{"id":544,"date":"2025-11-07T13:43:08","date_gmt":"2025-11-07T13:43:08","guid":{"rendered":"https:\/\/dev.cloudengin.com\/?page_id=544"},"modified":"2026-01-14T15:30:39","modified_gmt":"2026-01-14T15:30:39","slug":"data-forensics","status":"publish","type":"page","link":"https:\/\/www.cloudengin.com\/?page_id=544","title":{"rendered":"Data Forensics"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"544\" class=\"elementor elementor-544\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-672d687 e-flex e-con-boxed e-con e-parent\" data-id=\"672d687\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db14b67 elementor-widget elementor-widget-heading\" data-id=\"db14b67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Forensic Data Analysis\nForensic Data Analysis \nand Services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12f9255 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"12f9255\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"pb30\">Smart Data Forensics. Actionable Intelligence. Unlimited business value generated by secure relevant data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08c69f8 elementor-widget elementor-widget-button\" data-id=\"08c69f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a32902b e-flex e-con-boxed e-con e-parent\" data-id=\"a32902b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-813a5b7 e-con-full e-flex e-con e-child\" data-id=\"813a5b7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-23ac420 elementor-widget elementor-widget-heading\" data-id=\"23ac420\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Make Data Forensics Your Biggest Asset. Uncovering Fraudulent Activities. Unlock Continuous Business Improvement.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c976fd e-con-full e-flex e-con e-child\" data-id=\"4c976fd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-06c50ed elementor-widget elementor-widget-text-editor\" data-id=\"06c50ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><div id=\"cybersecurity-auditing\" class=\"row pb40 pb15-m\"><div class=\"col-md-7\"><div class=\"col-left col-lg-6\"><div class=\"col-left col-lg-6\"><div class=\"col-left col-lg-6\"><p>Mitigating risks, handling crises, accelerating growth strategies, optimizing emerging business opportunities, and competing effectively are high-time demands for creating valuable business insights alongside increase the effectiveness of operational processes from available data sources. Though data experts are delivering plenty of domain expertise, agility and responsiveness, they are grappling to achieve consistency, repeatability or scalability across data sources. An agile, resilient forensic data analysis is critical to today\u2019s business aftereffect while generating measurable economic benefits.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bb2d0ff e-flex e-con-boxed e-con e-parent\" data-id=\"bb2d0ff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cb32572 e-con-full e-flex e-con e-child\" data-id=\"cb32572\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0168f93 elementor-widget elementor-widget-heading\" data-id=\"0168f93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Forensics Data Analysis with CloudEngin: Enable Data-empowered Intelligent Forensic Investigation\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-240356a e-con-full e-flex e-con e-child\" data-id=\"240356a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e04768 elementor-widget elementor-widget-text-editor\" data-id=\"6e04768\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><div id=\"cybersecurity-auditing\" class=\"row pb40 pb15-m\"><div class=\"col-md-7\"><div class=\"col-left col-lg-6\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"ms-365-ecosystem\" class=\"row\"><div class=\"col-md-6\"><div id=\"data-analysis\" class=\"row pb40 pb15-m\"><div class=\"col-md-5\"><p class=\"pt15-m\">Handling complex data is time-consuming and resource-intensive. To make the process straightforward and manageable aid businesses analyze massive data to discover high-risk financial relationships and actions, perform analyses timely, and apply protocols to reduce risks and improve internal controls proactively.<\/p><\/div><\/div><div class=\"row\"><div class=\"col-md-12\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3447fdb e-con-full e-flex e-con e-child\" data-id=\"3447fdb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b73b823 elementor-widget elementor-widget-text-editor\" data-id=\"b73b823\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><div id=\"cybersecurity-auditing\" class=\"row pb40 pb15-m\"><div class=\"col-md-7\"><div class=\"col-left col-lg-6\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"ms-365-ecosystem\" class=\"row\"><div class=\"col-md-6\"><div id=\"data-analysis\" class=\"row pb40 pb15-m\"><div class=\"col-md-5\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div class=\"row\"><div class=\"col-md-12\"><p>CloudEngin forensic data analysis service focuses on revealing fraudulent activity patterns inside data while maintaining data integrity. Our advisory services offer a comprehensive approach based on each vertical\u2019s specifics along with extensive operational expertise to identify new business markets and better growth opportunities. We enable organizations to extend additional business advantages such as predicting potential misconduct or fraudulent behaviour, advancing business transparency, and boosting operational efficiency. Protect existing databases and persistent data with advanced security software, preserve volatile data and digital evidence or footprints, and retrieve deleted data on PCs, storage systems, mobile devices, office applications, and more. professionals reverse engineering methods legal entities technical steps<\/p><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-94105d3 e-flex e-con-boxed e-con e-parent\" data-id=\"94105d3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d81695 elementor-widget elementor-widget-heading\" data-id=\"2d81695\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Benefits of Using Data Forensics in Your\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31ad691 elementor-widget elementor-widget-text-editor\" data-id=\"31ad691\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div id=\"benefits\"><div class=\"row pb50 justify-content-center\"><h2 class=\"text-center\">Organization:\u00a0<span class=\"txt-blue\">Preventing Data Theft and Much More<\/span><\/h2><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2bfe35a e-flex e-con-boxed e-con e-parent\" data-id=\"2bfe35a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5d5e305 e-con-full e-flex e-con e-child\" data-id=\"5d5e305\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-515d9a4 e-con-full e-flex e-con e-child\" data-id=\"515d9a4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ddcea09 e-con-full e-flex e-con e-child\" data-id=\"ddcea09\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57a5857 elementor-widget elementor-widget-heading\" data-id=\"57a5857\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Retrieving Deleted Information\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26224d5 elementor-widget elementor-widget-text-editor\" data-id=\"26224d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-3 different-height-md\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p>For a critical data breach or identity theft, it is imperative to recover deleted information. Forensics data analysis deploys complex tools and techniques to retrieve information and present it in courts of law or where data recovery is essential.<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-85c9d7e e-con-full e-flex e-con e-child\" data-id=\"85c9d7e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d511a7d e-con-full e-flex e-con e-child\" data-id=\"d511a7d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f51f655 elementor-widget elementor-widget-heading\" data-id=\"f51f655\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Assess and Improve Internal Controls\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd1327f elementor-widget elementor-widget-text-editor\" data-id=\"dd1327f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-4 different-height-md\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p>Forensic data analysis can review financial transactions and aid organizations to determine whether their internal controls are working efficiently. Using abnormal data trends, potential vulnerabilities can be spotted that enable organizations to strengthen their internal controls and mitigate any fraud risks proactively.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-138fc3f e-con-full e-flex e-con e-child\" data-id=\"138fc3f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1bb2477 e-con-full e-flex e-con e-child\" data-id=\"1bb2477\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-adcd870 elementor-widget elementor-widget-heading\" data-id=\"adcd870\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Increased Efficiency and Effectiveness\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bb30c3 elementor-widget elementor-widget-text-editor\" data-id=\"5bb30c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"Benefits\" class=\"icons-bunch\"><div class=\"row\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"pcs-card\"><div class=\"row justify-content-center\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-5 different-height-md\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p>Organizations employ forensic data analysis to examine massive data in their internal audits\/investigations. This allows forensic investigators to conduct more complicated tests using technology that also reduces human errors. Forensic data analysis enables organizations to examine growing transactional data at a time than data sampling only. It helps reduce sample errors and increases the potential for detecting anomalies precisely.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-black\"><div class=\"container\"><div class=\"\"><div class=\"info-section max-width\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0d334ff e-con-full e-flex e-con e-child\" data-id=\"0d334ff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2f228cf e-con-full e-flex e-con e-child\" data-id=\"2f228cf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-86218b2 e-con-full e-flex e-con e-child\" data-id=\"86218b2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2b3e31 elementor-widget elementor-widget-heading\" data-id=\"e2b3e31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Monitor Trends\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c51f2b elementor-widget elementor-widget-text-editor\" data-id=\"3c51f2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-3 different-height-md\"><div class=\"pcs-card-con no-margin-d equal-height \"><div><p>Forensic data analysis gives an extensive review of trends based on historical and current data and equips organizations to determine the areas\/scope for improvements. With this information, forensic experts can focus on weak areas while determining if potentially fraudulent activity is occurring within the organization.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-887808a e-con-full e-flex e-con e-child\" data-id=\"887808a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-cb186fd e-con-full e-flex e-con e-child\" data-id=\"cb186fd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba0512e elementor-widget elementor-widget-heading\" data-id=\"ba0512e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Revise and Reinforce Policies\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-299890b elementor-widget elementor-widget-text-editor\" data-id=\"299890b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-4 different-height-md\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p>Forensic data analysis&#8217; outcomes are capable of perceiving, developing, or revising policies. These outcomes support organizations to determine specific areas where employees are required to gain additional training and expertise.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bfbf2f1 e-flex e-con-boxed e-con e-parent\" data-id=\"bfbf2f1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ade9899 e-con-full e-flex e-con e-child\" data-id=\"ade9899\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74388cc elementor-widget elementor-widget-heading\" data-id=\"74388cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Identify patterns and anomalies faster.\nTalk to our cybersecurity experts.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0a6147a e-con-full e-flex e-con e-child\" data-id=\"0a6147a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3832008 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"3832008\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f4c7fc1 e-flex e-con-boxed e-con e-parent\" data-id=\"f4c7fc1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f97776 elementor-widget elementor-widget-heading\" data-id=\"3f97776\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mapping Forensic Data Analysis\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ab72474 e-flex e-con-boxed e-con e-parent\" data-id=\"ab72474\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f934d94 e-grid e-con-full e-con e-child\" data-id=\"f934d94\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-20fec98 e-con-full e-flex e-con e-child\" data-id=\"20fec98\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ca5a3e2 e-con-full e-flex e-con e-child\" data-id=\"ca5a3e2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ce94abd e-con-full e-flex e-con e-child\" data-id=\"ce94abd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1f2a498 e-con-full e-flex e-con e-child\" data-id=\"1f2a498\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b6a949 elementor-widget elementor-widget-heading\" data-id=\"9b6a949\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Step 1: Developing Procedure and Policies\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd5a30f elementor-widget elementor-widget-text-editor\" data-id=\"fd5a30f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"Benefits\" class=\"icons-bunch\"><div class=\"row\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"pcs-card\"><div class=\"row justify-content-center\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-5 different-height-md\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height \"><div><p>Cybersecurity specialists understand how valuable the data is and are aware that it can be compromised if it isn\u2019t handled appropriately. Thus, it&#8217;s crucial to create protocols that can specify how to set up mechanisms for retrieving evidence, where to store the retrieved evidence and when to authorize forensic investigators to recover prospective evidence, and how to document the operations.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div>\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-66141f1 e-con-full e-flex e-con e-child\" data-id=\"66141f1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d046c62 e-con-full e-flex e-con e-child\" data-id=\"d046c62\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-79e1490 e-con-full e-flex e-con e-child\" data-id=\"79e1490\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-50de97f elementor-widget elementor-widget-heading\" data-id=\"50de97f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Step 2: Assessing the Evidences\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e833918 elementor-widget elementor-widget-text-editor\" data-id=\"e833918\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"Benefits\" class=\"icons-bunch\"><div class=\"row\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"pcs-card\"><div class=\"row justify-content-center\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-5 different-height-md\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p>In the second phase, an evaluation of potential evidence of cybercrime is performed. This data forensics or forensic analysis evaluation comprises categorizing the relevant cybercrime such as one related to social engineering, phishing, identity theft, etc. Before entering data as evidence, the investigator must determine the integrity and origin of data.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div>\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0e81c7c e-con-full e-flex e-con e-child\" data-id=\"0e81c7c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2f38177 e-con-full e-flex e-con e-child\" data-id=\"2f38177\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0eac4db e-con-full e-flex e-con e-child\" data-id=\"0eac4db\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ffff23 elementor-widget elementor-widget-heading\" data-id=\"3ffff23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Step 3: Acquiring the Evidences\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41517ae elementor-widget elementor-widget-text-editor\" data-id=\"41517ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"Benefits\" class=\"icons-bunch\"><div class=\"row\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"pcs-card\"><div class=\"row justify-content-center\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-5 different-height-md\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><div class=\"row equal-height-parent-6 justify-content-center different-height-md\"><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p>This phase entails creating a thorough, methodical approach to gathering evidence. All the information must be recorded, preserved, and documented before, during, and after the evidence acquisition. Forensic data analysis becomes futile in the absence of evidence, therefore effective policies maintaining the integrity of potential evidence should be applied in this step.<\/p><\/div><\/div><\/div><\/div><div class=\"row equal-height-parent-7 justify-content-center different-height-md\"><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div>\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ed1d6ea e-con-full e-flex e-con e-child\" data-id=\"ed1d6ea\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-abb1ab6 e-con-full e-flex e-con e-child\" data-id=\"abb1ab6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-49dd087 e-con-full e-flex e-con e-child\" data-id=\"49dd087\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c617c64 e-con-full e-flex e-con e-child\" data-id=\"c617c64\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ae75be elementor-widget elementor-widget-heading\" data-id=\"7ae75be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Step 4: Examining the Evidences\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5696dfd elementor-widget elementor-widget-text-editor\" data-id=\"5696dfd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"Benefits\" class=\"icons-bunch\"><div class=\"row\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"pcs-card\"><div class=\"row justify-content-center\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-5 different-height-md\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p>There are certain processes for retrieving, copying, and storing evidence in an appropriate database to examine potential evidence. It encompasses a variety of tactics and techniques for analyzing information such as retrieving recently deleted files\/media or employing analysis tools to search for data archives with particular file types.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-060bbe3 e-con-full e-flex e-con e-child\" data-id=\"060bbe3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ea21626 e-con-full e-flex e-con e-child\" data-id=\"ea21626\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c3f2c85 e-con-full e-flex e-con e-child\" data-id=\"c3f2c85\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cc445fc elementor-widget elementor-widget-heading\" data-id=\"cc445fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Step 5: Documenting and Reporting\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d77107b elementor-widget elementor-widget-text-editor\" data-id=\"d77107b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"Benefits\" class=\"icons-bunch\"><div class=\"row\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"pcs-card\"><div class=\"row justify-content-center\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-5 different-height-md\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p>Here, forensic analysis or data forensics investigators retain a record of all techniques used during the investigation including methods to verify system&#8217;s functionalities as well as copying, retrieving, and storing data. Reporting and documentation demonstrate how user integrity was maintained and ensured that all other parties comply.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div>\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bca0b8c e-flex e-con-boxed e-con e-parent\" data-id=\"bca0b8c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-692b2a3 elementor-widget elementor-widget-heading\" data-id=\"692b2a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CloudEngin Full-scale Forensics\nData Analysis and Data Management Services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f6bbe36 e-flex e-con-boxed e-con e-parent\" data-id=\"f6bbe36\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c65a598 elementor-widget__width-initial e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"c65a598\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;stretch&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"207988120\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-2079881201\" data-tab-title-id=\"e-n-tab-title-2079881201\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-2079881201\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tData Consulting\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2079881202\" data-tab-title-id=\"e-n-tab-title-2079881202\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2079881202\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tData Modernization\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2079881203\" data-tab-title-id=\"e-n-tab-title-2079881203\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2079881203\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tData Ops\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2079881204\" data-tab-title-id=\"e-n-tab-title-2079881204\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2079881204\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tData Engineering\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2079881205\" data-tab-title-id=\"e-n-tab-title-2079881205\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2079881205\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAdvanced Analysis and AI\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-2079881201\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2079881201\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-0642c06 e-con-full e-flex e-con e-child\" data-id=\"0642c06\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-9adb4eb e-flex e-con-boxed e-con e-child\" data-id=\"9adb4eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b06ed05 elementor-widget elementor-widget-text-editor\" data-id=\"b06ed05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><p>Gain competitive advantage, improve process efficiencies, innovate via data forensics and forensic analysis.<\/p><p>Use design-led data and analysis consulting services to make informed decisions while fueling scalability and unprecedented continuity.<\/p><p>Avail data consulting services including Data Maturity Assessment, Data Strategy Blueprinting and Roadmap, TCO optimization for Data Analysis &amp; AI Adoption and Industry-specific data consulting services<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2079881202\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2079881202\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-69b8108 e-con-full e-flex e-con e-child\" data-id=\"69b8108\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1d8d9ad e-flex e-con-boxed e-con e-child\" data-id=\"1d8d9ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c5da392 elementor-widget elementor-widget-text-editor\" data-id=\"c5da392\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-2\" class=\"tab-pane active\"><div id=\"htab-2\" class=\"tab-pane active\"><p>Get rid of Traditional Data Warehouse systems and processes, siloed data, system inefficiency, limited data analysis, challenges in security and compliances, and more.<\/p><p>Adopt Data migration from legacy to cloud platforms as well as SAP, on-prem data to Data Lake migrations and Traditional Data warehouse to on-cloud data.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2079881203\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2079881203\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-bc9710c e-flex e-con-boxed e-con e-child\" data-id=\"bc9710c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7d79220 e-con-full e-flex e-con e-child\" data-id=\"7d79220\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e613944 elementor-widget elementor-widget-text-editor\" data-id=\"e613944\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><p>Gain continuous data pipelines support and management post the implementation and setup of a Data-related use case such as underlying Infrastructure, Application (ETL and transformation code), and the Database.<\/p><p>Obtain AIOps-powered managed services, operational tuning and automations, data platform security management, and support resolution and defined SLA for managed analysis.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2079881204\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2079881204\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-d28dca9 e-flex e-con-boxed e-con e-child\" data-id=\"d28dca9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a781e32 e-con-full e-flex e-con e-child\" data-id=\"a781e32\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e5ef3f2 elementor-widget elementor-widget-text-editor\" data-id=\"e5ef3f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel7\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"myTab\" class=\"custom-tabs custom-tabs-mdr\"><div class=\"pb50\"><div class=\"tab-content-mdr\"><div id=\"htab-4\" class=\"tab-pane active\"><div id=\"htab-4\" class=\"tab-pane active\"><p>Focus on practical applications of data collection, processing, and analysis to generate insights and solve essential use-cases for immediate impact.<\/p><p>Take advantage of plenty of services including data discovery and ingestion, data lakes, data warehouses, visualization, reporting and dashboards.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2079881205\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2079881205\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-cd8997b e-flex e-con-boxed e-con e-child\" data-id=\"cd8997b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-15be647 e-con-full e-flex e-con e-child\" data-id=\"15be647\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-04125bb elementor-widget elementor-widget-text-editor\" data-id=\"04125bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel7\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"myTab\" class=\"custom-tabs custom-tabs-mdr\"><div class=\"pb50\"><div class=\"tab-content-mdr\"><div id=\"htab-4\" class=\"tab-pane active\"><div id=\"htab-4\" class=\"tab-pane active\"><p>Integrate deep, smart analysis across business processes with AI, ML, and Deep Learning Capabilities.<\/p><p>Modernize, and smarten up processes related to enterprise strategies, service delivery, operations, customer management, supply chain management, and monitoring with cutting-edge intelligent analysis.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b437431 e-flex e-con-boxed e-con e-parent\" data-id=\"b437431\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ffe9b6d elementor-widget__width-initial e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"ffe9b6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;stretch&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"268344173\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-2683441731\" data-tab-title-id=\"e-n-tab-title-2683441731\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-2683441731\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tData Security,<br> Governance, <br>and Compliance\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2683441732\" data-tab-title-id=\"e-n-tab-title-2683441732\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2683441732\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tMulti-ecosystem <br>Database Managed<br> Services\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2683441733\" data-tab-title-id=\"e-n-tab-title-2683441733\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2683441733\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tData Threat <br>Management, backed <br>by AI\/ML\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2683441734\" data-tab-title-id=\"e-n-tab-title-2683441734\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2683441734\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tManaged <br> Advanced Data<br> Analysis &amp; BI\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2683441735\" data-tab-title-id=\"e-n-tab-title-2683441735\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2683441735\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tData Lake Activation,<br> Preparation and<br> Visualization\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-2683441731\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2683441731\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-7e239c1 e-con-full e-flex e-con e-child\" data-id=\"7e239c1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-d788aea e-flex e-con-boxed e-con e-child\" data-id=\"d788aea\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f88b38 elementor-widget elementor-widget-text-editor\" data-id=\"6f88b38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Secure static and dynamic dataflows as well as monitor, analyze, and protect databases, data centers, and dataflows across the entire IT stack.<\/p><p>Embrace deep threat hunting, remediation capabilities paired with advanced threat intelligence and smart cybersecurity solutions.<\/p><p>Implement a stringent data governance framework and ensure seamless compliance to local-national regulations and international standards.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2683441732\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2683441732\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-d83d88c e-con-full e-flex e-con e-child\" data-id=\"d83d88c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6ccd65b e-flex e-con-boxed e-con e-child\" data-id=\"6ccd65b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-af83523 elementor-widget elementor-widget-text-editor\" data-id=\"af83523\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-2\" class=\"tab-pane active\"><div id=\"htab-2\" class=\"tab-pane active\"><div id=\"htab-7\" class=\"tab-pane active\"><p>Get fully managed database functionalities on the cloud, integrated with multiple ecosystems with ease. Implement robust architecture based on business needs, and fully managed data functionalities using AIOps-powered services.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2683441733\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2683441733\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-67779f4 e-flex e-con-boxed e-con e-child\" data-id=\"67779f4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-228eb1d e-con-full e-flex e-con e-child\" data-id=\"228eb1d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-be0351f elementor-widget elementor-widget-text-editor\" data-id=\"be0351f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><p>Detect any potential threats\/vulnerabilities, take corrective measures, and make the system more robust.<\/p><p>Avail security-native tools to cloud platforms and third-party applications supporting in combating foreseen and unforeseen cyber-attacks.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2683441734\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2683441734\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-4769d3b e-flex e-con-boxed e-con e-child\" data-id=\"4769d3b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-12169dd e-con-full e-flex e-con e-child\" data-id=\"12169dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c212df2 elementor-widget elementor-widget-text-editor\" data-id=\"c212df2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel7\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"myTab\" class=\"custom-tabs custom-tabs-mdr\"><div class=\"pb50\"><div class=\"tab-content-mdr\"><div id=\"htab-4\" class=\"tab-pane active\"><div id=\"htab-4\" class=\"tab-pane active\"><p>Deploy advanced business intelligence across data pools, data lakes, and databases to generate smart operational insights.<\/p><p>Integrate cloud-native tools and technologies to enable real-time data processing and insights generation.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2683441735\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2683441735\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-72a25b4 e-flex e-con-boxed e-con e-child\" data-id=\"72a25b4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c4ff16e e-con-full e-flex e-con e-child\" data-id=\"c4ff16e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-690263b elementor-widget elementor-widget-text-editor\" data-id=\"690263b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel7\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"myTab\" class=\"custom-tabs custom-tabs-mdr\"><div class=\"pb50\"><div class=\"tab-content-mdr\"><div id=\"htab-4\" class=\"tab-pane active\"><div id=\"htab-4\" class=\"tab-pane active\"><p>Bring predictive power and deeper analysis to your business to stay ahead when it comes to data processing, visualization, and presentation.<\/p><p>Leverage data insights from a single source of truth such as Data Lakes, Data Warehouses empowering visualization dashboards, and the ability to process data on the go.<\/p><p>Intuitive and interactive dashboards to make smart decisions through real-time monitoring and visual exploration.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-baf3441 e-flex e-con-boxed e-con e-parent\" data-id=\"baf3441\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-af1cfee e-con-full e-flex e-con e-child\" data-id=\"af1cfee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-839bdb2 elementor-widget elementor-widget-heading\" data-id=\"839bdb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Deploy full-scale data analysis and forensics capabilities. Connect with our Cybersecurity Experts today.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-93b7857 e-con-full e-flex e-con e-child\" data-id=\"93b7857\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-968aa30 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"968aa30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d0cd99d e-flex e-con-boxed e-con e-parent\" data-id=\"d0cd99d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4eacc34 elementor-widget elementor-widget-heading\" data-id=\"4eacc34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Avail CloudEngin Forensic\nData Analysis or Data Forensics Services?<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0030993 e-con-full e-flex e-con e-child\" data-id=\"0030993\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e80d014 e-con-full e-flex e-con e-child\" data-id=\"e80d014\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec99260 elementor-widget elementor-widget-text-editor\" data-id=\"ec99260\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p class=\"text-center\">Detailed, domain-specific assessment, consulting, and support to integrate cutting-edge analytical processes with data modelling and designing.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div>\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c4792e e-con-full e-flex e-con e-child\" data-id=\"5c4792e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d2db060 elementor-widget elementor-widget-text-editor\" data-id=\"d2db060\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p class=\"text-center\">Data Archival as per industry regulations for automated, efficient data profiling and data cleansing.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div>\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bb29f30 e-con-full e-flex e-con e-child\" data-id=\"bb29f30\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9f84970 elementor-widget elementor-widget-text-editor\" data-id=\"9f84970\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"row equal-height-parent-8 justify-content-center different-height-md\"><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p class=\"text-center\">Streamline data collection, processing, and analysis from multiple sources and IT ecosystems to ensure a universal data architecture.<\/p><\/div><\/div><\/div><\/div><div class=\"row equal-height-parent-9 justify-content-center different-height-md\"><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div>\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-295b5d3 e-con-full e-flex e-con e-child\" data-id=\"295b5d3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f5141d1 e-con-full e-flex e-con e-child\" data-id=\"f5141d1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a9fd72 elementor-widget elementor-widget-text-editor\" data-id=\"4a9fd72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p class=\"text-center\">Utilize Big Data solutions to identify resource and cost-hungry processes, approaches, systems. Fix inefficiencies and improve productivity to reduce overall enterprise expenses.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b7466e1 e-con-full e-flex e-con e-child\" data-id=\"b7466e1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3477379 elementor-widget elementor-widget-text-editor\" data-id=\"3477379\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p class=\"text-center\">Monitor and manage infrastructure health in real-time to prevent sudden outages and disasters<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div>\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d68e30a e-con-full e-flex e-con e-child\" data-id=\"d68e30a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e8db4f elementor-widget elementor-widget-text-editor\" data-id=\"9e8db4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"row equal-height-parent-8 justify-content-center different-height-md\"><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><div class=\"row equal-height-parent-9 justify-content-center different-height-md\"><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p class=\"text-center\">Gain universal visibility to business functions, systems, processes, workflows, applications, and performances in real-time, via intuitive analytical dashboards and smart reporting.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3ee301d e-con-full e-flex e-con e-child\" data-id=\"3ee301d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-16cae9f e-con-full e-flex e-con e-child\" data-id=\"16cae9f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-29d8580 elementor-widget elementor-widget-text-editor\" data-id=\"29d8580\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p class=\"text-center\">End-to-end data ingestion and management across all cloud landscapes. Deploy cloud-native data analysis and advanced automation to optimize critical business processes and outcomes.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8e2fff6 e-con-full e-flex e-con e-child\" data-id=\"8e2fff6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a311500 elementor-widget elementor-widget-text-editor\" data-id=\"a311500\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p class=\"text-center\">Defined data engineering, data modernization, data ops project management and tool integrations with flexible choices of ETL tools and services<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-900f917 e-con-full e-flex e-con e-child\" data-id=\"900f917\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5bfe90d elementor-widget elementor-widget-text-editor\" data-id=\"5bfe90d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"row equal-height-parent-8 justify-content-center different-height-md\"><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div class=\"row equal-height-parent-9 justify-content-center different-height-md\"><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div class=\"row equal-height-parent-10 justify-content-center different-height-md\"><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p class=\"text-center\">Seamless AI and data governance &#8211; compliance with local, national regulations and industry standards, up to date methodologies<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2be9878 e-con-full e-flex e-con e-child\" data-id=\"2be9878\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8efcd7e e-con-full e-flex e-con e-child\" data-id=\"8efcd7e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ade1c9 elementor-widget elementor-widget-text-editor\" data-id=\"8ade1c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"differentiators\"><div class=\"row justify-content-center equal-height-parent-11\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-6 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p class=\"text-center\">Seamlessly address all infrastructure-networks and platform to deploy advanced forensic data analysis services. Embrace ready-made models and libraries to deploy AI on-prem, across remote ecosystems, and edge environments.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2e2d8fa e-con-full e-flex e-con e-child\" data-id=\"2e2d8fa\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aaa7266 elementor-widget elementor-widget-text-editor\" data-id=\"aaa7266\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"differentiators\"><div class=\"row justify-content-center equal-height-parent-11\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"pcs-card\"><div class=\"row equal-height-parent-11 justify-content-center different-height-md\"><div class=\"col-md-6\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><p class=\"text-center\">Accomplish uncompromised security, uninterrupted continuity, and unstoppable transformative growth with 360-degree data analysis and forensics.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fba80af e-flex e-con-boxed e-con e-parent\" data-id=\"fba80af\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd2fcdb elementor-widget elementor-widget-heading\" data-id=\"bd2fcdb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Difference: Why Partner with CloudEngin for your Cybersecurity Transformation?<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c64943 e-con-full e-flex e-con e-child\" data-id=\"5c64943\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7731372 e-con-full e-flex e-con e-child\" data-id=\"7731372\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cdf9d5c elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"cdf9d5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/classic_infrastructure_icon_216392.png\" class=\"attachment-large size-large wp-image-959\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/classic_infrastructure_icon_216392.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/classic_infrastructure_icon_216392-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/classic_infrastructure_icon_216392-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-572b95d elementor-widget elementor-widget-text-editor\" data-id=\"572b95d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>World\u2019s largest Application-focused Managed Cloud Services Provider and one of the leading managed cybersecurity companies. Dedicated cybersecurity assessment services.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bf046c4 e-con-full e-flex e-con e-child\" data-id=\"bf046c4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5352617 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"5352617\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/globe_hemisphere_west_icon_175159.png\" class=\"attachment-large size-large wp-image-1063\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/globe_hemisphere_west_icon_175159.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/globe_hemisphere_west_icon_175159-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/globe_hemisphere_west_icon_175159-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d212fa7 elementor-widget elementor-widget-text-editor\" data-id=\"d212fa7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>12+ years expertise, 2500+ transformation stories across 29 nations and 25 Centers of Excellence<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eae00ed e-con-full e-flex e-con e-child\" data-id=\"eae00ed\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bae9c70 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"bae9c70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-30-23.jpg\" class=\"attachment-large size-large wp-image-1048\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-30-23.jpg 500w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-30-23-300x300.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-30-23-150x150.jpg 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a98f5df elementor-widget elementor-widget-text-editor\" data-id=\"a98f5df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>80000 EPS, 13000 HBSS, 3200 UTMs, 7 Reg-tech Frameworks, 40+ Security Controls.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a7770b e-con-full e-flex e-con e-child\" data-id=\"4a7770b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a7b3068 e-con-full e-flex e-con e-child\" data-id=\"a7b3068\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b44658 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"2b44658\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023.png\" class=\"attachment-large size-large wp-image-1051\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-595f0ba elementor-widget elementor-widget-text-editor\" data-id=\"595f0ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>1600+ cloud experts with industry-leading certifications: Hyperscaler Security, Hyperscaler Platform, CISSP, OSCP, CEH, CHFI, Comp TIA Security.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-320f328 e-con-full e-flex e-con e-child\" data-id=\"320f328\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a0f424 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"4a0f424\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3131100.png\" class=\"attachment-large size-large wp-image-1049\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3131100.png 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3131100-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3131100-150x150.png 150w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/3131100-768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a2c7be elementor-widget elementor-widget-text-editor\" data-id=\"8a2c7be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Integration of proprietary, intelligent automation powered cybersecurity tools such as the CloudEngin Self-Healing Operations Platform.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0368a6 e-con-full e-flex e-con e-child\" data-id=\"f0368a6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4552d47 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"4552d47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"474\" height=\"474\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75.jpg\" class=\"attachment-large size-large wp-image-1045\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75.jpg 474w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75-300x300.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75-150x150.jpg 150w\" sizes=\"(max-width: 474px) 100vw, 474px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ee57a7 elementor-widget elementor-widget-text-editor\" data-id=\"8ee57a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Specialized compliance management expertise ensuring stringent, fail-proof governance and compliance with local, national, and international regulations.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ad5e7ec e-con-full e-flex e-con e-child\" data-id=\"ad5e7ec\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-138cc26 e-con-full e-flex e-con e-child\" data-id=\"138cc26\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-753ea99 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"753ea99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/free-icon-partner-7553536.png\" class=\"attachment-large size-large wp-image-1209\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/free-icon-partner-7553536.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/free-icon-partner-7553536-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/free-icon-partner-7553536-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61767c0 elementor-widget elementor-widget-text-editor\" data-id=\"61767c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Advanced threat detection, proactive threat hunting capabilities with best of breed toolset and processes.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ff0617d e-con-full e-flex e-con e-child\" data-id=\"ff0617d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33ed7d5 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"33ed7d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"599\" height=\"626\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/een-klok_318-2022.jpg\" class=\"attachment-large size-large wp-image-1005\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/een-klok_318-2022.jpg 599w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/een-klok_318-2022-287x300.jpg 287w\" sizes=\"(max-width: 599px) 100vw, 599px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03f48f9 elementor-widget elementor-widget-text-editor\" data-id=\"03f48f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>24\/7 automated threat response and &amp; Management.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fb4e539 e-con-full e-flex e-con e-child\" data-id=\"fb4e539\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8c80cae elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"8c80cae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/img_407305.png\" class=\"attachment-large size-large wp-image-1198\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/img_407305.png 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/img_407305-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/img_407305-150x150.png 150w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/img_407305-768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f27469 elementor-widget elementor-widget-text-editor\" data-id=\"3f27469\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Comprehensive Threat Investigation and Verification with advanced Threat Intelligence powered by Industry-leading platforms such as Microsoft, OSINT, STIX&amp;TAXI, MISP, etc. and CloudEngin Threat experts.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6011b75 e-con-full e-flex e-con e-child\" data-id=\"6011b75\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7433a22 e-con-full e-flex e-con e-child\" data-id=\"7433a22\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-146ef60 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"146ef60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4374976.png\" class=\"attachment-large size-large wp-image-1115\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4374976.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4374976-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4374976-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-302672a elementor-widget elementor-widget-text-editor\" data-id=\"302672a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"differentiators\"><div class=\"row justify-content-center equal-height-parent-11\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Cloud-native security with multi-cloud support for leading cloud platforms: AWS, Azure, GCP, Oracle, IBM Cloud, etc.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50a9503 e-con-full e-flex e-con e-child\" data-id=\"50a9503\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-419bb07 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"419bb07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169.png\" class=\"attachment-large size-large wp-image-1056\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6ebe9a elementor-widget elementor-widget-text-editor\" data-id=\"c6ebe9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"differentiators\"><div class=\"row justify-content-center equal-height-parent-11\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"differentiators\"><div class=\"row justify-content-center equal-height-parent-12\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Experience in deploying and managing robust SIEM on AWS Cloud \u2013 helping enterprises to proactively assess vulnerabilities and automate and accelerate incident response on the AWS Cloud.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f86e4b8 e-flex e-con-boxed e-con e-parent\" data-id=\"f86e4b8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-333c8e0 elementor-widget elementor-widget-heading\" data-id=\"333c8e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Forensic Data Analysis - FAQs<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-989510a elementor-widget elementor-widget-n-accordion\" data-id=\"989510a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1590\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1590\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What is Forensic Data Analysis or Data Forensics? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1590\" class=\"elementor-element elementor-element-c0e7a8d e-con-full e-flex e-con e-child\" data-id=\"c0e7a8d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-62b32c7 elementor-widget elementor-widget-text-editor\" data-id=\"62b32c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><p>The process of employing controlled and documented analytical and examining techniques for recognizing, inspecting, and preserving digital information is known as Forensic Data Analysis.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1591\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1591\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What are the benefits of Forensic Data Analysis or Data Forensics? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1591\" class=\"elementor-element elementor-element-55ec8fe e-con-full e-flex e-con e-child\" data-id=\"55ec8fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eab903b elementor-widget elementor-widget-text-editor\" data-id=\"eab903b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><p>Forensic Data Analysis can offer the following benefits:<\/p><ul><li>Enhancing corporate risk assessment<\/li><li>Advancing fraud detection with better training and awareness<\/li><li>Improving the chances of fraud and risk detection in large data sets<\/li><li>More agile and responsive against fraud investigations<\/li><\/ul><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1592\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1592\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What's the difference between Forensic Data Analysis and Digital Forensics? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1592\" class=\"elementor-element elementor-element-0b40636 e-con-full e-flex e-con e-child\" data-id=\"0b40636\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-edc3dc1 elementor-widget elementor-widget-text-editor\" data-id=\"edc3dc1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><div class=\"coll-pos\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"faq\" class=\"faq-wrapper\"><div class=\"coll-pos\"><p>Digital forensics encloses a variety of forensic services for uncovering fraudulent activities on digital systems and storage devices. It includes forensic data analysis, computer forensics, and other forensic services associated with communications systems. It undertakes \u201cunstructured data\u201d derived for examination from computer applications, networked communications, and mobile phones.<\/p><p>Forensic Data Analysis focuses on data derived from physical devices such as hard drives, memory sticks, CDs, among other storage devices. It examines a &#8216;structured data&#8217; format in a way the storage device is formatted for a specific operating system.<\/p><\/div><\/div><\/div><\/div><\/section><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35caff9 e-flex e-con-boxed e-con e-parent\" data-id=\"35caff9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8e43cb1 e-con-full e-flex e-con e-child\" data-id=\"8e43cb1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-437adff e-con-full e-flex e-con e-child\" data-id=\"437adff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-347fc1f elementor-widget elementor-widget-heading\" data-id=\"347fc1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Solidify your Enterprise Cybersecurity with  CloudEngin<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b6803b8 e-con-full e-flex e-con e-child\" data-id=\"b6803b8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ef2593 elementor-widget elementor-widget-text-editor\" data-id=\"1ef2593\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Schedule a consultation with our Cloud experts and get answers for any specific queries you may have. You can also schedule a visit to our Datacenters, or share feedback on our website and services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c5eb20d e-con-full e-flex e-con e-child\" data-id=\"c5eb20d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0055d3b elementor-widget elementor-widget-heading\" data-id=\"0055d3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Get in Touch<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a20f96c elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"a20f96c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"New Form\" aria-label=\"New Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"544\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"a20f96c\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Data Forensics\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"544\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tName\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Name\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Email\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_815e145 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_815e145\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tTel\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_815e145]\" id=\"form-field-field_815e145\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Tel\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Only numbers and phone characters (#, -, *, etc) are accepted.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_169bf39 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_169bf39\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCompany\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_169bf39]\" id=\"form-field-field_169bf39\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Company\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tMessage\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"5\" placeholder=\"Your Message...\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_2c751e3 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_2c751e3]\" id=\"form-field-field_2c751e3\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-field_2c751e3\">I\u2019d like to receive more information from CloudEngin. By submitting this form, I am providing consent to receive marketing communications and I understand and agree to the usage of my corporate contact information in accordance with CloudEngin privacy statement.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Submit<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3434392 elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"3434392\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"form\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Forensic Data Analysis Forensic Data Analysis and Services Smart Data Forensics. Actionable Intelligence. Unlimited business value generated by secure relevant [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-544","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=544"}],"version-history":[{"count":19,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/544\/revisions"}],"predecessor-version":[{"id":4182,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/544\/revisions\/4182"}],"wp:attachment":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}