id=\"7d53c92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">An Impact with Difference: Why Partner with CloudEngin for Enterprise Cybersecurity Transformation?<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e2e8ac5 e-con-full e-flex e-con e-child\" data-id=\"e2e8ac5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4e9a45a e-con-full e-flex e-con e-child\" data-id=\"4e9a45a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a5519b2 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"a5519b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3623572.png\" class=\"attachment-large size-large wp-image-1042\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3623572.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3623572-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3623572-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-389c49e elementor-widget elementor-widget-text-editor\" data-id=\"389c49e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Trusted, World\u2019s largest Application-focused Managed Cloud Services Provider and one of the leading managed cybersecurity companies<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5cfcd1c e-con-full e-flex e-con e-child\" data-id=\"5cfcd1c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1359c24 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"1359c24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"256\" height=\"256\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/12684933.png\" class=\"attachment-large size-large wp-image-1043\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/12684933.png 256w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/12684933-150x150.png 150w\" sizes=\"(max-width: 256px) 100vw, 256px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef619a3 elementor-widget elementor-widget-text-editor\" data-id=\"ef619a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Dedicated expertise in end-to-end data security solutions and data security management services including HDLP, DLP, Cloud Data Protection, Threat Intelligence, Database Activity Monitoring, Firewalls Management, Incident Management, etc<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-06e3168 e-con-full e-flex e-con e-child\" data-id=\"06e3168\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a08387 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"3a08387\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"474\" height=\"474\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75.jpg\" class=\"attachment-large size-large wp-image-1045\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75.jpg 474w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75-300x300.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75-150x150.jpg 150w\" sizes=\"(max-width: 474px) 100vw, 474px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13f746f elementor-widget elementor-widget-text-editor\" data-id=\"13f746f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><p class=\"pt-3\">An Impact with Difference: Why Partner with CloudEngin for Enterprise Cybersecurity Transformation?<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6cf1ca2 e-con-full e-flex e-con e-child\" data-id=\"6cf1ca2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ef5e8f2 e-con-full e-flex e-con e-child\" data-id=\"ef5e8f2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d52f24 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"3d52f24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-28-30.jpg\" class=\"attachment-large size-large wp-image-1046\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-28-30.jpg 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-28-30-300x300.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-28-30-150x150.jpg 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa90fad elementor-widget elementor-widget-text-editor\" data-id=\"fa90fad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>40+ Security Controls, 25 Centres of Excellence, 1600+ global cloud experts<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0647810 e-con-full e-flex e-con e-child\" data-id=\"0647810\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c446c6 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"4c446c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3797437.png\" class=\"attachment-large size-large wp-image-1047\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3797437.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3797437-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3797437-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07bce88 elementor-widget elementor-widget-text-editor\" data-id=\"07bce88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Pre-met compliance needs for local, national, and global compliance requirements including IRAP, GDPR, HIPAA, SAMA, CSA, GXP, and ISO Certifications<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-65ac184 e-con-full e-flex e-con e-child\" data-id=\"65ac184\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-07992b7 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"07992b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-30-23.jpg\" class=\"attachment-large size-large wp-image-1048\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-30-23.jpg 500w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-30-23-300x300.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-30-23-150x150.jpg 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1de11a elementor-widget elementor-widget-text-editor\" data-id=\"b1de11a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>3200 UTMs, 13000 HBSS, 800000 EPS<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ba3ada1 e-con-full e-flex e-con e-child\" data-id=\"ba3ada1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c17ba59 e-con-full e-flex e-con e-child\" data-id=\"c17ba59\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c1a6d41 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"c1a6d41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3131100.png\" class=\"attachment-large size-large wp-image-1049\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3131100.png 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3131100-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3131100-150x150.png 150w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3131100-768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dfdebc elementor-widget elementor-widget-text-editor\" data-id=\"6dfdebc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>7 Security frameworks utilizing the MITRE ATT&amp;CK, CIS Critical Security Controls, and more<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6639928 e-con-full e-flex e-con e-child\" data-id=\"6639928\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-050ad1b elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"050ad1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"222\" height=\"227\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/25.jpg\" class=\"attachment-large size-large wp-image-1006\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b94a4d5 elementor-widget elementor-widget-text-editor\" data-id=\"b94a4d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Comprehensive 24&#215;7 cybersecurity monitoring program<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2f83d1c e-con-full e-flex e-con e-child\" data-id=\"2f83d1c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34d7c0e elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"34d7c0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf.png\" class=\"attachment-large size-large wp-image-1050\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53b87fc elementor-widget elementor-widget-text-editor\" data-id=\"53b87fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Automated Security Solutions for threat prediction, detection, and response: Advanced Managed Detection and Response Solutions (MDR) including Endpoint Detection and Response (EDR) for deep data security purposes<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7251c86 e-con-full e-flex e-con e-child\" data-id=\"7251c86\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-cce7356 e-con-full e-flex e-con e-child\" data-id=\"cce7356\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d277ddd elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"d277ddd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4496384.png\" class=\"attachment-large size-large wp-image-1041\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4496384.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4496384-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4496384-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3814dbc elementor-widget elementor-widget-text-editor\" data-id=\"3814dbc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Global expertise in managed SOC (Security Operations Center) services and solutions dedicated to Data Security Management<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d3ce1bf e-con-full e-flex e-con e-child\" data-id=\"d3ce1bf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d5ddf58 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"d5ddf58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023.png\" class=\"attachment-large size-large wp-image-1051\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f35ff21 elementor-widget elementor-widget-text-editor\" data-id=\"f35ff21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Dedicated Cybersecurity Consulting, Cybersecurity Assessment, and Audit Reporting offerings<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-df9bec0 e-con-full e-flex e-con e-child\" data-id=\"df9bec0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d96650a elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"d96650a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6277940.png\" class=\"attachment-large size-large wp-image-1052\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6277940.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6277940-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6277940-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-140014d elementor-widget elementor-widget-text-editor\" data-id=\"140014d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Advanced CloudEngin Cybersecurity Incident and Response (CSIRT) team<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6fb0a1e e-con-full e-flex e-con e-child\" data-id=\"6fb0a1e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-dc12aa4 e-con-full e-flex e-con e-child\" data-id=\"dc12aa4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83ff1fe elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"83ff1fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/artificial-intelligence-1743104-1482205.png\" class=\"attachment-large size-large wp-image-1053\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/artificial-intelligence-1743104-1482205.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/artificial-intelligence-1743104-1482205-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/artificial-intelligence-1743104-1482205-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7e44d0 elementor-widget elementor-widget-text-editor\" data-id=\"f7e44d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Threat Intelligence powered by Industry-leading platforms such as Microsoft, OSINT, STIX&amp;TAXI, MISP, etc. and Cloud4C Threat experts<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aebfa7e e-con-full e-flex e-con e-child\" data-id=\"aebfa7e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-047d8b3 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"047d8b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146.png\" class=\"attachment-large size-large wp-image-1054\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146.png 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-150x150.png 150w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c18816 elementor-widget elementor-widget-text-editor\" data-id=\"4c18816\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Considerable data threat and vulnerability management experience in securing large and complex environments with leading industry tools, proprietary Self-Healing Operations Platform, and cloud-native tools<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-70b9d4d e-con-full e-flex e-con e-child\" data-id=\"70b9d4d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b8ffef elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"6b8ffef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169.png\" class=\"attachment-large size-large wp-image-1056\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0227c1b elementor-widget elementor-widget-text-editor\" data-id=\"0227c1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Experience in deploying and managing robust SIEM \u2013 helping enterprises to proactively assess vulnerabilities and automate, accelerate incident response<\/p><\/div><\/div><\/div><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50992af e-con-full e-flex e-con e-child\" data-id=\"50992af\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9d51bdf e-con-full e-flex e-con e-child\" data-id=\"9d51bdf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2342c23 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"2342c23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/sistem-icon.png\" class=\"attachment-large size-large wp-image-1057\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/sistem-icon.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/sistem-icon-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/sistem-icon-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-329e9c0 elementor-widget elementor-widget-text-editor\" data-id=\"329e9c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"differentiators\"><div class=\"row justify-content-center equal-height-parent-11\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Comprehensive expertise in the public cloud, hybrid, private, multi-cloud data security management services especially powered by AWS, Azure, GCP, Oracle Cloud, IBM Cloud<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"faq\" class=\"faq-wrapper\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c9dc1e0 e-flex e-con-boxed e-con e-parent\" data-id=\"c9dc1e0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48719de elementor-widget elementor-widget-heading\" data-id=\"48719de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Audit and Reporting - FAQS\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d7711b elementor-widget elementor-widget-n-accordion\" data-id=\"5d7711b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-9800\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-9800\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What is the main purpose of a security audit? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-9800\" class=\"elementor-element elementor-element-3a35365 e-con-full e-flex e-con e-child\" data-id=\"3a35365\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b26829 elementor-widget elementor-widget-text-editor\" data-id=\"2b26829\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><p>A cybersecurity audit is the systematic evaluation of an organization\u2019s security policies. It determines how well the security policies adhere to the established standards and guidelines. It is crucial for the organization&#8217;s protection against vulnerabilities and building security strategies.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-9801\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-9801\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What is the difference between IT audit and Cybersecurity audit? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-9801\" class=\"elementor-element elementor-element-8d8d5b3 e-con-full e-flex e-con e-child\" data-id=\"8d8d5b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42c6a5c elementor-widget elementor-widget-text-editor\" data-id=\"42c6a5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><p>An IT audit covers in-depth evaluation of an organization&#8217;s information technology infrastructure, policies, operations and compliances, at multiple levels by an external professional. They also determine whether the IT controls ensure data integrity and align with the business goals. Cybersecurity audit encompasses a high-level, proactive IT check at the internal level. It compares the actual conditions with existing industry benchmarks in security.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-9802\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-9802\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What are the different types of Security Audits? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-9802\" class=\"elementor-element elementor-element-935e54b e-con-full e-flex e-con e-child\" data-id=\"935e54b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ae017f elementor-widget elementor-widget-text-editor\" data-id=\"2ae017f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><p>Security audits can be classified under three categories:<\/p><ul><li><span class=\"txt-bold\">One-Time-Assessment<\/span><br \/>Performed for ad-hoc applications or exceptional situations, which may cause change or disruption in the existing operational flow.<\/li><li><span class=\"txt-bold\">Tollgate Assessment<\/span><br \/>This security audit results in binary outputs. It\u2019s a yes or no audit that helps in determining if a new process can be incorporated or not.<\/li><li><span class=\"txt-bold\">Portfolio Assessment<\/span><br \/>Security audits that are bi-annual or annual are known as Portfolio Assessments. They are done at regular intervals based on the organization\u2019s security practices. This helps to ensure that the security standards are maintained and security procedures are being followed appropriately.<\/li><\/ul><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-49f83bd e-flex e-con-boxed e-con e-parent\" data-id=\"49f83bd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-09fd043 e-con-full e-flex e-con e-child\" data-id=\"09fd043\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-95835da e-con-full e-flex e-con e-child\" data-id=\"95835da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-49281da elementor-widget elementor-widget-heading\" data-id=\"49281da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rise and Transform with CloudEngin<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-db34f40 e-con-full e-flex e-con e-child\" data-id=\"db34f40\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a6d093 elementor-widget elementor-widget-text-editor\" data-id=\"0a6d093\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Schedule a consultation with our Cloud experts and get answers for any specific queries you may have. You can also schedule a visit to our Datacenters, or share feedback on our website and services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-496b633 e-con-full e-flex e-con e-child\" data-id=\"496b633\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-01cb9c8 elementor-widget elementor-widget-heading\" data-id=\"01cb9c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Get in Touch<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14e670b elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"14e670b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"New Form\" aria-label=\"New Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"495\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"14e670b\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Audit and Reporting\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"495\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tName\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Name\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Email\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_815e145 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_815e145\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tTel\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_815e145]\" id=\"form-field-field_815e145\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Tel\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Only numbers and phone characters (#, -, *, etc) are accepted.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_169bf39 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_169bf39\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCompany\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_169bf39]\" id=\"form-field-field_169bf39\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Company\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tMessage\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"5\" placeholder=\"Your Message...\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_2c751e3 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_2c751e3]\" id=\"form-field-field_2c751e3\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-field_2c751e3\">I\u2019d like to receive more information from CloudEngin. By submitting this form, I am providing consent to receive marketing communications and I understand and agree to the usage of my corporate contact information in accordance with CloudEngin privacy statement.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Submit<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6ca7f4 elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"b6ca7f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"form\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Audit and Reporting Services Deeply analyze organizational cybersecurity posture. Get a lowdown on the deep threats and know what [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-495","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=495"}],"version-history":[{"count":16,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/495\/revisions"}],"predecessor-version":[{"id":4154,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/495\/revisions\/4154"}],"wp:attachment":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}