{"id":517,"date":"2025-11-07T13:32:17","date_gmt":"2025-11-07T13:32:17","guid":{"rendered":"https:\/\/dev.cloudengin.com\/?page_id=517"},"modified":"2026-01-14T15:11:47","modified_gmt":"2026-01-14T15:11:47","slug":"public-cloud-security-solutions","status":"publish","type":"page","link":"https:\/\/www.cloudengin.com\/?page_id=517","title":{"rendered":"Public Cloud Security Solutions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"517\" class=\"elementor elementor-517\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39dc87c e-flex e-con-boxed e-con e-parent\" data-id=\"39dc87c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eb91dec elementor-widget elementor-widget-heading\" data-id=\"eb91dec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Public Cloud\nSecurity Solutions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef24047 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ef24047\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"pb30\">Secure cloud environments. Deploy enterprise workloads across multiple clouds with ease. Integrate hyper-performing cloud services with world-class security platforms and uninterrupted continuity<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97e43f2 elementor-widget elementor-widget-button\" data-id=\"97e43f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-79cb3c8 e-flex e-con-boxed e-con e-parent\" data-id=\"79cb3c8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-572772d e-con-full e-flex e-con e-child\" data-id=\"572772d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c1bf87d elementor-widget elementor-widget-heading\" data-id=\"c1bf87d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Cloud Shield: Is Security the best reason to deploy workloads on the cloud?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ca0ff4b e-con-full e-flex e-con e-child\" data-id=\"ca0ff4b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b7473f7 elementor-widget elementor-widget-text-editor\" data-id=\"b7473f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><div id=\"cybersecurity-auditing\" class=\"row pb40 pb15-m\"><div class=\"col-md-7\"><div class=\"col-left col-lg-6\"><div class=\"col-left col-lg-6\"><p>CloudEngin Public Cloud Security Solutions protect your AWS, Azure, GCP and Oracle workloads end-to-end, under one SLA, with pay-as-you-go pricing and built-in compliance. As more than 200 million SMEs and enterprises shift critical apps to the cloud, security and continuity are the greatest drivers of long-term ROI. We combine native threat-monitoring tools such as SIEM, SOAR and automated workflows with proprietary risk-intelligence platforms to deliver 24\u00d77 managed detection, response and self-healing. From initial risk assessment and DevSecOps integration through identity and access management, automated remediation and compliance reporting, CloudEngin ensures your infrastructure, data and applications stay secure without disrupting operations or incurring hefty CAPEX. Empower your teams with real-time visibility, certified cloud-security experts and AI-driven automation to turn cloud risks into business advantages.<\/p><\/div><div class=\"col-right col-lg-6\"><div class=\"left-blue-border card-white__wrapper equal-height\"><div class=\"fullheight\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e36843f elementor-widget elementor-widget-text-editor\" data-id=\"e36843f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><div id=\"cybersecurity-auditing\" class=\"row pb40 pb15-m\"><div class=\"col-md-7\"><div class=\"col-left col-lg-6\"><div class=\"col-left col-lg-6\"><p>CloudEngin Public Cloud Security Solutions protect your AWS, Azure, GCP and Oracle workloads end-to-end, under one SLA, with pay-as-you-go pricing and built-in compliance. As more than 200 million SMEs and enterprises shift critical apps to the cloud, security and continuity are the greatest drivers of long-term ROI. We combine native threat-monitoring tools such as SIEM, SOAR and automated workflows with proprietary risk-intelligence platforms to deliver 24\u00d77 managed detection, response and self-healing. From initial risk assessment and DevSecOps integration through identity and access management, automated remediation and compliance reporting, CloudEngin ensures your infrastructure, data and applications stay secure without disrupting operations or incurring hefty CAPEX. Empower your teams with real-time visibility, certified cloud-security experts and AI-driven automation to turn cloud risks into business advantages.<\/p><\/div><div class=\"col-right col-lg-6\"><div class=\"left-blue-border card-white__wrapper equal-height\"><div class=\"fullheight\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a9232a e-flex e-con-boxed e-con e-parent\" data-id=\"2a9232a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c0a4845 elementor-widget elementor-widget-heading\" data-id=\"c0a4845\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Managed Cloud Security:\nMaximum Protection, Maximized ROI,\nUninterrupted Continuity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-490a019 e-flex e-con-boxed e-con e-parent\" data-id=\"490a019\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b413f60 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"b413f60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"188825440\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1888254401\" data-tab-title-id=\"e-n-tab-title-1888254401\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1888254401\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tEnterprise asset risk visibility\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1888254402\" data-tab-title-id=\"e-n-tab-title-1888254402\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1888254402\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tComplexity and non-synchronicity of adopted security solutions\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1888254403\" data-tab-title-id=\"e-n-tab-title-1888254403\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1888254403\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tSolution Reliability\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1888254404\" data-tab-title-id=\"e-n-tab-title-1888254404\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1888254404\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tSecurity Management Costs\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1888254405\" data-tab-title-id=\"e-n-tab-title-1888254405\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1888254405\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tCompliance overheads\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1888254406\" data-tab-title-id=\"e-n-tab-title-1888254406\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1888254406\" style=\"--n-tabs-title-order: 6;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tNeed for manual interventions\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1888254407\" data-tab-title-id=\"e-n-tab-title-1888254407\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1888254407\" style=\"--n-tabs-title-order: 7;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tIncident Management\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1888254408\" data-tab-title-id=\"e-n-tab-title-1888254408\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"8\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1888254408\" style=\"--n-tabs-title-order: 8;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tCybersecurity Management Skills\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1888254409\" data-tab-title-id=\"e-n-tab-title-1888254409\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"9\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1888254409\" style=\"--n-tabs-title-order: 9;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tOutdated Security Policies\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-18882544010\" data-tab-title-id=\"e-n-tab-title-18882544010\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"10\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-18882544010\" style=\"--n-tabs-title-order: 10;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAsset Monitoring and Protections\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-18882544011\" data-tab-title-id=\"e-n-tab-title-18882544011\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"11\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-18882544011\" style=\"--n-tabs-title-order: 11;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tSupport and Governance\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-18882544012\" data-tab-title-id=\"e-n-tab-title-18882544012\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"12\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-18882544012\" style=\"--n-tabs-title-order: 12;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAI Capabilities\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1888254401\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1888254401\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-9e08d2c e-con-full e-flex e-con e-child\" data-id=\"9e08d2c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-b1d9333 e-flex e-con-boxed e-con e-child\" data-id=\"b1d9333\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3625843 elementor-widget elementor-widget-image\" data-id=\"3625843\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9964143710-AdobeStock_704701924_private_key_verification_data_security_supersize_1200x630-1024x538.jpeg\" class=\"attachment-large size-large wp-image-1087\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9964143710-AdobeStock_704701924_private_key_verification_data_security_supersize_1200x630-1024x538.jpeg 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9964143710-AdobeStock_704701924_private_key_verification_data_security_supersize_1200x630-300x158.jpeg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9964143710-AdobeStock_704701924_private_key_verification_data_security_supersize_1200x630-768x403.jpeg 768w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9964143710-AdobeStock_704701924_private_key_verification_data_security_supersize_1200x630.jpeg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-847480b elementor-widget elementor-widget-heading\" data-id=\"847480b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Enterprise asset risk visibility\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25f2894 elementor-widget elementor-widget-text-editor\" data-id=\"25f2894\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div>Dedicated cybersecurity consulting and brainstorming workshops by CloudEngin top experts: assessment, strategy, blueprinting to industry best practices, fail-proof implementation ideas. Opt for tailored, custom sessions for maximum benefits<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-black\"><div class=\"container\"><div class=\"\"><div class=\"info-section max-width\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1888254402\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1888254402\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-975a5d6 e-con-full e-flex e-con e-child\" data-id=\"975a5d6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-f1e15e9 e-flex e-con-boxed e-con e-child\" data-id=\"f1e15e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2087b28 elementor-widget elementor-widget-image\" data-id=\"2087b28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"633\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/Data-Acquisition-Software2-1024x633.jpg\" class=\"attachment-large size-large wp-image-1148\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/Data-Acquisition-Software2-1024x633.jpg 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/Data-Acquisition-Software2-300x185.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/Data-Acquisition-Software2-768x475.jpg 768w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/Data-Acquisition-Software2-1536x949.jpg 1536w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/Data-Acquisition-Software2.jpg 1618w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6118ad6 elementor-widget elementor-widget-heading\" data-id=\"6118ad6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Complexity and non-synchronicity of adopted security solutions\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a048f9 elementor-widget elementor-widget-text-editor\" data-id=\"8a048f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><div class=\"col-md-7 pd-lft\"><div><p>With all assets and workloads on the cloud, plug and play advanced native cloud solutions applicable across the entire environment end-to-end. Maintain complete system integrity without disruptions. Once deployed Azure Sentinel, for instance, the advanced SIEM-SOAR solution would track risk loopholes across work-dataflows, automatically alert threats, and automatically orchestrate automated mediation solutions.<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-3.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1888254403\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1888254403\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-6205911 e-con-full e-flex e-con e-child\" data-id=\"6205911\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-b10aa9c e-flex e-con-boxed e-con e-child\" data-id=\"b10aa9c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cdb1903 elementor-widget elementor-widget-image\" data-id=\"cdb1903\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"452\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/669033dc8e0b204ec5eff7b7_preventing-data-breaches-1024x452.webp\" class=\"attachment-large size-large wp-image-1149\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/669033dc8e0b204ec5eff7b7_preventing-data-breaches-1024x452.webp 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/669033dc8e0b204ec5eff7b7_preventing-data-breaches-300x132.webp 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/669033dc8e0b204ec5eff7b7_preventing-data-breaches-768x339.webp 768w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/669033dc8e0b204ec5eff7b7_preventing-data-breaches.webp 1110w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66656c3 elementor-widget elementor-widget-heading\" data-id=\"66656c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Solution Reliability<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86df105 elementor-widget elementor-widget-text-editor\" data-id=\"86df105\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><div class=\"col-md-7 pd-lft\"><div><p>With all assets and workloads on the cloud, plug and play advanced native cloud solutions applicable across the entire environment end-to-end. Maintain complete system integrity without disruptions. Once deployed Azure Sentinel, for instance, the advanced SIEM-SOAR solution would track risk loopholes across work-dataflows, automatically alert threats, and automatically orchestrate automated mediation solutions.<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-3.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1888254404\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1888254404\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-150ac05 e-con-full e-flex e-con e-child\" data-id=\"150ac05\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-e8ab0f5 e-flex e-con-boxed e-con e-child\" data-id=\"e8ab0f5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6691fd3 elementor-widget elementor-widget-image\" data-id=\"6691fd3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/accounts-payment-banner-1024x683.jpg\" class=\"attachment-large size-large wp-image-1090\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/accounts-payment-banner-1024x683.jpg 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/accounts-payment-banner-300x200.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/accounts-payment-banner-768x512.jpg 768w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/accounts-payment-banner-1536x1024.jpg 1536w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/accounts-payment-banner-2048x1365.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c132689 elementor-widget elementor-widget-heading\" data-id=\"c132689\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Management Costs\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a107880 elementor-widget elementor-widget-text-editor\" data-id=\"a107880\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div><p>Abandon the towering expenses of dedicated security management hardware and software. With the entire security architecture running on the cloud, gain automated threat management benefits at fraction of costs, paid as utilized. In-cloud billing management tools further help enterprises track, manage security expenses in near real-time.<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-3.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1888254405\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1888254405\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-0ff869d e-con-full e-flex e-con e-child\" data-id=\"0ff869d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-b666e57 e-flex e-con-boxed e-con e-child\" data-id=\"b666e57\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-62787bb elementor-widget elementor-widget-image\" data-id=\"62787bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/Avatier-Del-1024x576.jpg\" class=\"attachment-large size-large wp-image-1150\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/Avatier-Del-1024x576.jpg 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/Avatier-Del-300x169.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/Avatier-Del-768x432.jpg 768w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/Avatier-Del-1536x864.jpg 1536w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/Avatier-Del.jpg 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-538f430 elementor-widget elementor-widget-heading\" data-id=\"538f430\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Compliance overheads\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc66c1f elementor-widget elementor-widget-text-editor\" data-id=\"cc66c1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div><p>Avail a complete compliant-ready cloud security architecture including stringent compliance to local, national, and global compliance-regulatory standards.<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-3.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1888254406\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1888254406\" data-tab-index=\"6\" style=\"--n-tabs-title-order: 6;\" class=\" elementor-element elementor-element-e6a496c e-con-full e-flex e-con e-child\" data-id=\"e6a496c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-d454f62 e-flex e-con-boxed e-con e-child\" data-id=\"d454f62\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63b2fca elementor-widget elementor-widget-image\" data-id=\"63b2fca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"666\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/Virtual-Terminal-1024x666.jpg\" class=\"attachment-large size-large wp-image-1151\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/Virtual-Terminal-1024x666.jpg 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/Virtual-Terminal-300x195.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/Virtual-Terminal-768x500.jpg 768w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/Virtual-Terminal.jpg 1147w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf99aef elementor-widget elementor-widget-heading\" data-id=\"cf99aef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Need for manual interventions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b474163 elementor-widget elementor-widget-text-editor\" data-id=\"b474163\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div><p>Public cloud-native solutions such as Azure Sentinel, AWS Security Hub, AWS IAM, Google IAM, Windows Defender, App Security, Oracle Advanced Security deliver fully automated threat management capabilities. Barring data analytical and security strategic roles, all real-time IT security functionalities are modernized and automated on the cloud.<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-3.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1888254407\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1888254407\" data-tab-index=\"7\" style=\"--n-tabs-title-order: 7;\" class=\" elementor-element elementor-element-fcf4b28 e-con-full e-flex e-con e-child\" data-id=\"fcf4b28\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-5118bf7 e-flex e-con-boxed e-con e-child\" data-id=\"5118bf7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f3d482b elementor-widget elementor-widget-image\" data-id=\"f3d482b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"684\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/AdobeStock_194703219R-1024x684.jpg\" class=\"attachment-large size-large wp-image-1152\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/AdobeStock_194703219R-1024x684.jpg 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/AdobeStock_194703219R-300x200.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/AdobeStock_194703219R-768x513.jpg 768w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/AdobeStock_194703219R-1536x1025.jpg 1536w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/AdobeStock_194703219R-2048x1367.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d46e37 elementor-widget elementor-widget-heading\" data-id=\"1d46e37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Incident Management\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19b3ffe elementor-widget elementor-widget-text-editor\" data-id=\"19b3ffe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div><p>Significantly reduce mean time to detection and mean time to repair with Advanced Managed Detection and Response with intelligent identity management on the cloud. Shield your IT landscape with solutions such as Google IAM, Azure Sentinel, AWS IAM Manager, and more. Modernize the entire incident management lifecycle on the cloud.<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-8.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-3.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1888254408\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1888254408\" data-tab-index=\"8\" style=\"--n-tabs-title-order: 8;\" class=\" elementor-element elementor-element-66b3bd3 e-con-full e-flex e-con e-child\" data-id=\"66b3bd3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-eae7f9e e-flex e-con-boxed e-con e-child\" data-id=\"eae7f9e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a98a764 elementor-widget elementor-widget-image\" data-id=\"a98a764\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/competition-yt-video-1224-1024x576.jpg\" class=\"attachment-large size-large wp-image-1153\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/competition-yt-video-1224-1024x576.jpg 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/competition-yt-video-1224-300x169.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/competition-yt-video-1224-768x432.jpg 768w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/competition-yt-video-1224-1536x864.jpg 1536w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/competition-yt-video-1224.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a22ae7 elementor-widget elementor-widget-heading\" data-id=\"7a22ae7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Management Skills\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d59fac0 elementor-widget elementor-widget-text-editor\" data-id=\"d59fac0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div><p>CloudEngin end-to-end managed Security Operations Center and CSIRT team act as an extended partner to your cybersecurity department. Gain invaluable expertise from CloudEngin certified cloud security engineers, developers, solution architects, support engineers, assessment consultants, and more.<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-9.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-8.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-3.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1888254409\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1888254409\" data-tab-index=\"9\" style=\"--n-tabs-title-order: 9;\" class=\" elementor-element elementor-element-e71fd48 e-con-full e-flex e-con e-child\" data-id=\"e71fd48\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-7cb351c e-flex e-con-boxed e-con e-child\" data-id=\"7cb351c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-814ed43 elementor-widget elementor-widget-image\" data-id=\"814ed43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0440\u0430\u0437\u0432\u0438\u0442\u0438\u0435-\u0431\u0438\u0437\u043d\u0435\u0441\u0430-1024x683.jpg\" class=\"attachment-large size-large wp-image-1154\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0440\u0430\u0437\u0432\u0438\u0442\u0438\u0435-\u0431\u0438\u0437\u043d\u0435\u0441\u0430-1024x683.jpg 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0440\u0430\u0437\u0432\u0438\u0442\u0438\u0435-\u0431\u0438\u0437\u043d\u0435\u0441\u0430-300x200.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0440\u0430\u0437\u0432\u0438\u0442\u0438\u0435-\u0431\u0438\u0437\u043d\u0435\u0441\u0430-768x512.jpg 768w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0440\u0430\u0437\u0432\u0438\u0442\u0438\u0435-\u0431\u0438\u0437\u043d\u0435\u0441\u0430.jpg 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff7b7e0 elementor-widget elementor-widget-heading\" data-id=\"ff7b7e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Outdated Security Policies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6362263 elementor-widget elementor-widget-text-editor\" data-id=\"6362263\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div><p>Access and upgrade asset workflows to the latest cybersecurity standards and policies. Embrace world-class methodologies, solutions, and frameworks: SIEM-SOAR, MITRE ATT&amp;CK, CIS Security Controls, Zero Trust, etc.<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-10.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-9.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-8.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-3.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-18882544010\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-18882544010\" data-tab-index=\"10\" style=\"--n-tabs-title-order: 10;\" class=\" elementor-element elementor-element-81a762e e-con-full e-flex e-con e-child\" data-id=\"81a762e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-97a84db e-flex e-con-boxed e-con e-child\" data-id=\"97a84db\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e060c0 elementor-widget elementor-widget-image\" data-id=\"6e060c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/XXL_height-1.jpeg\" class=\"attachment-large size-large wp-image-1156\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/XXL_height-1.jpeg 1000w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/XXL_height-1-300x150.jpeg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/XXL_height-1-768x384.jpeg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94e65c9 elementor-widget elementor-widget-heading\" data-id=\"94e65c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Asset Monitoring and Protections<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49d4216 elementor-widget elementor-widget-text-editor\" data-id=\"49d4216\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div><p>Gain 24\/7 monitoring on your devices, data, networks, platforms, applications, VMs or virtual systems, servers etc. Achieve unprecedented security over your entire backend and endpoint architectures. Track assets with embedded alerts, AM-ML-Behaviour Analytics, cloud-native cybersecurity tools such as Azure Sentinel, AWS GuardDuty, AWS CloudTrail, AWS Access Management, Google Cloud Console, Google Network Telemetry, and more<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-11.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-10.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-9.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-8.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-3.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-18882544011\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-18882544011\" data-tab-index=\"11\" style=\"--n-tabs-title-order: 11;\" class=\" elementor-element elementor-element-b36762f e-con-full e-flex e-con e-child\" data-id=\"b36762f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-bd4748c e-flex e-con-boxed e-con e-child\" data-id=\"bd4748c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-463fd25 elementor-widget elementor-widget-image\" data-id=\"463fd25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/contact-1024x683.webp\" class=\"attachment-large size-large wp-image-1096\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/contact-1024x683.webp 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/contact-300x200.webp 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/contact-768x512.webp 768w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/contact-1536x1025.webp 1536w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/contact-2048x1366.webp 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-446d6f7 elementor-widget elementor-widget-heading\" data-id=\"446d6f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Support and Governance\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4267ae8 elementor-widget elementor-widget-text-editor\" data-id=\"4267ae8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div><p>Dedicated Security Operations Centre (SOC) team adheres to all your cybersecurity monitoring, management, governance woes 24\/7. Further govern cybersecurity operations with intuitive tools such as Azure Governance, Google Cloud Audit Logging, etc.<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-12.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-11.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-10.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-9.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-8.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-3.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-18882544012\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-18882544012\" data-tab-index=\"12\" style=\"--n-tabs-title-order: 12;\" class=\" elementor-element elementor-element-5a044d6 e-con-full e-flex e-con e-child\" data-id=\"5a044d6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-9e93899 e-flex e-con-boxed e-con e-child\" data-id=\"9e93899\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4967db1 elementor-widget elementor-widget-image\" data-id=\"4967db1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/A-Driving-Force-1024x576.jpg\" class=\"attachment-large size-large wp-image-1157\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/A-Driving-Force-1024x576.jpg 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/A-Driving-Force-300x169.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/A-Driving-Force-768x432.jpg 768w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/A-Driving-Force-1536x864.jpg 1536w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/A-Driving-Force.jpg 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-451aa72 elementor-widget elementor-widget-heading\" data-id=\"451aa72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">AI Capabilities<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acdc894 elementor-widget elementor-widget-text-editor\" data-id=\"acdc894\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div><p>Integrate advanced threat intelligence powered by industry-leading platforms such as Microsoft, OSINT, STI&amp;TAXI, MISP, etc. Adopt world-class threat hunting, deep cybersecurity analytics, predictive alerting, and preventive maintenance through proprietary AI-driven automation solutions such as the CloudEngin SHOP Solution (Self-Healing Automation Platform)<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-13.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-12.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-11.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-10.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-9.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-8.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Public-cloud-security-solutions-cloud4c-webpage-3.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fd564cd e-flex e-con-boxed e-con e-parent\" data-id=\"fd564cd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cbc9883 e-con-full e-flex e-con e-child\" data-id=\"cbc9883\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9a1cfc8 elementor-widget elementor-widget-heading\" data-id=\"9a1cfc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Connect with our Public Cloud Security Experts\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ad85379 e-con-full e-flex e-con e-child\" data-id=\"ad85379\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67fedaa elementor-align-center elementor-widget elementor-widget-button\" data-id=\"67fedaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d86a54 e-flex e-con-boxed e-con e-parent\" data-id=\"7d86a54\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eef49ee elementor-widget elementor-widget-heading\" data-id=\"eef49ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">AWS Cloud Security Solutions: Overview\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8640820 e-flex e-con-boxed e-con e-parent\" data-id=\"8640820\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-459b5e8 e-con-full e-flex e-con e-child\" data-id=\"459b5e8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c977d95 e-con-full e-flex e-con e-child\" data-id=\"c977d95\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-024dc8e elementor-widget elementor-widget-heading\" data-id=\"024dc8e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Identity and Access Management\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7120fc3 elementor-widget elementor-widget-text-editor\" data-id=\"7120fc3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>AWS Identity and Access Management: Securely manage access to services and resources<\/li><li>AWS Single Sign-On: Cloud Single-sign-on service for easy signing in and out functionalities<\/li><li>Amazon Cognito: Identity administration across all applications and app workflows<\/li><li>AWS Directory Service: Managed Microsoft Active Directory solution and service<\/li><li>AWS Resource Access Manager: Streamlined, secure solution to share AWS resources<\/li><li>AWS Organizations: Centralized administration and governance across all AWS accounts<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e43b324 e-con-full e-flex e-con e-child\" data-id=\"e43b324\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-444b364 elementor-widget elementor-widget-heading\" data-id=\"444b364\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Risk Detection Management\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d23c90e elementor-widget elementor-widget-text-editor\" data-id=\"d23c90e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>AWS Security Hub: Unified security and compliance management portal<\/li><li>Amazon GuardDuty: Managed threat detection solution<\/li><li>Amazon Inspector: Analyze application and app workflows security<\/li><li>AWS Config: Record, evaluate, and manage configurations of AWS resources<\/li><li>AWS CloudTrail: Track user and workflow activity, API usage<\/li><li>AWS IoT Device Defender: Security Management for IoT devices and environments<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b5c544a e-con-full e-flex e-con e-child\" data-id=\"b5c544a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f277fa7 elementor-widget elementor-widget-heading\" data-id=\"f277fa7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Infrastructure Security Management\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98cd7fb elementor-widget elementor-widget-text-editor\" data-id=\"98cd7fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>AWS Network Firewall: network security and firewalls management<\/li><li>AWS Shield: Specialized tool for protection against DDoS attacks<\/li><li>AWS Web Application Firewall: Protection from suspicious web traffic<\/li><li>AWS Firewall Manager: Centralized administration of firewall rules<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-da12d81 e-con-full e-flex e-con e-child\" data-id=\"da12d81\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f010a31 elementor-widget elementor-widget-heading\" data-id=\"f010a31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Protection Management\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8e3b72 elementor-widget elementor-widget-text-editor\" data-id=\"b8e3b72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>Amazon Macie: Discover and protect sensitive data<\/li><li>AWS Key Management Service: Key storage and management solution<\/li><li>AWS CloudHSM: Hardware-based key storage solution for compliance management<\/li><li>AWS Certificate Manager: Provision, manage, and deploy public and private SSL\/TLS certificates<\/li><li>AWS Secrets Manager: Rotate, manage, and retrieve secret\/sensitive information<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-295b1d8 e-con-full e-flex e-con e-child\" data-id=\"295b1d8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3007a16 elementor-widget elementor-widget-heading\" data-id=\"3007a16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Incident Response Management\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c4d906 elementor-widget elementor-widget-text-editor\" data-id=\"2c4d906\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>Amazon Detective: Deep investigation of security issues<\/li><li>CloudEndure Disaster Recovery: Fast, automated, and cost-effective disaster recovery solution suite<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-88c52e8 e-con-full e-flex e-con e-child\" data-id=\"88c52e8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-28429b8 elementor-widget elementor-widget-heading\" data-id=\"28429b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Compliance Management\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21f2730 elementor-widget elementor-widget-text-editor\" data-id=\"21f2730\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>AWS Artifact: No cost, self-service portal for on-demand access to AWS\u2019 compliance reports<\/li><li>AWS Audit Manager: Continuously audit your AWS usage to simplify how you assess risk and compliance<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b8f1d38 e-flex e-con-boxed e-con e-parent\" data-id=\"b8f1d38\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d96a220 elementor-widget elementor-widget-heading\" data-id=\"d96a220\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Microsoft Azure Cloud Security Solutions: Overview\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce31d08 e-flex e-con-boxed e-con e-parent\" data-id=\"ce31d08\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-94f4b0c e-con-full e-flex e-con e-child\" data-id=\"94f4b0c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fc00754 e-con-full e-flex e-con e-child\" data-id=\"fc00754\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-43ebe45 elementor-widget elementor-widget-heading\" data-id=\"43ebe45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Application Gateway\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bdcba00 elementor-widget elementor-widget-text-editor\" data-id=\"bdcba00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Develop secure, scalable, and highly available web front ends<\/p><\/div><\/div><\/div><div class=\"col-md-6 mb30-d mb15-m\">\u00a0<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5bb6af4 e-con-full e-flex e-con e-child\" data-id=\"5bb6af4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a8f7ca9 elementor-widget elementor-widget-heading\" data-id=\"a8f7ca9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Azure Active Directory\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8bad50f elementor-widget elementor-widget-text-editor\" data-id=\"8bad50f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Sync all on-premise directories with ease and enable single sign-on services<\/p><\/div><\/div><\/div><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div>\u00a0<\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9a20a37 e-con-full e-flex e-con e-child\" data-id=\"9a20a37\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e24613e elementor-widget elementor-widget-heading\" data-id=\"e24613e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Azure Active Directory Domain Services\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d560695 elementor-widget elementor-widget-text-editor\" data-id=\"d560695\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Manage Virtual Machines securely across domains<\/p><\/div><\/div><\/div><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div>\u00a0<\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f115e78 e-con-full e-flex e-con e-child\" data-id=\"f115e78\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-816ff74 elementor-widget elementor-widget-heading\" data-id=\"816ff74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Azure Defender\n\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c7e4df elementor-widget elementor-widget-text-editor\" data-id=\"8c7e4df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Protect all Azure hybrid cloud workloads with ease<\/p><\/div><\/div><\/div><div class=\"col-md-6 mb30-d mb15-m\">\u00a0<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bd3f7d6 e-con-full e-flex e-con e-child\" data-id=\"bd3f7d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-300a660 elementor-widget elementor-widget-heading\" data-id=\"300a660\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Azure DDoS Protection\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d9c234 elementor-widget elementor-widget-text-editor\" data-id=\"2d9c234\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Secure, fast, and reliable cloud CDN with intelligent threat protection<\/p><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c883dfa e-con-full e-flex e-con e-child\" data-id=\"c883dfa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a97f0a9 elementor-widget elementor-widget-heading\" data-id=\"a97f0a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Azure Dedicated HSM\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90082de elementor-widget elementor-widget-text-editor\" data-id=\"90082de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Administer hardware security modules used on the cloud<\/p><\/div><\/div><\/div><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div>\u00a0<\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3ab19b3 e-con-full e-flex e-con e-child\" data-id=\"3ab19b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-09f7198 elementor-widget elementor-widget-heading\" data-id=\"09f7198\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Azure Front Door\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ece441 elementor-widget elementor-widget-text-editor\" data-id=\"3ece441\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Administer hardware security modules used on the cloud<\/p><\/div><\/div><\/div><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div>\u00a0<\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-206dd84 e-con-full e-flex e-con e-child\" data-id=\"206dd84\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51bf84e elementor-widget elementor-widget-heading\" data-id=\"51bf84e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Azure Information Protection\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d700e74 elementor-widget elementor-widget-text-editor\" data-id=\"d700e74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Shield all sensitive information anytime, anywhere<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9407cec e-con-full e-flex e-con e-child\" data-id=\"9407cec\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcd7cd6 elementor-widget elementor-widget-heading\" data-id=\"dcd7cd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Azure Sentinel\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-998a5da elementor-widget elementor-widget-text-editor\" data-id=\"998a5da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Advanced SIEM-SOAR solution to address threat detection, analysis, and response management end-to-end<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dcce8ec e-con-full e-flex e-con e-child\" data-id=\"dcce8ec\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d7f9eb0 elementor-widget elementor-widget-heading\" data-id=\"d7f9eb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Key Vault\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77e622f elementor-widget elementor-widget-text-editor\" data-id=\"77e622f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Protect and manage keys and other secret information<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-07de143 e-con-full e-flex e-con e-child\" data-id=\"07de143\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3017176 elementor-widget elementor-widget-heading\" data-id=\"3017176\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Center\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-635d74a elementor-widget elementor-widget-text-editor\" data-id=\"635d74a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Consolidate security management and enable advanced threat protection across hybrid cloud workloads<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-723bea4 e-con-full e-flex e-con e-child\" data-id=\"723bea4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e161bc8 elementor-widget elementor-widget-heading\" data-id=\"e161bc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">VPN Gateway\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cb45e3 elementor-widget elementor-widget-text-editor\" data-id=\"8cb45e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Establish secure, cross-premises connectivity across required assets<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c5b0962 e-con-full e-flex e-con e-child\" data-id=\"c5b0962\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65094ef elementor-widget elementor-widget-heading\" data-id=\"65094ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Web Application Firewall<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a8a1f3 elementor-widget elementor-widget-text-editor\" data-id=\"3a8a1f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Powerful shield for web applications<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-49b0f7e e-con-full e-flex e-con e-child\" data-id=\"49b0f7e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-714ca9b elementor-widget elementor-widget-heading\" data-id=\"714ca9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Azure Defender for IoT\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6178fb elementor-widget elementor-widget-text-editor\" data-id=\"e6178fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Monitor, detect, and respond to security threats across IoT environments<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8bf25b4 e-con-full e-flex e-con e-child\" data-id=\"8bf25b4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33abcce elementor-widget elementor-widget-heading\" data-id=\"33abcce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Microsoft Azure Attestation\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e6ddba elementor-widget elementor-widget-text-editor\" data-id=\"6e6ddba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"\" class=\"pcs-card\"><div class=\"row equal-height-parent-14\"><div class=\"col-md-6 mb30-d\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Unified solution for remotely verifying the trustworthiness of a platform and the integrity of the binaries running inside it<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c00875 e-flex e-con-boxed e-con e-parent\" data-id=\"3c00875\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8e314c1 e-con-full e-flex e-con e-child\" data-id=\"8e314c1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a96bca9 elementor-widget elementor-widget-heading\" data-id=\"a96bca9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Microsoft Azure Sentinel: Cloud-native Intelligent SIEM-SOAR Solution for end-to-end Threat Management\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-10b6cb4 e-con-full e-flex e-con e-child\" data-id=\"10b6cb4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d1cee2 elementor-widget elementor-widget-text-editor\" data-id=\"0d1cee2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><div id=\"cybersecurity-auditing\" class=\"row pb40 pb15-m\"><div class=\"col-md-7\"><div class=\"col-left col-lg-6\"><div class=\"col-left col-lg-6\"><div class=\"row pb30\"><div class=\"col-md-6\"><p>Azure Sentinel embellishes the crown of Microsoft\u2019s advanced cloud security solutions in addition to Windows Defender, Microsoft Cloud App Security, and more. Microsoft Azure Sentinel is a cloud-native, intelligent Security Information Event Management (SIEM) and Security Orchestration Automation Response (SOAR) solution for end-to-end IT security administration.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-777845d e-con-full e-flex e-con e-child\" data-id=\"777845d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ccdcf39 elementor-widget elementor-widget-text-editor\" data-id=\"ccdcf39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The platform extends a universal security monitoring, threat\/alert detection and proactive remediation, and intelligent security analytics solution applicable to all IT assets and resources: computing assets, devices, servers, databases, datacenters, platforms, architectures, applications, networks, Edge-IoT environments, and more.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9101acc elementor-widget elementor-widget-text-editor\" data-id=\"9101acc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pb40\"><div class=\"col-md-12\"><p>Integrating with a full stack of security solutions, Azure Sentinel seamlessly connects to other security tools such as Windows Defender, Azure Cloud Apps Security, Azure Monitor, Log Analytics and Logic Apps, Azure AD, MITRE Frameworks for powerful threat hunting, automation tools, third-party enterprise applications, and more.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-07a0a84 e-flex e-con-boxed e-con e-parent\" data-id=\"07a0a84\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-584ed6e elementor-widget elementor-widget-heading\" data-id=\"584ed6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Choose CloudEngin for your Enterprise Cybersecurity Transformation?\n<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0bcdc0a e-con-full e-flex e-con e-child\" data-id=\"0bcdc0a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1356848 e-con-full e-flex e-con e-child\" data-id=\"1356848\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-02136a3 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"02136a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435.png\" class=\"attachment-large size-large wp-image-1158\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4baef39 elementor-widget elementor-widget-heading\" data-id=\"4baef39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Collection\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-347a0ca elementor-widget elementor-widget-text-editor\" data-id=\"347a0ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div><p>Seamless collection of data from IT devices and resources including users, applications, infra, networks both on-premises and multiple other cloud platforms connected to Azure. Integrate Azure-native and non-Microsoft security solutions with ease to establish a greater IT security ecosystem powered by Sentinel.<\/p><\/div><\/div><\/div><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c4e5cf0 e-con-full e-flex e-con e-child\" data-id=\"c4e5cf0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd7e680 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"cd7e680\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/if_BarGraph2_113453.png\" class=\"attachment-large size-large wp-image-1159\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/if_BarGraph2_113453.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/if_BarGraph2_113453-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/if_BarGraph2_113453-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0552361 elementor-widget elementor-widget-heading\" data-id=\"0552361\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Universal Visibility and Analytics\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c9c63a elementor-widget elementor-widget-text-editor\" data-id=\"1c9c63a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div><p>Extend real-time, cutting-edge security visibility and analytics over the entire IT landscape. Correlate alerts into incidents to kickstart automated actions, adopt Machine Learning-based Anomaly Detection, map network and user behavior information, and make informed cybersecurity management decisions.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e491ed7 e-con-full e-flex e-con e-child\" data-id=\"e491ed7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-52edf65 e-con-full e-flex e-con e-child\" data-id=\"52edf65\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-85ecc86 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"85ecc86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/search.svg\" class=\"attachment-large size-large wp-image-1160\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b1958b elementor-widget elementor-widget-heading\" data-id=\"8b1958b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Advanced Threat Investigation and Threat Hunting\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-025f181 elementor-widget elementor-widget-text-editor\" data-id=\"025f181\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div><p>Gain interactive, intuitive, and deep threat investigation capabilities across all IT resources and multiple clouds, edge, IoT environments. Prepare custom alert rules, detect risk alerts and threats previously missed, go into advanced threat hunting mode with the Artificial Intelligence capabilities of Azure Sentinel. Utilize Azure Sentinel\u2019s powerful hunting search and query tools backed on the MITRE framework to proactively look for threats within the organization\u2019s IT landscape.<\/p><\/div><\/div><\/div><div class=\"col-md-6\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0a5ba50 e-con-full e-flex e-con e-child\" data-id=\"0a5ba50\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e7364c elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"6e7364c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/08dbb3cd-17cb-44fc-8013-f7705d93bf3f.svg\" class=\"attachment-large size-large wp-image-970\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-078692c elementor-widget elementor-widget-heading\" data-id=\"078692c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Threat Remediation with Security Automation and Orchestration\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-433e105 elementor-widget elementor-widget-text-editor\" data-id=\"433e105\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"azure-security\"><div class=\"row justify-content-center equal-height-parent-11\"><div class=\"col-md-6\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div><p>Built-in intelligent security automation and orchestration capabilities of Azure Sentinel digitizes common threat management functions across the organization. Integrate Sentinel with Logic Apps, Logic Analytics, Azure Functions, 200+ connectors for other Azure services, and adopted enterprise tools such as Jira, Zendesk, Slack, Microsoft Teams, etc unleash end-to-end automated security management.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"azure-sentinel\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d46369e e-flex e-con-boxed e-con e-parent\" data-id=\"d46369e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-95a4417 elementor-widget elementor-widget-heading\" data-id=\"95a4417\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CloudEngin Azure Sentinel Managed Services\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-63a355f e-flex e-con-boxed e-con e-parent\" data-id=\"63a355f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e4f4b47 e-con-full e-flex e-con e-child\" data-id=\"e4f4b47\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e978e12 e-con-full e-flex e-con e-child\" data-id=\"e978e12\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b40fb2 elementor-widget elementor-widget-heading\" data-id=\"8b40fb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Azure Sentinel Deployment\n<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6fffa22 e-con-full e-flex e-con e-child\" data-id=\"6fffa22\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1be878f elementor-widget elementor-widget-text-editor\" data-id=\"1be878f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"card-list equal-height-parent-15 different-height-lg\"><p class=\"equal-height\">Perform a full investigation of the client\u2019s IT landscape, process, and dataflows, including customizations and alerts<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48c2b43 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"48c2b43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b4b8c2f e-con-full e-flex e-con e-child\" data-id=\"b4b8c2f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f029be elementor-widget elementor-widget-text-editor\" data-id=\"1f029be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><p class=\"equal-height\">Gather client requirements and provide upfront cost savings of embracing Sentinel<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3305bf7 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3305bf7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e819d09 e-con-full e-flex e-con e-child\" data-id=\"e819d09\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f7e46c0 elementor-widget elementor-widget-text-editor\" data-id=\"f7e46c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><p class=\"equal-height\">Use Case development to optimize client\u2019s visibility into the cloud environment<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46d03b3 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"46d03b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f3f176 e-con-full e-flex e-con e-child\" data-id=\"6f3f176\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b478b32 elementor-widget elementor-widget-text-editor\" data-id=\"b478b32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-17 different-height-lg\"><p class=\"equal-height\">Assist with the log onboarding activities<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2451fcc elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2451fcc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-545352a e-con-full e-flex e-con e-child\" data-id=\"545352a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8492d8a elementor-widget elementor-widget-text-editor\" data-id=\"8492d8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><p class=\"equal-height\">Review log types and devices, both on-premises and in Cloud, and identify the right data sources necessary to support use cases and to move to the cloud<\/p><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-305e3db elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"305e3db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d40d35a e-con-full e-flex e-con e-child\" data-id=\"d40d35a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-847d49c elementor-widget elementor-widget-text-editor\" data-id=\"847d49c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-6 different-height-lg\"><div class=\"card-list equal-height-parent-5 different-height-lg\"><p class=\"equal-height\">Creating and Configuring Sentinel and onboarding of log data using both native and custom Sentinel connectors<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cc54e6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cc54e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ac750e e-con-full e-flex e-con e-child\" data-id=\"6ac750e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-50c7212 elementor-widget elementor-widget-text-editor\" data-id=\"50c7212\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-6 different-height-lg\"><p class=\"equal-height\">Setting up dashboards and alerts<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f8d048 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2f8d048\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d3db8d e-con-full e-flex e-con e-child\" data-id=\"1d3db8d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef1d37f elementor-widget elementor-widget-text-editor\" data-id=\"ef1d37f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-6 different-height-lg\"><div class=\"card-list equal-height-parent-7 different-height-lg\"><p class=\"equal-height\">Development of Threat Hunting templates and alerting scenarios<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4388c0f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4388c0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9c731be e-con-full e-flex e-con e-child\" data-id=\"9c731be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a90db4 elementor-widget elementor-widget-text-editor\" data-id=\"2a90db4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-6 different-height-lg\"><div class=\"card-list equal-height-parent-7 different-height-lg\"><div class=\"card-list equal-height-parent-8 different-height-lg\"><p class=\"equal-height\">Creation of playbooks that execute automatically when an alert is triggered<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af919cb elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"af919cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-618dfbb e-con-full e-flex e-con e-child\" data-id=\"618dfbb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-86dcfeb elementor-widget elementor-widget-text-editor\" data-id=\"86dcfeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-6 different-height-lg\"><div class=\"card-list equal-height-parent-7 different-height-lg\"><div class=\"card-list equal-height-parent-8 different-height-lg\"><div class=\"col-lg-6 pb10-d\"><div class=\"card-text bg-white border border-black p-25 text-center\"><div class=\"card-list equal-height-parent-9 different-height-lg\"><p class=\"equal-height\">Knowledge transfer, detection and response training, and creation of documents for customers\u2019 use.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-401cd8b e-con-full e-flex e-con e-child\" data-id=\"401cd8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48e0958 elementor-widget elementor-widget-heading\" data-id=\"48e0958\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Azure Sentinel Management\n<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a4894ee e-con-full e-flex e-con e-child\" data-id=\"a4894ee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-031c041 elementor-widget elementor-widget-text-editor\" data-id=\"031c041\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"card-list equal-height-parent-15 different-height-lg\"><div class=\"card-list equal-height-parent-15 different-height-lg\"><p class=\"equal-height\">Continuous Fine-tuning of complete ATT&amp;CK based rules specific to Infrastructure and compliance policies<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f53e1d7 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f53e1d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c013f43 e-con-full e-flex e-con e-child\" data-id=\"c013f43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eec4943 elementor-widget elementor-widget-text-editor\" data-id=\"eec4943\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><p class=\"equal-height\">Perform Incident management with detailed Root cause analysis and Mitigation.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd7eebc elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fd7eebc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-621dcc1 e-con-full e-flex e-con e-child\" data-id=\"621dcc1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec2835f elementor-widget elementor-widget-text-editor\" data-id=\"ec2835f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><p class=\"equal-height\">Provide weekly and monthly walkthroughs on Security posture and developments with actionable intelligence to improvise security posture.<\/p><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0539942 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0539942\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc98f3f e-con-full e-flex e-con e-child\" data-id=\"dc98f3f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ae1312 elementor-widget elementor-widget-text-editor\" data-id=\"7ae1312\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-17 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><p class=\"equal-height\">Dedicated Technical account manager from SOC with a complete understanding of client infrastructure. Incident Auto remediation in minutes without human intervention saves overall manpower cost and reduces incident response SLA.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d39a255 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d39a255\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0bdd1d0 e-con-full e-flex e-con e-child\" data-id=\"0bdd1d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-add2a20 elementor-widget elementor-widget-text-editor\" data-id=\"add2a20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-17 different-height-lg\"><p class=\"equal-height\">Detailed forensics offered an on-demand Team of cyber Threat intelligence experts performing threat hunting.<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-037a66f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"037a66f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-699d67b e-con-full e-flex e-con e-child\" data-id=\"699d67b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb0d0ac elementor-widget elementor-widget-text-editor\" data-id=\"cb0d0ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-6 different-height-lg\"><div class=\"card-list equal-height-parent-5 different-height-lg\"><p class=\"equal-height\">Threat modeling-based recommendations with a complete understanding of infra. Custom data collection even for the applications which cannot forward logs. Developing custom parsers even for unstructured logs.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91f5a0b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"91f5a0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02456ba e-con-full e-flex e-con e-child\" data-id=\"02456ba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c208ac elementor-widget elementor-widget-text-editor\" data-id=\"3c208ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-6 different-height-lg\"><div class=\"card-list equal-height-parent-7 different-height-lg\"><div class=\"card-list equal-height-parent-6 different-height-lg\"><p class=\"equal-height\">Continuous discovery of vulnerabilities and misconfigurations in tandem with real-time business processes and functionalities<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fbd6e6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"9fbd6e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d09e749 e-con-full e-flex e-con e-child\" data-id=\"d09e749\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-664b178 elementor-widget elementor-widget-text-editor\" data-id=\"664b178\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-6 different-height-lg\"><div class=\"card-list equal-height-parent-7 different-height-lg\"><div class=\"card-list equal-height-parent-8 different-height-lg\"><div class=\"card-list equal-height-parent-7 different-height-lg\"><p class=\"equal-height\">Detection and Response (EDR) alerts to expose overall breach insights. Correlation of vulnerabilities with Endpoint assets<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a00bd4b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a00bd4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb64952 e-con-full e-flex e-con e-child\" data-id=\"eb64952\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f0b65d elementor-widget elementor-widget-text-editor\" data-id=\"2f0b65d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-6 different-height-lg\"><div class=\"card-list equal-height-parent-7 different-height-lg\"><div class=\"card-list equal-height-parent-8 different-height-lg\"><div class=\"col-lg-6 pb10-d\"><div class=\"card-text bg-white border border-black p-25 text-center\"><div class=\"card-list equal-height-parent-9 different-height-lg\"><div class=\"card-list equal-height-parent-8 different-height-lg\"><p class=\"equal-height\">Identify the Machine-level vulnerabilities during in-depth incident investigations<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5adf875 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5adf875\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c14972 e-con-full e-flex e-con e-child\" data-id=\"7c14972\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4804b9f elementor-widget elementor-widget-text-editor\" data-id=\"4804b9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-16 different-height-lg\"><div class=\"card-list equal-height-parent-2 different-height-lg\"><div class=\"card-list equal-height-parent-3 different-height-lg\"><div class=\"card-list equal-height-parent-6 different-height-lg\"><div class=\"card-list equal-height-parent-7 different-height-lg\"><div class=\"card-list equal-height-parent-8 different-height-lg\"><div class=\"col-lg-6 pb10-d\"><div class=\"card-text bg-white border border-black p-25 text-center\"><div class=\"card-list equal-height-parent-9 different-height-lg\"><div class=\"card-list equal-height-parent-8 different-height-lg\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"azure-sentinel\"><div class=\"workshop\"><div class=\"row\"><div class=\"col-lg-6 pb10-d\"><div class=\"card-text bg-white border border-black p-25 text-center\"><div class=\"card-list equal-height-parent-9 different-height-lg\"><p class=\"equal-height\">Prioritize remediation based on the business context &amp; the ever-evolving threat landscape. Built-in remediation processes through a unique integration with Microsoft Intune and Microsoft<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21772af e-flex e-con-boxed e-con e-parent\" data-id=\"21772af\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e227796 elementor-widget elementor-widget-heading\" data-id=\"e227796\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Google Cloud Platform (GCP) Security Solutions: Overview<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-18dc28e e-flex e-con-boxed e-con e-parent\" data-id=\"18dc28e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d16cd39 e-con-full e-flex e-con e-child\" data-id=\"d16cd39\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b30a0ef e-con-full e-flex e-con e-child\" data-id=\"b30a0ef\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56eaf06 elementor-widget elementor-widget-heading\" data-id=\"56eaf06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Access Transparency\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-565bc16 elementor-widget elementor-widget-text-editor\" data-id=\"565bc16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Seamless cloud assets visibility via near real-time logs<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-583e88b e-con-full e-flex e-con e-child\" data-id=\"583e88b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d27e17b elementor-widget elementor-widget-heading\" data-id=\"d27e17b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Assured Workloads\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18037f2 elementor-widget elementor-widget-text-editor\" data-id=\"18037f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Compliance and security controls and management for sensitive\/important workloads<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5505f73 e-con-full e-flex e-con e-child\" data-id=\"5505f73\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25046cd elementor-widget elementor-widget-heading\" data-id=\"25046cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Binary Authorization\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1712f6 elementor-widget elementor-widget-text-editor\" data-id=\"c1712f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Seamless deployment of trusted containers on the Kubernetes Engine<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a6ba348 e-con-full e-flex e-con e-child\" data-id=\"a6ba348\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e9cadd elementor-widget elementor-widget-heading\" data-id=\"8e9cadd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Chronicle\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dedd41e elementor-widget elementor-widget-text-editor\" data-id=\"dedd41e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Extract signals from security telemetry and data to find instant threats<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e2c46f6 e-con-full e-flex e-con e-child\" data-id=\"e2c46f6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed02f5a elementor-widget elementor-widget-heading\" data-id=\"ed02f5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cloud Asset Inventory\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15d32a3 elementor-widget elementor-widget-text-editor\" data-id=\"15d32a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Overview, monitor, and analyze all Google Cloud and GCP Anthos assets<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb884a6 e-con-full e-flex e-con e-child\" data-id=\"cb884a6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a664bc elementor-widget elementor-widget-heading\" data-id=\"3a664bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cloud Data Loss Prevention\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-871548e elementor-widget elementor-widget-text-editor\" data-id=\"871548e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Sensitive data inspection, classification, and redaction solution<\/p><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div>\u00a0<\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce3daee e-con-full e-flex e-con e-child\" data-id=\"ce3daee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11449eb elementor-widget elementor-widget-heading\" data-id=\"11449eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cloud Key Management\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7cb18d elementor-widget elementor-widget-text-editor\" data-id=\"b7cb18d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Manage encryption keys on the Google Cloud<\/p><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div>\u00a0<\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4b042fd e-con-full e-flex e-con e-child\" data-id=\"4b042fd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab9aeea elementor-widget elementor-widget-heading\" data-id=\"ab9aeea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Confidential Computing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02a375c elementor-widget elementor-widget-text-editor\" data-id=\"02a375c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Encrypt data and dataflows with confidential Virtual Machines<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f2fffe e-con-full e-flex e-con e-child\" data-id=\"5f2fffe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-810151b elementor-widget elementor-widget-heading\" data-id=\"810151b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Firewalls\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b6a368 elementor-widget elementor-widget-text-editor\" data-id=\"9b6a368\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Global, flexible firewall solutions to protect all cloud resources<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-292ba66 e-con-full e-flex e-con e-child\" data-id=\"292ba66\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34c4370 elementor-widget elementor-widget-heading\" data-id=\"34c4370\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Secret Manager<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cdf98fa elementor-widget elementor-widget-text-editor\" data-id=\"cdf98fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Securely store and manage API keys, passwords, certificates, and other sensitive data<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-696f9b2 e-con-full e-flex e-con e-child\" data-id=\"696f9b2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c8c5ced elementor-widget elementor-widget-heading\" data-id=\"c8c5ced\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Shielded VMs\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1162c2 elementor-widget elementor-widget-text-editor\" data-id=\"b1162c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Virtual Machines shielded with advanced security controls and defenses<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-43ae3d8 e-con-full e-flex e-con e-child\" data-id=\"43ae3d8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a7e6dd elementor-widget elementor-widget-heading\" data-id=\"2a7e6dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">VPC Service Controls\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec4b250 elementor-widget elementor-widget-text-editor\" data-id=\"ec4b250\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"equal-height pcs-card-con no-margin-d\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"gcp-security\" class=\"pcs-card\"><div class=\"row equal-height-parent-13\"><div class=\"col-md-6 mb30-d\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Protect sensitive information in Google Cloud Services utilizing security parameters<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-769902c e-flex e-con-boxed e-con e-parent\" data-id=\"769902c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-464e94f elementor-widget elementor-widget-heading\" data-id=\"464e94f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CloudEngin End-to-end Intelligent\nManaged Public Cloud Security Services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-025efd4 e-flex e-con-boxed e-con e-parent\" data-id=\"025efd4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-70506e6 elementor-widget__width-initial e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"70506e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;stretch&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"117769958\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1177699581\" data-tab-title-id=\"e-n-tab-title-1177699581\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1177699581\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAWS Managed Security\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1177699582\" data-tab-title-id=\"e-n-tab-title-1177699582\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1177699582\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAzure Managed Security\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1177699583\" data-tab-title-id=\"e-n-tab-title-1177699583\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1177699583\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tGCP Managed Security\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1177699584\" data-tab-title-id=\"e-n-tab-title-1177699584\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1177699584\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tOracle Cloud Infrastructure Managed Security\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1177699585\" data-tab-title-id=\"e-n-tab-title-1177699585\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1177699585\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tCloud Workload Protection Platform (CWPP)\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1177699581\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1177699581\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-22c880a e-con-full e-flex e-con e-child\" data-id=\"22c880a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-e718376 e-flex e-con-boxed e-con e-child\" data-id=\"e718376\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63578f4 elementor-widget elementor-widget-text-editor\" data-id=\"63578f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><p>Secure, protect, and manage risks efficiently for all IT assets on the AWS cloud: datacenter assets, servers, networks, computing devices, cloud data flows, databases, middleware, OS, protocols, software architectures, applications. Extend cloud-native security to your IoT, Edge environments with ease and automate cloud security management with advanced AI solutions. Better still, integrate your divergent, multi-partner, and heterogeneous landscapes, other multi-cloud ecosystems, and IT resources on the AWS cloud to gain unified asset monitoring, asset health checks, threat alerting, incident reporting, threat containment, and risk eradication measures across all enterprise locations and environments 24\/7.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1177699582\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1177699582\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-032de70 e-con-full e-flex e-con e-child\" data-id=\"032de70\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4adffc5 e-flex e-con-boxed e-con e-child\" data-id=\"4adffc5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce1d150 elementor-widget elementor-widget-text-editor\" data-id=\"ce1d150\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-2\" class=\"tab-pane active\"><div id=\"htab-2\" class=\"tab-pane active\"><p>Secure, protect, and manage risks efficiently for all IT assets on the Azure cloud: datacenter assets, servers, networks, computing devices, cloud data flows, databases, middleware, OS, protocols, software architectures, applications. Extend cloud-native security to your IoT, Edge environments with ease and automate cloud security management with advanced AI solutions. Better still, integrate your divergent, multi-partner, and heterogeneous landscapes, other multi-cloud ecosystems, and IT resources on the Azure cloud to gain unified asset monitoring, asset health checks, threat alerting, incident reporting, threat containment, and risk eradication measures across all enterprise locations and environments 24\/7.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1177699583\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1177699583\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-12a8c52 e-flex e-con-boxed e-con e-child\" data-id=\"12a8c52\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5282fd1 e-con-full e-flex e-con e-child\" data-id=\"5282fd1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0979269 elementor-widget elementor-widget-text-editor\" data-id=\"0979269\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><p>Secure, protect, and manage risks efficiently for all IT assets on the Google cloud: datacenter assets, servers, networks, computing devices, dataflows, databases, middleware, OS, protocols, software architectures, applications. Extend cloud-native security to your IoT, Edge environments with ease and automate cloud security management with advanced AI solutions. Better still, integrate your divergent, multi-partner, and heterogeneous landscapes, other multi-cloud ecosystems, and IT resources on the Google cloud to gain unified asset monitoring, asset health checks, threat alerting, incident reporting, threat containment, and risk eradication measures across all enterprise locations and environments 24\/7.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1177699584\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1177699584\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-c686f33 e-flex e-con-boxed e-con e-child\" data-id=\"c686f33\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ffcece6 e-con-full e-flex e-con e-child\" data-id=\"ffcece6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b66f311 elementor-widget elementor-widget-text-editor\" data-id=\"b66f311\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel7\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"myTab\" class=\"custom-tabs custom-tabs-mdr\"><div class=\"pb50\"><div class=\"tab-content-mdr\"><div id=\"htab-4\" class=\"tab-pane active\"><div id=\"htab-4\" class=\"tab-pane active\"><p>Secure, protect, and manage risks efficiently for all IT assets on the Oracle cloud: datacenter assets, servers, networks, computing devices, dataflows, databases, middleware, OS, protocols, software architectures, applications. Extend cloud-native security to your IoT, Edge environments with ease and automate cloud security management with advanced AI solutions. Better still, integrate your divergent, multi-partner, and heterogeneous landscapes, other multi-cloud ecosystems, and IT resources on the Oracle cloud to gain unified asset monitoring, asset health checks, threat alerting, incident reporting, threat containment, and risk eradication measures across all enterprise locations and environments 24\/7. Leverage advanced OCI native tools such as Oracle Advanced Security, Oracle Audit Vault and Database Firewall, Oracle Data Masking and Subsetting, Oracle Data Safe, Oracle Database Security Assessment Tool, Oracle Database Vault, Oracle Key Vault, Oracle Label Security<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1177699585\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1177699585\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-3b8cc7e e-flex e-con-boxed e-con e-child\" data-id=\"3b8cc7e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-103ab0f e-con-full e-flex e-con e-child\" data-id=\"103ab0f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b35fd4 elementor-widget elementor-widget-text-editor\" data-id=\"8b35fd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel7\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"myTab\" class=\"custom-tabs custom-tabs-mdr\"><div class=\"pb50\"><div class=\"tab-content-mdr\"><div id=\"htab-4\" class=\"tab-pane active\"><p>Gain universal security over all workloads, workflows, and task flows across multiple IT environments, service models, and heterogeneous landscapes running on the cloud. Integrate stringent cloud based security solutions, embed cloud-native security tools and applications, and preserve asset integrity with system integrity monitoring:<\/p><ul class=\"bulleted-list\"><li><span class=\"txt-bold\">PaaS and Serverless Workloads Protection:<\/span>\u00a0Runtime protection, Vulnerability Scanning, Automatic Configuration and systems hardening, Endpoint workloads security, network protection<\/li><li><span class=\"txt-bold\">CaaS and Managed Kubernetes Workloads:<\/span>\u00a0CI\/CD Scanning, Hardening and Compliance Checks, runtime protection, container to container micro-segmentation, incident response, and forensic analysis<\/li><li><span class=\"txt-bold\">VMs, Hosted Assets, and IaaS Workloads:<\/span>\u00a0Automated auditing and monitoring of configurations, identity, and access management tools, data protection, automated vulnerability management, file integrity monitoring, automated compliance modeling<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-deee638 e-flex e-con-boxed e-con e-parent\" data-id=\"deee638\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84836ca elementor-widget__width-initial e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"84836ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;stretch&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"138950346\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1389503461\" data-tab-title-id=\"e-n-tab-title-1389503461\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1389503461\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tCloud Access Security <br> Broker (CASB)\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1389503462\" data-tab-title-id=\"e-n-tab-title-1389503462\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1389503462\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tMulti-cloud Security<br> Posture Management (CSPM)\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1389503463\" data-tab-title-id=\"e-n-tab-title-1389503463\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1389503463\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAdvanced Managed Detection <br>and Response (MDR)\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1389503464\" data-tab-title-id=\"e-n-tab-title-1389503464\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1389503464\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tManaged Endpoint Detection <br>and Response (Managed EDR)\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1389503465\" data-tab-title-id=\"e-n-tab-title-1389503465\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1389503465\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tInfra security Management\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1389503461\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1389503461\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-7765565 e-con-full e-flex e-con e-child\" data-id=\"7765565\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-5b03ad5 e-flex e-con-boxed e-con e-child\" data-id=\"5b03ad5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b18cc93 elementor-widget elementor-widget-text-editor\" data-id=\"b18cc93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Gain complete visibility over your adopted public clouds: user actions and access controls, cloud data flows between adopted cloud environments, and user devices\/infra. Achieve advanced information security, analytics, and threat intelligence capabilities to secure dataflows between enterprise core systems and end-users. Extend security and compliance policies running and protecting systems\/VMs\/applications on the cloud provider platform to divergent on-prem infrastructure, privately controlled facilities, and endpoint devices.<\/p><ul class=\"bulleted-list\"><li>Access control and user behavior analytics<\/li><li>Security management between cloud and on-premise<\/li><li>Complete visibility of dataflow between systems and processes<\/li><li>Implementation of advanced threat management solutions<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1389503462\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1389503462\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-ecfb820 e-con-full e-flex e-con e-child\" data-id=\"ecfb820\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-dc19cf0 e-flex e-con-boxed e-con e-child\" data-id=\"dc19cf0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bbefc71 elementor-widget elementor-widget-text-editor\" data-id=\"bbefc71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-2\" class=\"tab-pane active\"><div id=\"htab-2\" class=\"tab-pane active\"><p>Assess organization security posture for multiple public clouds from a single, unified interface. Check for compliance adherence across all processes and solution implementations, assess resource\/asset health metrics, integrate risk management tools, cloud data analytics, and enforce tailored policies to bolster universal security across the entire landscape.<\/p><ul class=\"bulleted-list\"><li>Multicloud security posture assessment and evaluation<\/li><li>Asset Inventory Management<\/li><li>Misconfiguration monitoring and remediation<\/li><li>Compliance monitoring and reporting<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1389503463\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1389503463\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-a7bc4b8 e-flex e-con-boxed e-con e-child\" data-id=\"a7bc4b8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-34e20c5 e-con-full e-flex e-con e-child\" data-id=\"34e20c5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-559fed8 elementor-widget elementor-widget-text-editor\" data-id=\"559fed8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><p>CloudEngin advanced Managed Detection and Response solution and services deliver 360-degree protection of your organization, automating 24\/7 real-time monitoring, threat hunting\/risk prediction alerting, threat detection, and risk mediation. Gain deeper risk insights over your infra assets including data, networks, workloads, traffic, devices with ease and avail end-to-end response management: Threat and Mal Containment, Incident Analysis, Data Exploration, Response Orchestration. Secure your end-point connectivity with AI-powered End-Point Protection and Response Platform.<\/p><ul class=\"bulleted-list\"><li>End-to-end network security: Network Traffic Analysis and Protection<\/li><li>Real-time Monitoring and Asset Protection: Hosts infra, web applications, apps, devices, servers, Virtual solutions, Databases, Storage infra, cloud platforms, integrated third-party systems<\/li><li>Host-based Security Systems<\/li><li>Endpoint Detection and Response<\/li><li>Threat Hunting, Threat Investigation and Verification<\/li><li>Threat Research and Intelligence<\/li><li>AI\/ML, Data-powered User Behaviour Analytics<\/li><li>End-to-end Data Security: Data Protection and Forensics<\/li><li>Database Activity Monitoring (DAM)<\/li><li>MITRE ATT&amp;CK Mapping<\/li><li>Incident Containment, Analysis, Management<\/li><li>Cloud-native Security with Multicloud Support<\/li><li>Centralized Remote Response<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1389503464\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1389503464\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-7325dc2 e-flex e-con-boxed e-con e-child\" data-id=\"7325dc2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-db350df e-con-full e-flex e-con e-child\" data-id=\"db350df\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-831a7e5 elementor-widget elementor-widget-text-editor\" data-id=\"831a7e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel7\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"myTab\" class=\"custom-tabs custom-tabs-mdr\"><div class=\"pb50\"><div class=\"tab-content-mdr\"><div id=\"htab-4\" class=\"tab-pane active\"><div id=\"htab-4\" class=\"tab-pane active\"><p>Conventional End-Point Protection Solutions are preventive with stringent implementation approaches that are signature-based &#8211; identifying threats based on known file signatures for newly discovered threats. CloudEngin moves the level much higher with the advanced Endpoint Detection and Response (EDR) platform. The solution combines next-gen antivirus capabilities with additional intelligent tools to deliver real-time anomaly detection and alerting, forensic analysis, and endpoint remediation capabilities. Record every file execution and modification, registry change, network connection, and binary execution across your endpoints.<\/p><ul class=\"bulleted-list\"><li>Last-mile protection<\/li><li>Alert triage and remediation<\/li><li>Contain Malicious Activity<\/li><li>Threat Hunting and Data Exploration<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1389503465\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1389503465\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-6e40e26 e-flex e-con-boxed e-con e-child\" data-id=\"6e40e26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-28ba538 e-con-full e-flex e-con e-child\" data-id=\"28ba538\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41e9780 elementor-widget elementor-widget-text-editor\" data-id=\"41e9780\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel7\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"myTab\" class=\"custom-tabs custom-tabs-mdr\"><div class=\"pb50\"><div class=\"tab-content-mdr\"><div id=\"htab-4\" class=\"tab-pane active\"><p>CloudEngin provides comprehensive cloud computing security strategy, blueprinting, POC, and implementation services for any cloud, any platform. Avail end-to-end infra and assets security including data, applications, workloads, and backend assets for widely adopted public cloud platforms such as AWS (Amazon Web Services), Microsoft Azure, Google Cloud Platform (GCP), Oracle Cloud, etc. Integrate advanced AI-powered cloud-native security solutions such as Azure Sentinel, Amazon Cloudwatch, AWS Security Hub, CloudTrail, GCP Security, and more. Secure your IaaS, PaaS, SaaS, CaaS architectures with ease with end-to-end cloud cybersecurity management. Gain 24\/7 cybersecurity consulting and support.<\/p><ul class=\"bulleted-list\"><li>Cloud Security Strategy and Blueprinting Services<\/li><li>Compliant Cloud Security Offerings<\/li><li>(Platform-as-a-Service) PaaS Security &#8211; Runtime protection, vulnerability management, Automatic configuration of security policies, network protection, secure endpoint<\/li><li>(Infrastructure-as-a-Service) IaaS Security &#8211; Automated auditing and monitoring, Identity Access Management, Data and Infra protection, Vulnerability Management and File Integrity Monitoring, Micro-Segmentation, Automated Compliance Monitoring<\/li><li>(Container-as-a-Service) CaaS Security &#8211; Managed Kubernetes security, container workload security management, CI\/CD Scanning, Container-to-container micro-segmentation, Access Controls, incident response, forensic analysis<\/li><li>(Software-as-a-Service) SaaS Security &#8211; Network, platforms, systems, monitoring, and protection including firewalls, servers, emails, web applications<\/li><li>Cloud Workload Protection Platforms (CWPP) &#8211; VMs, Hosts, IaaS, PaaS, CaaS, SaaS, data<\/li><li>Cloud Security Posture Management (CSPM) &#8211; Multi-cloud security posture, Asset Inventory Management, Misconfiguration Monitoring, and Remediation, Compliance Monitoring and Reporting<\/li><li>Cloud Access Security Broker (CASB) &#8211; Overall visibility, Threat Protection, Data Security, Access Control Management<\/li><li>Hybrid\/Multi-cloud managed security services<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b59d824 e-flex e-con-boxed e-con e-parent\" data-id=\"b59d824\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c390cb elementor-widget__width-initial e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"4c390cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;stretch&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"79925451\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-799254511\" data-tab-title-id=\"e-n-tab-title-799254511\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-799254511\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tSecurity Operations Center <br>(SOC) Managed Services\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-799254512\" data-tab-title-id=\"e-n-tab-title-799254512\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-799254512\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tDevSecOps\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-799254513\" data-tab-title-id=\"e-n-tab-title-799254513\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-799254513\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tCybersecurity Assessment<br> Services\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-799254514\" data-tab-title-id=\"e-n-tab-title-799254514\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-799254514\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tCompliance as a Service\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-799254515\" data-tab-title-id=\"e-n-tab-title-799254515\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-799254515\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tThreat Intelligence Solutions\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-799254511\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-799254511\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-ab0e08a e-con-full e-flex e-con e-child\" data-id=\"ab0e08a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-347541a e-flex e-con-boxed e-con e-child\" data-id=\"347541a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc400ec elementor-widget elementor-widget-text-editor\" data-id=\"fc400ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>As a managed SOC (Security Operations Center) services provider, CloudEngin acts as an extended Cybersecurity Incident and Response Team (CSIRT) to your security management, delivers the entire monitoring and threat management work for the cloud computing platform with ease, and assists your organization in the adoption of breakthrough cybersecurity frameworks, methodologies, and intelligent solutions.<\/p><ul class=\"bulleted-list\"><li>SIEM-SOAR<\/li><li>Identity and Access Management<\/li><li>Advanced Threat Protection (ATP)<\/li><li>Assets Security Management: Data, Host, Networks, Apps, Virtualization, Emails, Workloads, Workflows<\/li><li>24\/7 Monitoring and Threat Response<\/li><li>Centralized security management console<\/li><li>Incident Recovery and Remediation<\/li><li>Log Collection and Management<\/li><li>Root Cause Analysis<\/li><li>Vulnerability Management and Preventive Maintenance<\/li><li>AI-powered Cybersecurity Solutions<\/li><li>Alert Management<\/li><li>Response Orchestration and Automation<\/li><li>Compliance Audits<\/li><li>Reporting and Dashboarding<\/li><li>Advanced Penetration Testing<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-799254512\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-799254512\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-179105b e-con-full e-flex e-con e-child\" data-id=\"179105b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-313c9db e-flex e-con-boxed e-con e-child\" data-id=\"313c9db\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bb1e813 elementor-widget elementor-widget-text-editor\" data-id=\"bb1e813\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-2\" class=\"tab-pane active\"><div id=\"htab-2\" class=\"tab-pane active\"><p>With the development processes now getting more complicated and cyberthreats exponentially rising, it\u2019s wiser to integrate continual security policies, processes, and technologies into the DevOps culture and workflows. Following \u2018Security by Design\u2019, CloudEngin helps embed security as a core discipline in the development of IT systems, tools, microservices, containers, automation, APIs, testing tools. Integrate AWS, GCP, OCI, and Azure native DevSecOps tools to further shield development workflows inside the multi-cloud environments. Below is the CloudEngin DevSecOps overview:<\/p><ul class=\"bulleted-list\"><li>Address Security Objectives and Threat Modelling<\/li><li>IDE Security Plug-ins<\/li><li>SAST\/DAST\/IAST SCA<\/li><li>Integration Testing<\/li><li>Software Signing<\/li><li>Signature Verification and Defense Depth Measurement<\/li><li>RASP UEBA\/Network Monitoring Pen Test<\/li><li>Security Orchestration, RASP\/WAF Shielding Obfuscation<\/li><li>Dev Consumable Correlated Vulnerability Analysis: IoC\/TI STIX TAXI<\/li><li>Modified Incident Response Management<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-799254513\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-799254513\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-ce8acc8 e-flex e-con-boxed e-con e-child\" data-id=\"ce8acc8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c4af236 e-con-full e-flex e-con e-child\" data-id=\"c4af236\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cfb47d8 elementor-widget elementor-widget-text-editor\" data-id=\"cfb47d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><p>Avail strategic recommendations from CloudEngin to better monitor and manage your organizational security on-premise or on the cloud. Gain detailed assessments on the overall organizational security postures, access control reviews, incident response management, compliance audits, and technical implementation suggestions for greater data, network, servers, apps protection. CloudEngin extensive cybersecurity assessment and consulting services are as follows:<\/p><ul class=\"bulleted-list\"><li>Public Discovery Scanning Services<\/li><li>Vulnerability Assessment Services<\/li><li>Compliance audits and reporting<\/li><li>Data classification and segmentation<\/li><li>Assets (Databases, Networks, Host-based Security Systems, Virtualization) security review, monitoring, and misconfiguration management<\/li><li>Web application security testing services<\/li><li>PCI-DSS ASV Scanning<\/li><li>Advanced Black Box Penetration Testing Services<\/li><li>Malware-Ransomware Detection and Scanning<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-799254514\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-799254514\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-2f84c24 e-flex e-con-boxed e-con e-child\" data-id=\"2f84c24\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-31ceeda e-con-full e-flex e-con e-child\" data-id=\"31ceeda\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-679676f elementor-widget elementor-widget-text-editor\" data-id=\"679676f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel7\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"myTab\" class=\"custom-tabs custom-tabs-mdr\"><div class=\"pb50\"><div class=\"tab-content-mdr\"><div id=\"htab-4\" class=\"tab-pane active\"><div id=\"htab-4\" class=\"tab-pane active\"><p>CloudEngin compliant-ready offerings along with dedicated Quality Management and Security teams ensure client facilities are duly compliant with data localization-residency laws, national regulations, local compliances, and international certifications. CloudEngin augments your IT security to truly world-class standards. Compliance adherences, not limited to are:<\/p><ul class=\"bulleted-list\"><li>IRAP<\/li><li>Bank Negara<\/li><li>Central Bank of Oman<\/li><li>SAMA<\/li><li>FINMA<\/li><li>UAE Compliances<\/li><li>RBI<\/li><li>MAS<\/li><li>OJK<\/li><li>GDPR<\/li><li>CSA<\/li><li>PCI-DSS<\/li><li>HIPAA<\/li><li>GXP<\/li><li>International Standards: ISO-27001, ISO-27017, ISO-27018, ISO-22301, ISO-20000, AICPA SOC, AICPA SOC2<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-799254515\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-799254515\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-9588138 e-flex e-con-boxed e-con e-child\" data-id=\"9588138\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c2c6fc6 e-con-full e-flex e-con e-child\" data-id=\"c2c6fc6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f1a445 elementor-widget elementor-widget-text-editor\" data-id=\"7f1a445\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel7\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"myTab\" class=\"custom-tabs custom-tabs-mdr\"><div class=\"pb50\"><div class=\"tab-content-mdr\"><div id=\"htab-4\" class=\"tab-pane active\"><p>CloudEngin advanced security intelligence solutions offer deep threat hunting, advanced data forensics, anomaly detection, and automated response management with ease. Consolidate cybersecurity management for IP\/Domain Reputation, File Reputation, CWPP, CSPM, CASB, Phishing-malware-ransomware feeds, IT assets. Avail the proprietary Self Healing or Preventive Maintenance Platform (SHOP) to not only reduce Meantime to Detect and Meantime to Repair but do away with threats via advanced risk prediction and automated risk healing processes.<\/p><ul class=\"bulleted-list\"><li>Powered by Industry-leading platforms such as Microsoft, OSINT, STIX&amp;TAXI, MIS<\/li><li>Up-to-date threat intelligence consolidated from multiple sources<\/li><li>Segregation based on customer industry and vertical for focused analysis<\/li><li>Improves threat-hunting and forensic capabilities with contextual, actionable threat indicators<\/li><li>Augment your security capability with our rigorous analysis by CloudEngin security Experts.<\/li><li>Seamless integration with major TIP, SIEM, and SOAR<\/li><li>Automated Threat Research and Analysis<\/li><li>Last-mile data extraction and protection<\/li><li>Automated Threat Prediction, Detection, Mitigation, and Preventive Maintenance (Self-Healing Operations)<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9249b39 e-flex e-con-boxed e-con e-parent\" data-id=\"9249b39\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c49cd5c e-con-full e-flex e-con e-child\" data-id=\"c49cd5c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33b952c elementor-widget elementor-widget-heading\" data-id=\"33b952c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Connect with our Public Cloud Security Experts\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-36be138 e-con-full e-flex e-con e-child\" data-id=\"36be138\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-490b809 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"490b809\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1df9900 e-flex e-con-boxed e-con e-parent\" data-id=\"1df9900\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41fe8c1 elementor-widget elementor-widget-heading\" data-id=\"41fe8c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Difference: Why Avail CloudEngin managed public cloud security Services?<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc435f4 e-con-full e-flex e-con e-child\" data-id=\"fc435f4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0ed1536 e-con-full e-flex e-con e-child\" data-id=\"0ed1536\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-232df7a elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"232df7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/classic_infrastructure_icon_216392.png\" class=\"attachment-large size-large wp-image-959\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/classic_infrastructure_icon_216392.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/classic_infrastructure_icon_216392-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/classic_infrastructure_icon_216392-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24aa5c1 elementor-widget elementor-widget-text-editor\" data-id=\"24aa5c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>World\u2019s largest Application-focused Managed Cloud Services Provider and one of the leading managed cybersecurity companies. Dedicated cybersecurity assessment services.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e9a9d1d e-con-full e-flex e-con e-child\" data-id=\"e9a9d1d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-04d99b9 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"04d99b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/globe_hemisphere_west_icon_175159.png\" class=\"attachment-large size-large wp-image-1063\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/globe_hemisphere_west_icon_175159.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/globe_hemisphere_west_icon_175159-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/globe_hemisphere_west_icon_175159-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57fffb7 elementor-widget elementor-widget-text-editor\" data-id=\"57fffb7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Serving 2500+ enterprises including 50+ Global Fortune 1000 Companies in 29 countries across Americas, Europe, Middle East, and APAC for 12+ years<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e8c9597 e-con-full e-flex e-con e-child\" data-id=\"e8c9597\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-421069f elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"421069f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-12_13-29-38.jpg\" class=\"attachment-large size-large wp-image-967\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-12_13-29-38.jpg 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-12_13-29-38-300x300.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-12_13-29-38-150x150.jpg 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de2510e elementor-widget elementor-widget-text-editor\" data-id=\"de2510e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>40+ Security Controls, 20+ Centres of Excellence, 1600+ global cloud experts<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-79d4bbc e-con-full e-flex e-con e-child\" data-id=\"79d4bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-19dfe77 e-con-full e-flex e-con e-child\" data-id=\"19dfe77\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-60f42e0 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"60f42e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023.png\" class=\"attachment-large size-large wp-image-1051\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb08d12 elementor-widget elementor-widget-text-editor\" data-id=\"eb08d12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Pre-met compliance needs for local, national, and global compliance requirements including IRAP, GDPR, HIPAA, SAMA, CSA, GXP, and ISO Certifications<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fd1bbee e-con-full e-flex e-con e-child\" data-id=\"fd1bbee\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-048e8c2 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"048e8c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-30-23.jpg\" class=\"attachment-large size-large wp-image-1048\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-30-23.jpg 500w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-30-23-300x300.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-30-23-150x150.jpg 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f06738 elementor-widget elementor-widget-text-editor\" data-id=\"3f06738\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>3200 UTMs, 13000 HBSS, 800000 EPS<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ed24e1a e-con-full e-flex e-con e-child\" data-id=\"ed24e1a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e984c5b elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"e984c5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/08dbb3cd-17cb-44fc-8013-f7705d93bf3f.svg\" class=\"attachment-large size-large wp-image-970\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-630529b elementor-widget elementor-widget-text-editor\" data-id=\"630529b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>7 Security frameworks utilizing the MITRE ATT&amp;CK, CIS Critical Security Controls, and more<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-36774b7 e-con-full e-flex e-con e-child\" data-id=\"36774b7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-adde65f e-con-full e-flex e-con e-child\" data-id=\"adde65f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4239fdb elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"4239fdb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"222\" height=\"227\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/25.jpg\" class=\"attachment-large size-large wp-image-1006\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-636f4b1 elementor-widget elementor-widget-text-editor\" data-id=\"636f4b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Comprehensive 24&#215;7 cybersecurity monitoring program<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-952f336 e-con-full e-flex e-con e-child\" data-id=\"952f336\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0b3489f elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"0b3489f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/7kp8jmDB8u93NNKUrrFFJpEZwMlqFwYeq5ATHCMjusmoLfcvrJYzR1MK5F0Wjj0eCPBjpRLQZ0zOxmS-3ZU27Wy.jpg\" class=\"attachment-large size-large wp-image-1008\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/7kp8jmDB8u93NNKUrrFFJpEZwMlqFwYeq5ATHCMjusmoLfcvrJYzR1MK5F0Wjj0eCPBjpRLQZ0zOxmS-3ZU27Wy.jpg 200w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/7kp8jmDB8u93NNKUrrFFJpEZwMlqFwYeq5ATHCMjusmoLfcvrJYzR1MK5F0Wjj0eCPBjpRLQZ0zOxmS-3ZU27Wy-150x150.jpg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-951c9c1 elementor-widget elementor-widget-text-editor\" data-id=\"951c9c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Advanced CloudEngin Cybersecurity Incident and Response (CSIRT) team<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-028e9d3 e-con-full e-flex e-con e-child\" data-id=\"028e9d3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d824ce9 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"d824ce9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf.png\" class=\"attachment-large size-large wp-image-1050\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39a915c elementor-widget elementor-widget-text-editor\" data-id=\"39a915c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Automated Security Solutions for threat prediction, detection, and response: Advanced Managed Detection and Response Solutions (MDR) including Endpoint Detection and Response (EDR) for deep data security purposes<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f2d1c22 e-con-full e-flex e-con e-child\" data-id=\"f2d1c22\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-896c108 e-con-full e-flex e-con e-child\" data-id=\"896c108\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b2cd319 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"b2cd319\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4496384.png\" class=\"attachment-large size-large wp-image-1041\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4496384.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4496384-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4496384-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f16dc4 elementor-widget elementor-widget-text-editor\" data-id=\"1f16dc4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Global expertise in managed SOC (Security Operations Center) services and solutions dedicated to Data Security Management<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f4e752b e-con-full e-flex e-con e-child\" data-id=\"f4e752b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15c697f elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"15c697f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023.png\" class=\"attachment-large size-large wp-image-1051\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a418948 elementor-widget elementor-widget-text-editor\" data-id=\"a418948\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Dedicated Cybersecurity Consulting, Cybersecurity Assessment, and Audit Reporting offerings<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee3768b e-con-full e-flex e-con e-child\" data-id=\"ee3768b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a09a02 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"5a09a02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6277940.png\" class=\"attachment-large size-large wp-image-1052\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6277940.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6277940-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6277940-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c92093 elementor-widget elementor-widget-text-editor\" data-id=\"2c92093\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Advanced CloudEngin Cybersecurity Incident and Response (CSIRT) team<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e3f241 e-con-full e-flex e-con e-child\" data-id=\"7e3f241\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f45d574 e-con-full e-flex e-con e-child\" data-id=\"f45d574\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-737e2df elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"737e2df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/artificial-intelligence-1743104-1482205.png\" class=\"attachment-large size-large wp-image-1053\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/artificial-intelligence-1743104-1482205.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/artificial-intelligence-1743104-1482205-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/artificial-intelligence-1743104-1482205-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d10d78a elementor-widget elementor-widget-text-editor\" data-id=\"d10d78a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Threat Intelligence powered by Industry-leading platforms such as Microsoft, OSINT, STIX&amp;TAXI, MISP, etc. and CloudEngin Threat experts<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6bf1259 e-con-full e-flex e-con e-child\" data-id=\"6bf1259\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-95b9d25 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"95b9d25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146.png\" class=\"attachment-large size-large wp-image-1054\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146.png 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-150x150.png 150w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb8b326 elementor-widget elementor-widget-text-editor\" data-id=\"cb8b326\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Considerable data threat and vulnerability management experience in securing large and complex environments with leading industry tools, proprietary Self-Healing Operations Platform, and cloud-native tools<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-77fac65 e-con-full e-flex e-con e-child\" data-id=\"77fac65\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8550467 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"8550467\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169.png\" class=\"attachment-large size-large wp-image-1056\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-112e01c elementor-widget elementor-widget-text-editor\" data-id=\"112e01c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Experience in deploying and managing robust SIEM \u2013 helping enterprises to proactively assess vulnerabilities and automate, accelerate incident response<\/p><\/div><\/div><\/div><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1263ac e-con-full e-flex e-con e-child\" data-id=\"f1263ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-87da0ec e-con-full e-flex e-con e-child\" data-id=\"87da0ec\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34aeea8 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"34aeea8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/sistem-icon.png\" class=\"attachment-large size-large wp-image-1057\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/sistem-icon.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/sistem-icon-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/sistem-icon-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-799cff9 elementor-widget elementor-widget-text-editor\" data-id=\"799cff9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"differentiators\"><div class=\"row justify-content-center equal-height-parent-11\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Comprehensive expertise in the public cloud, hybrid, private, multi-cloud data security management services especially powered by AWS, Azure, GCP, Oracle Cloud, IBM Cloud<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"faq\" class=\"faq-wrapper\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-629b2d6 e-flex e-con-boxed e-con e-parent\" data-id=\"629b2d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4c8b08d e-con-full e-flex e-con e-child\" data-id=\"4c8b08d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-afa5390 e-con-full e-flex e-con e-child\" data-id=\"afa5390\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8c11a0d elementor-widget elementor-widget-heading\" data-id=\"8c11a0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Solidify your Enterprise Cybersecurity with CloudEngin\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3f511e3 e-con-full e-flex e-con e-child\" data-id=\"3f511e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a3a9202 elementor-widget elementor-widget-text-editor\" data-id=\"a3a9202\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Schedule a consultation with our Cloud experts and get answers for any specific queries you may have. You can also schedule a visit to our Datacenters, or share feedback on our website and services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9bf6960 e-con-full e-flex e-con e-child\" data-id=\"9bf6960\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0298507 elementor-widget elementor-widget-heading\" data-id=\"0298507\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Get in Touch<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ef8afc elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"7ef8afc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"New Form\" aria-label=\"New Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"517\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"7ef8afc\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Public Cloud Security Solutions\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"517\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tName\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Name\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Email\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_815e145 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_815e145\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tTel\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_815e145]\" id=\"form-field-field_815e145\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Tel\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Only numbers and phone characters (#, -, *, etc) are accepted.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_169bf39 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_169bf39\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCompany\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_169bf39]\" id=\"form-field-field_169bf39\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Company\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tMessage\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"5\" placeholder=\"Your Message...\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_2c751e3 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_2c751e3]\" id=\"form-field-field_2c751e3\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-field_2c751e3\">I\u2019d like to receive more information from CloudEngin. By submitting this form, I am providing consent to receive marketing communications and I understand and agree to the usage of my corporate contact information in accordance with CloudEngin privacy statement.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Submit<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d9d6e6 elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"4d9d6e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"form\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Public Cloud Security Solutions Secure cloud environments. Deploy enterprise workloads across multiple clouds with ease. Integrate hyper-performing cloud services with [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-517","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=517"}],"version-history":[{"count":43,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/517\/revisions"}],"predecessor-version":[{"id":4172,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/517\/revisions\/4172"}],"wp:attachment":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}