{"id":572,"date":"2025-11-07T13:54:43","date_gmt":"2025-11-07T13:54:43","guid":{"rendered":"https:\/\/dev.cloudengin.com\/?page_id=572"},"modified":"2026-01-15T04:06:18","modified_gmt":"2026-01-15T04:06:18","slug":"managed-soc","status":"publish","type":"page","link":"https:\/\/www.cloudengin.com\/?page_id=572","title":{"rendered":"Managed SOC"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"572\" class=\"elementor elementor-572\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-edda0dd e-flex e-con-boxed e-con e-parent\" data-id=\"edda0dd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-95da10b elementor-widget elementor-widget-heading\" data-id=\"95da10b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">managed security <br>\nOperations Center<br>\n(SOC) Services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87bb31f elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"87bb31f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"banner-fixed-width pb30\">Centralize organizational security with a world-class threat monitoring, detection, analysis, response, and Managed SOC team. Integrate advanced security tools and processes for advanced round-the-clock risk management.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f06941 elementor-widget elementor-widget-button\" data-id=\"1f06941\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cc52e93 e-flex e-con-boxed e-con e-parent\" data-id=\"cc52e93\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2545b14 e-con-full e-flex e-con e-child\" data-id=\"2545b14\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d32dd0 elementor-widget elementor-widget-heading\" data-id=\"6d32dd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Expense vs Necessity: How Managed Security Operations Center (SOC) services can transform an Organization's Security Posture?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7449567 e-con-full e-flex e-con e-child\" data-id=\"7449567\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79f676c elementor-widget elementor-widget-text-editor\" data-id=\"79f676c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-left col-lg-6\"><div class=\"col-left col-lg-6\"><p>According to economic times, the average cost of a simple data breach could stagger upwards of two million dollars. Scale to the entire security landscape including planned attacks, and that number shoots significantly beyond the annual revenues of most SMEs around the globe. The situation aggravates further when considered that most security systems and technologies deployed worldwide operate primarily for signature threats, common risks, and rule-based general attacks. No wonder, a single planned cyberattack could jeopardize a business beyond return.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cf4d598 e-con-full e-flex e-con e-child\" data-id=\"cf4d598\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f2ddb5 elementor-widget elementor-widget-text-editor\" data-id=\"1f2ddb5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"card-white--full-height pt50\"><div class=\"row \"><div class=\"col-12\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"row \"><div class=\"col-md-12\"><div class=\"col-left col-lg-6\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"card-white--full-height pt50\"><div class=\"row \"><div class=\"col-12\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div><div class=\"row \"><div class=\"col-md-12\"><div><p>Amidst such an ever-evolving threat landscape, the need for an extensive, advanced Security Operations Center with security measures is paramount. However, the same along with hiring a dedicated team of security experts results in towering expenses for any firm, regardless of vertical and size. In addition, skilled resources specialized in threat research, security engineering, SIEM, incident analysis are quite rare, extending the resource cost concerns.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div class=\"row pb40\"><div class=\"col-md-5\">\u00a0<\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ae0622c e-flex e-con-boxed e-con e-parent\" data-id=\"ae0622c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6a5e37a e-con-full e-flex e-con e-child\" data-id=\"6a5e37a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8633a08 elementor-widget elementor-widget-heading\" data-id=\"8633a08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Enter Managed Security Operations Center (SOC) Services\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-23000b9 e-con-full e-flex e-con e-child\" data-id=\"23000b9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-036e274 elementor-widget elementor-widget-text-editor\" data-id=\"036e274\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><div id=\"cybersecurity-auditing\" class=\"row pb40 pb15-m\"><div class=\"col-md-7\"><div class=\"row pb30\"><div class=\"col-md-6\"><div id=\"cyber-threat\" class=\"row pb40 pb15-m\"><div class=\"col-md-6\"><div class=\"row pb40\"><div class=\"col-md-7\"><p>Managed Security Operations Center or Managed SOC Services could well be the answer to this deadlock. With CloudEngin Managed SOC services, centralize your security operations including threat monitoring, investigation, research, detection, incident analysis, and response orchestration across all assets 24\/7: applications, networks, data, middleware, platforms, perimeter and endpoint networks, cloud architectures, and on-prem IT infrastructure.<\/p><\/div><\/div><div class=\"row\"><div class=\"col-md-12\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a168350 e-con-full e-flex e-con e-child\" data-id=\"a168350\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6953cb9 elementor-widget elementor-widget-text-editor\" data-id=\"6953cb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div class=\"row\"><div class=\"col-md-12\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"tactics-techniques-procedures\"><div class=\"row\"><div class=\"col-md-12\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div class=\"row\"><div class=\"col-md-12\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div class=\"row\"><div class=\"col-md-12\"><p>CloudEngin world-class SOC-as-a-service and Security Experts team including security analysts, engineers, administrators, etc act as the necessary extension to a client\u2019s security department, significantly lowering resource costs, real-time monitoring and administration headaches, and frequent security upgrades silos. Embed cutting-edge security technologies, modern frameworks, and advanced resources to the unified SOC architecture: SIEM-SOAR, Threat Intelligence, Governance Risk and Compliance Systems (GRC), Database Scanners, Intrusion Prevention Systems, MITRE ATT&amp;CK, User and Entity Behaviour Analytics (UEBA), Endpoint Detection and Response, and advanced cybersecurity automation solutions, etc. As one of the leading SOC providers, gain deep threat detection for even unknown and advanced threats, fully managed SIEM software, undisclosed attack vectors and planned-real threats, and more. Outpace cybercriminals by deploying an innovative, advanced, and end-to-end modernized Security Operations Center without the expenses of owning one in-house.<\/p><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b3d7d7 e-flex e-con-boxed e-con e-parent\" data-id=\"6b3d7d7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2abf446 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"2abf446\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Managed SOC services: Exploring the Advanced Organization Security Possibilities<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a0d8adf e-flex e-con-boxed e-con e-parent\" data-id=\"a0d8adf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-19a3bae e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"19a3bae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"26885038\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-268850381\" data-tab-title-id=\"e-n-tab-title-268850381\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-268850381\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAsset Visibility and Protection\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-268850382\" data-tab-title-id=\"e-n-tab-title-268850382\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-268850382\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tTools and Technology expertise\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-268850383\" data-tab-title-id=\"e-n-tab-title-268850383\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-268850383\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tPreventive Maintenance\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-268850384\" data-tab-title-id=\"e-n-tab-title-268850384\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-268850384\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tThreat Monitoring\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-268850385\" data-tab-title-id=\"e-n-tab-title-268850385\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-268850385\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAlert Management\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-268850386\" data-tab-title-id=\"e-n-tab-title-268850386\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-268850386\" style=\"--n-tabs-title-order: 6;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tLog Management\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-268850387\" data-tab-title-id=\"e-n-tab-title-268850387\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-268850387\" style=\"--n-tabs-title-order: 7;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tThreat Response and Recovery Management\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-268850388\" data-tab-title-id=\"e-n-tab-title-268850388\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"8\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-268850388\" style=\"--n-tabs-title-order: 8;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tRoot Cause Analysis\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-268850389\" data-tab-title-id=\"e-n-tab-title-268850389\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"9\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-268850389\" style=\"--n-tabs-title-order: 9;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAdvancement and Upgrades\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2688503810\" data-tab-title-id=\"e-n-tab-title-2688503810\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"10\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2688503810\" style=\"--n-tabs-title-order: 10;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tCompliance Administration\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-268850381\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-268850381\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-80e3447 e-con-full e-flex e-con e-child\" data-id=\"80e3447\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3017335 e-flex e-con-boxed e-con e-child\" data-id=\"3017335\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9153124 elementor-widget elementor-widget-image\" data-id=\"9153124\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/s-455a619895d6d35067e80f0d9386fa62e4e93cee-rf6aijwgngdxyj3fqsx6u149wusouwf3se4cwe5cp4.jpg\" title=\"s-455a619895d6d35067e80f0d9386fa62e4e93cee\" alt=\"s-455a619895d6d35067e80f0d9386fa62e4e93cee\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65f308f elementor-widget elementor-widget-heading\" data-id=\"65f308f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Asset Visibility and Protection\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95e48a6 elementor-widget elementor-widget-text-editor\" data-id=\"95e48a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><div class=\"col-md-7 pd-lft\"><div><p>The SOC team holds complete visibility and protects the client\u2019s entire IT stack: data, applications, hosting assets, middleware-OS, platforms, architectures, VMs, Cloud platforms, IT infra, networks, IoT and Endpoint devices, and more. The team is responsible to collect telemetry or data from all these assets and continually monitor threats 24\/7<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-268850382\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-268850382\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-6a0918d e-con-full e-flex e-con e-child\" data-id=\"6a0918d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-6c98212 e-flex e-con-boxed e-con e-child\" data-id=\"6c98212\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ee3da7 elementor-widget elementor-widget-image\" data-id=\"3ee3da7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/orig-1-rf6alsgg6wthy6e4u7axf7pfkmu7dd9tkf0kepcj9k.jpeg\" title=\"orig (1)\" alt=\"orig (1)\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c528d4b elementor-widget elementor-widget-heading\" data-id=\"c528d4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Tools and Technology expertise\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f9c1c9 elementor-widget elementor-widget-text-editor\" data-id=\"1f9c1c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><div class=\"col-md-7 pd-lft\"><div><p>The SOC-as-a-service architecture and its team is equipped with advanced security tools and frameworks such as Threat Intelligence, IAM, Incident Analysis, Deep Threat Predictions, Vulnerability Assessment, Malware detection, and more. Occasionally the team harbours tailored tools for different types of IT or cloud assets. Integrate advanced automation solutions to modernize threat lifecycle management.<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-tools-and-technology-expertise-ManagedSOCpage-3.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-tools-and-technology-expertise-ManagedSOCpage-3.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-268850383\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-268850383\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-b6326f2 e-con-full e-flex e-con e-child\" data-id=\"b6326f2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-c4ce8ed e-flex e-con-boxed e-con e-child\" data-id=\"c4ce8ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d632374 elementor-widget elementor-widget-image\" data-id=\"d632374\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/XXL_height-1-revy8k3un02ffo8mz7u17h71idir7afiuogc73f3bc.jpeg\" title=\"XXL_height (1)\" alt=\"XXL_height (1)\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03945fe elementor-widget elementor-widget-heading\" data-id=\"03945fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Preventive Maintenance\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28e5867 elementor-widget elementor-widget-text-editor\" data-id=\"28e5867\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel2\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><div class=\"col-md-7 pd-lft\"><div><p>Once an incident has happened, there\u2019s little left to do apart from initiating a fast threat remediation action. However, the major advantage of a full-fledged SOC services team lies in its constant preparation to prevent threats: security roadmap development and updates, security systems upgrading, IT health monitoring, updating firewalls and policies, patching vulnerabilities, whitelisting-blacklisting and protecting applications, disaster recovery planning, etc.<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-268850384\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-268850384\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-9682b0d e-con-full e-flex e-con e-child\" data-id=\"9682b0d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-2b879b2 e-flex e-con-boxed e-con e-child\" data-id=\"2b879b2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dae296c elementor-widget elementor-widget-image\" data-id=\"dae296c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/ktc-keyfeatures-personal-storage-content-creation-lg-reubl1fq31k2qbc6ri2p1b8ds0xe0pujvmro066sug.jpg\" title=\"ktc-keyfeatures-personal-storage-content-creation-lg\" alt=\"ktc-keyfeatures-personal-storage-content-creation-lg\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30197b0 elementor-widget elementor-widget-heading\" data-id=\"30197b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Threat Monitoring\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bec02e9 elementor-widget elementor-widget-text-editor\" data-id=\"bec02e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel3\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div><p>Gain round-the-clock threat monitoring and real-time risk assessment across the entire Cloud and IT landscape. Integrate advanced monitoring tools like SIEM, EDR, Behavioural Analytics, Intelligence tracking solutions to help the adopted threat lifecycle management solutions effectively differentiate between suspicious, malicious user behavior and normal day-to-day traction<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/threat-monitoring-ManagedSOCpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/threat-monitoring-ManagedSOCpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-268850385\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-268850385\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-553b2c6 e-flex e-con-boxed e-con e-child\" data-id=\"553b2c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ef0baa0 e-con-full e-flex e-con e-child\" data-id=\"ef0baa0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3930070 elementor-widget elementor-widget-image\" data-id=\"3930070\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/47328999_m_normal_none-1536x1024-1-rf60bnkczi4q601a67jnkm72if6wc3uxcexd865hfs.jpg\" title=\"47328999_m_normal_none-1536&#215;1024\" alt=\"47328999_m_normal_none-1536x1024\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41f3f29 elementor-widget elementor-widget-heading\" data-id=\"41f3f29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Alert Management\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-889540b elementor-widget elementor-widget-text-editor\" data-id=\"889540b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel4\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel4\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div><p>In-house IT teams could well be over-boggled with alerts without an additional supervision layer. Alerts generated by the embraced threat monitoring solutions are carefully analyzed by SOC services teams to decide the proper course of action, granting peace of mind to the IT department.<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alert-management-ManagedSOCpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alert-management-ManagedSOCpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/threat-monitoring-ManagedSOCpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-268850386\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-268850386\" data-tab-index=\"6\" style=\"--n-tabs-title-order: 6;\" class=\" elementor-element elementor-element-16f4ff4 e-con-full e-flex e-con e-child\" data-id=\"16f4ff4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-8c87f82 e-con-full e-flex e-con e-child\" data-id=\"8c87f82\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ea9c1e elementor-widget elementor-widget-image\" data-id=\"6ea9c1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/file-rf6avy3o1gq1ehn0j3csv5fqnirzjmlemosg3cae14.jpg\" title=\"file\" alt=\"file\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3fb883b elementor-widget elementor-widget-text-editor\" data-id=\"3fb883b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div>Data Loss prevention through continuous monitoring of user desktop through periodic screenshots.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-log-management-ManagedSOCpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alert-management-ManagedSOCpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/threat-monitoring-ManagedSOCpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-268850387\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-268850387\" data-tab-index=\"7\" style=\"--n-tabs-title-order: 7;\" class=\" elementor-element elementor-element-7700c06 e-con-full e-flex e-con e-child\" data-id=\"7700c06\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-2a7299a e-con-full e-flex e-con e-child\" data-id=\"2a7299a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0217b0b elementor-widget elementor-widget-image\" data-id=\"0217b0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/tuik-tuketici-guven-ocak2022-rf6dv6itq1inwzvjcy1ktl9ud08gojb0dg3m2rai6g.jpg\" title=\"Multi exposure of woman hands typing on computer and financial chart hologram drawing. Stock market analysis concept.\" alt=\"Multi exposure of woman hands typing on computer and financial chart hologram drawing. Stock market analysis concept.\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f89c29 elementor-widget elementor-widget-heading\" data-id=\"3f89c29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Threat Response and Recovery Management\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c03cf5d elementor-widget elementor-widget-text-editor\" data-id=\"c03cf5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><p>Upon detection of an incident, SOC team expedites threat response actions including cleaning\/securing databases, updating or deleting intruded files, truncating harmful processes, cleansing the system for the particular threat attack.<\/p><p>Also, the team initiates the recovery protocols: cleansing and restarting endpoints, rebooting and updating\/configuring systems, taking extra backups, distributing copies across multiple secure landscapes, and identifying the malware or ransomware specifically to realize stronger defenses in the future.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-log-management-ManagedSOCpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alert-management-ManagedSOCpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/threat-monitoring-ManagedSOCpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-268850388\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-268850388\" data-tab-index=\"8\" style=\"--n-tabs-title-order: 8;\" class=\" elementor-element elementor-element-c9e980e e-con-full e-flex e-con e-child\" data-id=\"c9e980e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-fb3a2da e-con-full e-flex e-con e-child\" data-id=\"fb3a2da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ffcef79 elementor-widget elementor-widget-image\" data-id=\"ffcef79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/Data-Acquisition-Software2-revx8h2w9yo5qknjombmhl00jvdhpl6h82vayox66g.jpg\" title=\"Data-Acquisition-Software2\" alt=\"Data-Acquisition-Software2\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22d4639 elementor-widget elementor-widget-heading\" data-id=\"22d4639\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Root Cause Analysis\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-787bb2f elementor-widget elementor-widget-text-editor\" data-id=\"787bb2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div><p>Once a security incident has occurred, it\u2019s imperative to run a comprehensive investigation and analysis to determine the root IT infra fault or gap that allowed the threat in the first place. SOC team takes full accountability for root cause investigations to realize a stronger, updated organizational security architecture.<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/root-cause-analysis-tools-ManagedSOCpage-9.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-log-management-ManagedSOCpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alert-management-ManagedSOCpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/threat-monitoring-ManagedSOCpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-268850389\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-268850389\" data-tab-index=\"9\" style=\"--n-tabs-title-order: 9;\" class=\" elementor-element elementor-element-0ac0c7a e-con-full e-flex e-con e-child\" data-id=\"0ac0c7a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-dfb6110 e-con-full e-flex e-con e-child\" data-id=\"dfb6110\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9f7d169 elementor-widget elementor-widget-image\" data-id=\"9f7d169\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/business-ideas-kazakhstan-2025-reu5vua442nm6vefzaxp7lct8ubqng81zzqpekft6w.webp\" title=\"business-ideas-kazakhstan-2025\" alt=\"business-ideas-kazakhstan-2025\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00c2655 elementor-widget elementor-widget-heading\" data-id=\"00c2655\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Advancement and Upgrades\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d64a21 elementor-widget elementor-widget-text-editor\" data-id=\"4d64a21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div><p>The SOC team is responsible for constantly upgrading and updating utilized security systems, solutions, platforms, tools, architectures, frameworks to align with the modern, advanced versions. This allows the organization to continually gain stronger protection against the constantly evolving cyber threats.<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-advanced-and-upgrades-ManagedSOCpage-10.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-log-management-ManagedSOCpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alert-management-ManagedSOCpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/threat-monitoring-ManagedSOCpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2688503810\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2688503810\" data-tab-index=\"10\" style=\"--n-tabs-title-order: 10;\" class=\" elementor-element elementor-element-fdea68c e-con-full e-flex e-con e-child\" data-id=\"fdea68c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-9ccc78c e-con-full e-flex e-con e-child\" data-id=\"9ccc78c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a76485 elementor-widget elementor-widget-image\" data-id=\"4a76485\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/0x0-3-scaled-reubnpb9g57bmjgx7nin3n1edbsttuf68tb6ye8n7s.jpg\" title=\"0x0 (3)\" alt=\"0x0 (3)\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50fda46 elementor-widget elementor-widget-heading\" data-id=\"50fda46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Compliance Administration\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10f09f8 elementor-widget elementor-widget-text-editor\" data-id=\"10f09f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div><p>Organizational security is incomplete without adherence to compliance and regulatory standards. With managed SOC-as-a-Service and SOC audit services, gain deep policy, governance checks, and stringent IT compliance to local, national, and international standards for maximum protection: PCI-DSS, NESA, SAMA, GDPR, FedRamp, MSA, IRAP, GxP, CSA, OJK, MEITI, RBI. International certifications include ISO 27001, ISO 27017, ISO 27018, ISO 20000, ISO 22301, SOC1, SOC2<\/p><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/compliance-administration-ManagedSOCpage-11.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-log-management-ManagedSOCpage-7.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alert-management-ManagedSOCpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/threat-monitoring-ManagedSOCpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-546371a e-flex e-con-boxed e-con e-parent\" data-id=\"546371a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-21d051d elementor-widget elementor-widget-heading\" data-id=\"21d051d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Operations Center: Roles and Responsibilities<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-52f62a2 e-flex e-con-boxed e-con e-parent\" data-id=\"52f62a2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0ead2e7 e-grid e-con-full e-con e-child\" data-id=\"0ead2e7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1bd84c8 e-con-full e-flex e-con e-child\" data-id=\"1bd84c8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7b5f80d e-con-full e-flex e-con e-child\" data-id=\"7b5f80d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-924c41e e-con-full e-flex e-con e-child\" data-id=\"924c41e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-15524df e-con-full e-flex e-con e-child\" data-id=\"15524df\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bc2d667 elementor-widget elementor-widget-image\" data-id=\"bc2d667\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6eb6dd_a38242c68d8847c5baba3963627d8f74mv2.png\" class=\"attachment-large size-large wp-image-1423\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6eb6dd_a38242c68d8847c5baba3963627d8f74mv2.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6eb6dd_a38242c68d8847c5baba3963627d8f74mv2-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6eb6dd_a38242c68d8847c5baba3963627d8f74mv2-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d9b85c elementor-widget elementor-widget-heading\" data-id=\"4d9b85c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Control Entire Environment\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d3b651 elementor-widget elementor-widget-text-editor\" data-id=\"7d3b651\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"Benefits\" class=\"icons-bunch\"><div class=\"row\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"pcs-card\"><div class=\"row justify-content-center\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-5 different-height-md\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height \"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height blue-border-cyber verticlally-middle card-white__wrapper no-margin-d bg-gray align-items-start\"><div><p>Gain a holistic view of different components across the entire IT environment spread across different locations.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height blue-border-cyber verticlally-middle card-white__wrapper no-margin-d bg-gray align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8e51377 e-con-full e-flex e-con e-child\" data-id=\"8e51377\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f4fc000 e-con-full e-flex e-con e-child\" data-id=\"f4fc000\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-57f6e85 e-con-full e-flex e-con e-child\" data-id=\"57f6e85\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bc2e1c3 elementor-widget elementor-widget-image\" data-id=\"bc2e1c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf-2.png\" class=\"attachment-large size-large wp-image-1356\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf-2.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf-2-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf-2-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1056c7 elementor-widget elementor-widget-heading\" data-id=\"d1056c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">In-depth Analysis\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89d199c elementor-widget elementor-widget-text-editor\" data-id=\"89d199c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"Benefits\" class=\"icons-bunch\"><div class=\"row\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"pcs-card\"><div class=\"row justify-content-center\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-5 different-height-md\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height blue-border-cyber verticlally-middle card-white__wrapper no-margin-d bg-gray align-items-start\"><div><p>Get real-time alerts and insight-driven reports pow.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cc4a652 e-con-full e-flex e-con e-child\" data-id=\"cc4a652\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-21fff6c e-con-full e-flex e-con e-child\" data-id=\"21fff6c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7247833 e-con-full e-flex e-con e-child\" data-id=\"7247833\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4d3af6 elementor-widget elementor-widget-image\" data-id=\"e4d3af6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1091499.png\" class=\"attachment-large size-large wp-image-1357\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1091499.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1091499-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1091499-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d050f1 elementor-widget elementor-widget-heading\" data-id=\"1d050f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Automated Threat Containment\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f27036 elementor-widget elementor-widget-text-editor\" data-id=\"4f27036\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"Benefits\" class=\"icons-bunch\"><div class=\"row\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"pcs-card\"><div class=\"row justify-content-center\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-5 different-height-md\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><div class=\"row equal-height-parent-6 justify-content-center different-height-md\"><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><div class=\"row justify-content-center equal-height-parent-6\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height blue-border-cyber verticlally-middle card-white__wrapper no-margin-d bg-gray align-items-start\"><div><p>Real-time response to threats and advanced threat containment based on changes in trust levels.<\/p><\/div><\/div><\/div><\/div><div class=\"row justify-content-center equal-height-parent-7\"><div class=\"col-md-6 \"><div class=\"text-align-center equal-height blue-border-cyber verticlally-middle card-white__wrapper no-margin-d bg-gray align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d24ecd e-con-full e-flex e-con e-child\" data-id=\"3d24ecd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-67db322 e-con-full e-flex e-con e-child\" data-id=\"67db322\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5f839c0 e-con-full e-flex e-con e-child\" data-id=\"5f839c0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2c4bcc2 e-con-full e-flex e-con e-child\" data-id=\"2c4bcc2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d7e329 elementor-widget elementor-widget-image\" data-id=\"3d7e329\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5153631.png\" class=\"attachment-large size-large wp-image-1360\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5153631.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5153631-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5153631-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-846fdd2 elementor-widget elementor-widget-heading\" data-id=\"846fdd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerability Assessment\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a83bf6 elementor-widget elementor-widget-text-editor\" data-id=\"0a83bf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"Benefits\" class=\"icons-bunch\"><div class=\"row\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"pcs-card\"><div class=\"row justify-content-center\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-5 different-height-md\"><div class=\"pcs-card-con no-margin-d equal-height\"><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div class=\"col-md-6 \"><div class=\"text-align-center equal-height blue-border-cyber verticlally-middle card-white__wrapper no-margin-d bg-gray align-items-start\"><div><p>Complete secure access and 360-degree protection to analyze vulnerabilities.<\/p><\/div><\/div><\/div><div class=\"col-md-6 \"><div class=\"text-align-center equal-height blue-border-cyber verticlally-middle card-white__wrapper no-margin-d bg-gray align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-79fafbe e-con-full e-flex e-con e-child\" data-id=\"79fafbe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-76563a0 e-con-full e-flex e-con e-child\" data-id=\"76563a0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b332d37 e-con-full e-flex e-con e-child\" data-id=\"b332d37\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-82e9388 elementor-widget elementor-widget-image\" data-id=\"82e9388\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1-1.png\" class=\"attachment-large size-large wp-image-1361\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1-1.png 500w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1-1-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1-1-150x150.png 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-522f7cc elementor-widget elementor-widget-heading\" data-id=\"522f7cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Holistic View of Security Infrastructure\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1c6f0e elementor-widget elementor-widget-text-editor\" data-id=\"a1c6f0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"Benefits\" class=\"icons-bunch\"><div class=\"row\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"pcs-card\"><div class=\"row justify-content-center\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-5 different-height-md\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><div class=\"col-md-4 mb30-d mb15-m\"><div class=\"pcs-card-con no-margin-d equal-height\"><div><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"differentiators\"><div class=\"row justify-content-center equal-height-parent-7\"><div class=\"col-md-6 \"><div class=\"text-align-center equal-height blue-border-cyber verticlally-middle card-white__wrapper no-margin-d bg-gray align-items-start\"><div><p>Even when networks, devices, and environments constantly shift, zero trust security architecture offers a comprehensive view of all the risks.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-black\"><div class=\"container\"><div class=\"\"><div class=\"info-section max-width\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-edd6e72 e-flex e-con-boxed e-con e-parent\" data-id=\"edd6e72\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-078e402 e-con-full e-flex e-con e-child\" data-id=\"078e402\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84b83cd elementor-widget elementor-widget-heading\" data-id=\"84b83cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Connect with our Data Security Experts\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c790f1 e-con-full e-flex e-con e-child\" data-id=\"0c790f1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e33962d elementor-align-center elementor-widget elementor-widget-button\" data-id=\"e33962d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-77f2d0b e-flex e-con-boxed e-con e-parent\" data-id=\"77f2d0b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6437d3a e-con-full e-flex e-con e-child\" data-id=\"6437d3a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9f7bdf1 elementor-widget elementor-widget-heading\" data-id=\"9f7bdf1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">In a Nutshell: CloudEngin End-to-end Managed Cybersecurity Services\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8e1c50e e-con-full e-flex e-con e-child\" data-id=\"8e1c50e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c8e8e1b elementor-widget elementor-widget-text-editor\" data-id=\"c8e8e1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-left col-lg-6\"><div class=\"col-left col-lg-6\"><div class=\"row pb50\"><div class=\"col-md-7\"><p>CloudEngin, the world\u2019s largest application-focused cloud managed services provider and one of the leading managed cybersecurity companies, has dedicated years of time and resources to develop a futuristic, highly intelligent end-to-end managed cybersecurity services and solutions bouquet for your assets: devices, networks, servers, applications, systems, workloads, virtual systems, and most importantly data.<\/p><\/div><\/div><div class=\"row card-white--full-height\"><div class=\"col-md-6\"><div class=\"card-white__wrapper\">\u00a0<\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee010d5 e-con-full e-flex e-con e-child\" data-id=\"ee010d5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c2e0cf elementor-widget elementor-widget-text-editor\" data-id=\"5c2e0cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"card-white--full-height pt50\"><div class=\"row \"><div class=\"col-12\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"row \"><div class=\"col-md-12\"><div class=\"col-left col-lg-6\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"card-white--full-height pt50\"><div class=\"row \"><div class=\"col-12\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div><div class=\"row \"><div class=\"col-md-12\"><div><div class=\"col-md-6\"><div class=\"card-white__wrapper\"><p>Avail fully compliant, automated, and AI-powered platforms to leverage the best of security and cybersecurity as a service offerings in the market, gain maximum cloud security benefits at minimal costs, and integrate unique threat management frameworks. Embrace end-to-end public cloud managed security services and solutions on Microsoft Azure, AWS, GCP, Oracle Cloud, IBM Cloud, etc.<\/p><\/div><\/div><div class=\"col-md-6\"><div class=\"card-white__wrapper\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f67067c e-con-full e-flex e-con e-child\" data-id=\"f67067c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df2402f elementor-widget elementor-widget-text-editor\" data-id=\"df2402f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"card-white--full-height pt50\"><div class=\"row \"><div class=\"col-12\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"row \"><div class=\"col-md-12\"><div class=\"col-left col-lg-6\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"card-white--full-height pt50\"><div class=\"row \"><div class=\"col-12\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div><div class=\"row \"><div class=\"col-md-12\"><div><p>Gain 24\/7 automated monitoring, predictive alerting and deep analytics, and cybersecurity consulting services and support. Transform your entire security strategy with state-of-the-art cybersecurity methodologies and frameworks availing Cloud4C\u2019s unique, AI-driven Managed Detection and Response (MDR) and Security Operations Centre (SOC) offerings.<\/p><p>Guarantee uncompromised security, uninterrupted continuity, and unstoppable transformative growth with Cloud4C managed IT security services.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-34e897e e-flex e-con-boxed e-con e-parent\" data-id=\"34e897e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd18cfa elementor-widget__width-initial e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"fd18cfa\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;stretch&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"265391354\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-2653913541\" data-tab-title-id=\"e-n-tab-title-2653913541\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-2653913541\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tSIEM (Security Information and Event Management) \t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2653913542\" data-tab-title-id=\"e-n-tab-title-2653913542\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2653913542\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tData Security and Security Analysts \t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2653913543\" data-tab-title-id=\"e-n-tab-title-2653913543\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2653913543\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tIdentity and Access Management\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2653913544\" data-tab-title-id=\"e-n-tab-title-2653913544\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2653913544\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tEndpoint Security Services\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-2653913541\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2653913541\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-19dd59a e-con-full e-flex e-con e-child\" data-id=\"19dd59a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-e3934a0 e-flex e-con-boxed e-con e-child\" data-id=\"e3934a0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8597a0f elementor-widget elementor-widget-text-editor\" data-id=\"8597a0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><p>Avail real-time, 24\/7 incident management including cyber threats monitoring, detection, analysis, and response management. Gain ultra-level visibility to all risks and threat possibilities across the entire IT landscape: data, applications, networks, computing infra, datacenter assets, databases, middleware-OS-platforms-architectures, cloud infrastructure, third-party integrations, and more. Integrate advanced analytics and intelligent cybersecurity solutions to predict risks, ensure end-to-end health monitoring, bolster system security standards, and agile threat remediation.<\/p><ul class=\"bulleted-list pt-20\"><li>Real-time log and data collection<\/li><li>Threat Hunting and Investigation<\/li><li>Vulnerability Assessment<\/li><li>Event correlation<\/li><li>24\/7 Threat Monitoring and real-time threat detection<\/li><li>Threat Intelligence Feeds<\/li><li>Real-time monitoring<\/li><li>Prioritization<\/li><li>User Behaviour Analytics<\/li><li>SOAR (Security Orchestration and Automated Response)<\/li><li>Data Examination and Obfuscation<\/li><li>Incident Forensics<\/li><li>SOC Audit and Compliance Management<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2653913542\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2653913542\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-d78fb96 e-con-full e-flex e-con e-child\" data-id=\"d78fb96\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4291402 e-flex e-con-boxed e-con e-child\" data-id=\"4291402\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dc663c9 elementor-widget elementor-widget-text-editor\" data-id=\"dc663c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section><section><div id=\"htab-2\" class=\"tab-pane active\"><div id=\"htab-2\" class=\"tab-pane active\"><p>Monitor all dataflow or telemetry from networks, datacenter assets, devices, third-party solutions, backend architectures, cloud environments via the SOC and SIEM landscape. With the help of world-class security analysts, Shield dataflows, intellectual rights information, encrypt information, perform advanced incident and data forensics, and gain cutting-edge security analytics. Filter our false positives through advanced Machine Learning to reduce stress on internal security teams.<\/p><ul class=\"bulleted-list pt-20\"><li>Advanced Threat Protection<\/li><li>File Integrity Monitoring<\/li><li>Data Masking and Obfuscation<\/li><li>Database Activity Monitoring<\/li><li>HSM and KMS<\/li><li>AI DLP and DCT<\/li><li>Information Rights Management<\/li><li>Local DPA-based Tool Integrations<\/li><li>Secure Data lifecycle management<\/li><\/ul><\/div><\/div><\/section><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2653913543\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2653913543\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-a1ba747 e-flex e-con-boxed e-con e-child\" data-id=\"a1ba747\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0f913ae e-con-full e-flex e-con e-child\" data-id=\"0f913ae\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ecebd68 elementor-widget elementor-widget-text-editor\" data-id=\"ecebd68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><p>Monitor, assess, and administer user roles and activity across the entire enterprise functionalities. Assign access controls, integrate deep user behaviour analytics, monitor end consumer activities, manage identities and passwords, and authorize special security administration roles.<\/p><ul class=\"bulleted-list pt-20\"><li>IDAM<\/li><li>Federated Adaptive Authorization<\/li><li>Privileged Access Management<\/li><li>Multi-factor Authentication<\/li><li>Identity and Passwords administration<\/li><li>CASB<\/li><li>Automated Reconciliation<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2653913544\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2653913544\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-76d3dd2 e-flex e-con-boxed e-con e-child\" data-id=\"76d3dd2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1552991 e-con-full e-flex e-con e-child\" data-id=\"1552991\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b9a2c5b elementor-widget elementor-widget-text-editor\" data-id=\"b9a2c5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel7\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"myTab\" class=\"custom-tabs custom-tabs-mdr\"><div class=\"pb50\"><div class=\"tab-content-mdr\"><div id=\"htab-4\" class=\"tab-pane active\"><div id=\"htab-4\" class=\"tab-pane active\"><div class=\"pb50\"><div class=\"tab-content-mdr\"><div id=\"htab-4\" class=\"tab-pane active\"><div id=\"htab-4\" class=\"tab-pane active\"><div id=\"htab-4\" class=\"tab-pane active\"><p>Conventional End-Point Protection Solutions are signature-based &#8211; identifying threats based on known file signatures for newly discovered threats. CloudEngin moves the level much higher with the advanced Endpoint Detection and Response (EDR) platform. The solution combines next-gen antivirus capabilities with additional intelligent tools to deliver real-time anomaly detection and alerting, forensic analysis, and endpoint remediation capabilities. Record every file execution and modification, registry change, network connection, and binary execution across your endpoints and third-party service organization workflows. Identify threats, deploy resources, analyze with advanced technology, and respond to incidents in near real-time.<\/p><ul class=\"bulleted-list pt-20\"><li>Endpoint Managed Detection and Response<\/li><li>Antivirus and Antimalware functionality (HIDS\/HIPS)<\/li><li>Network Access Control<\/li><li>Virtual Patching and Policy<\/li><li>Enforcements<\/li><li>Anti-phishing<\/li><li>EDR and UEBA<\/li><li>Host Encryption<\/li><li>Enterprise Mobility<\/li><li>Containerization and Run-time Security<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a6f2ff9 e-flex e-con-boxed e-con e-parent\" data-id=\"a6f2ff9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c703c0d elementor-widget__width-initial e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"c703c0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;stretch&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"208681997\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-2086819971\" data-tab-title-id=\"e-n-tab-title-2086819971\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-2086819971\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tOn-prem, Enterprise, and SaaS Applications Security\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2086819972\" data-tab-title-id=\"e-n-tab-title-2086819972\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2086819972\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tNetwork<br> Security\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2086819973\" data-tab-title-id=\"e-n-tab-title-2086819973\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2086819973\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tSecurity Incident Response Team (SIRT) Services\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2086819974\" data-tab-title-id=\"e-n-tab-title-2086819974\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2086819974\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tHost <br> Security\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-2086819971\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2086819971\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-6880021 e-con-full e-flex e-con e-child\" data-id=\"6880021\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-9f02746 e-flex e-con-boxed e-con e-child\" data-id=\"9f02746\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ae110ab elementor-widget elementor-widget-text-editor\" data-id=\"ae110ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><p>Deploy stringent security and threat monitoring measures on enterprise applications, on premises or cloud app data and workflows. Ensure advanced DDOS Protection, DAST-SAST, Fraud Analytics, API Security, and more. Integrate 24\/7 monitoring over the application usability lifecycle including active users and synchronizations with third-party modules, solutions, and functionalities. Identify threats, deploy resources, analyze with advanced technology, and respond to incidents in near real-time.<\/p><ul class=\"bulleted-list pt-20\"><li>WAF and DDOS Protection<\/li><li>OWASP Top 10<\/li><li>DAST\/SAST<\/li><li>RASP and Advanced Monitoring<\/li><li>Secure Code Repositories<\/li><li>DevSecOps<\/li><li>Web Certificates<\/li><li>Fraud Analytics<\/li><li>API Security<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2086819972\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2086819972\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-8d54fd7 e-con-full e-flex e-con e-child\" data-id=\"8d54fd7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8760f74 e-flex e-con-boxed e-con e-child\" data-id=\"8760f74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9d04192 elementor-widget elementor-widget-text-editor\" data-id=\"9d04192\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section><section><div id=\"htab-2\" class=\"tab-pane active\"><div id=\"htab-2\" class=\"tab-pane active\"><p>Shield your organizational networks and workflows including internal private networks, external community and communication networks, IP Addresses, Protocols, Perimeter Networks, End-point Networks, IoT Networks, etc. Shield your assets from malicious activities and intrusions while connected to end-user networks anytime, anywhere. Integrate modern security frameworks and methodologies for maximum protection.<\/p><ul class=\"bulleted-list pt-20\"><li>NGFW<\/li><li>NIFS<\/li><li>Anti Malware<\/li><li>Network DLP<\/li><li>Anti Spam<\/li><li>DDOS Protection<\/li><li>Zero Trust Protection<\/li><li>Micro-Segmentation<\/li><li>Network APT<\/li><li>IoT Security<\/li><li>Deception Technology<\/li><\/ul><\/div><\/div><\/section><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2086819973\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2086819973\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-c1c67bb e-flex e-con-boxed e-con e-child\" data-id=\"c1c67bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fd413f4 e-con-full e-flex e-con e-child\" data-id=\"fd413f4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ca6340 elementor-widget elementor-widget-text-editor\" data-id=\"3ca6340\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><p>Ensure advanced, hyper agile security response and incident remediation with a dedicated SIRT or Cyber Security Team. Run routine vulnerability assessments and 24\/7 deep level monitoring, integrate SIEM and Analytics with Managed Detection and Response, embrace threat intelligence controls, and modernize SecOps with world-class security process automation solutions. Perform stringent penetration tests to realize IT security capabilities. Integrate Self Healing Operations for end-to-end preventive maintenance.<\/p><ul class=\"bulleted-list pt-20\"><li>24\/7 Security Operations Monitoring<\/li><li>Automated threat response services<\/li><li>SIEM and Analytics<\/li><li>Vulnerability Management<\/li><li>White Box\/Black Box Testing Services<\/li><li>Threat Intelligence and Controls<\/li><li>Breach Simulation and Cyber Drills<\/li><li>V-CISO Services<\/li><li>SOAR and AI-based automation<\/li><li>MDR, Playbooks<\/li><li>GRC Tools and Advisory<\/li><li>IT Risk Advisory and Maturity Modelling<\/li><li>Regulatory Compliance Support<\/li><li>Telemetry Analytics<\/li><li>Self-Healing Operations<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2086819974\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2086819974\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-24c65fc e-flex e-con-boxed e-con e-child\" data-id=\"24c65fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-03ad4a3 e-con-full e-flex e-con e-child\" data-id=\"03ad4a3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ec3649 elementor-widget elementor-widget-text-editor\" data-id=\"6ec3649\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel7\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"myTab\" class=\"custom-tabs custom-tabs-mdr\"><div class=\"pb50\"><div class=\"tab-content-mdr\"><div id=\"htab-4\" class=\"tab-pane active\"><div id=\"htab-4\" class=\"tab-pane active\"><div class=\"pb50\"><div class=\"tab-content-mdr\"><div id=\"htab-4\" class=\"tab-pane active\"><div id=\"htab-4\" class=\"tab-pane active\"><div id=\"htab-4\" class=\"tab-pane active\"><p>Secure hosting assets end-to-end including websites, emails, applications, data, and more. Integrate advanced patch management and hardening techniques to secure hosted accounts with deep level scrutiny and protection. Build human practices and methodologies to ensure 24\/7 monitoring of hosted assets, effective authorization management, identity and passwords protection, detection of unfiltered threats, and agile threat responses. Encrypt hosted information and secure backend architectures for maximum protection.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-885647c e-flex e-con-boxed e-con e-parent\" data-id=\"885647c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f61e25 elementor-widget__width-initial e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"5f61e25\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;stretch&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"100015653\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1000156531\" data-tab-title-id=\"e-n-tab-title-1000156531\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1000156531\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tDevSecOps\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1000156532\" data-tab-title-id=\"e-n-tab-title-1000156532\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1000156532\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tCloud-native Security\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1000156533\" data-tab-title-id=\"e-n-tab-title-1000156533\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1000156533\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tCompliant-ready security operations\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1000156534\" data-tab-title-id=\"e-n-tab-title-1000156534\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1000156534\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tLatest Threat Intelligence Solutions\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1000156531\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1000156531\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-88fb66b e-con-full e-flex e-con e-child\" data-id=\"88fb66b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-4e276f3 e-flex e-con-boxed e-con e-child\" data-id=\"4e276f3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2befd3d elementor-widget elementor-widget-text-editor\" data-id=\"2befd3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><p>With the development processes now getting more complicated and cyberthreats exponentially rising, it\u2019s wiser to integrate continual security policies, processes, and technologies into the DevOps culture and workflows. Managed SOC-as-a-service operations blend seamlessly with enterprise DevSecOps. Following \u2018Security by Design\u2019, CloudEngin helps embed security as a core discipline in the development of IT systems, tools, microservices, containers, automation, APIs, testing tools. Below is the CloudEngin DevSecOps overview:<\/p><ul class=\"bulleted-list pt-20\"><li>Address Security Objectives and Threat Modelling<\/li><li>IDE Security Plug-ins<\/li><li>SAST\/DAST\/IAST SCA<\/li><li>Integration Testing<\/li><li>Software Signing<\/li><li>Signature Verification and Defense Depth Measurement<\/li><li>RASP UEBA\/Network Monitoring Pen Test<\/li><li>Security Orchestration, RASP\/WAF Shielding Obfuscation<\/li><li>Dev Consumable Correlated Vulnerability Analysis: IoC\/TI STIX TAXI<\/li><li>Modified Incident Response Management<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1000156532\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1000156532\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-22154c8 e-con-full e-flex e-con e-child\" data-id=\"22154c8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c214e19 e-flex e-con-boxed e-con e-child\" data-id=\"c214e19\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-330833a elementor-widget elementor-widget-text-editor\" data-id=\"330833a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section><section><div id=\"htab-2\" class=\"tab-pane active\"><div id=\"htab-2\" class=\"tab-pane active\"><p>CloudEngin provides comprehensive cloud-native security strategy, blueprinting, POC, and implementation services for any cloud, any platform as part of its extended SOC offerings. Avail end-to-end infra and assets security management for widely adopted public cloud platforms such as AWS (Amazon Web Services), Microsoft Azure, Google Cloud Platform (GCP), Oracle Cloud, etc. Integrate advanced AI-powered cloud-native security solutions such as Azure Sentinel, Amazon Cloudwatch, AWS Security Hub, CloudTrail, GCP Security, and more. Secure your IaaS, PaaS, SaaS, CaaS architectures with ease with end-to-end cloud cybersecurity management. Gain 24\/7 cybersecurity consulting and support.<\/p><ul class=\"bulleted-list pt-20\"><li><span class=\"font-700\">PaaS Security &#8211;<\/span>\u00a0Runtime protection, vulnerability management, Automatic configuration of security policies, network protection, secure endpoint<\/li><li><span class=\"font-700\">IaaS Security &#8211;<\/span>\u00a0Automated auditing and monitoring, Identity Access Management, Data and Infra protection, Vulnerability Management and File Integrity Monitoring, Micro-Segmentation, Automated Compliance Monitoring<\/li><li><span class=\"font-700\">CaaS Security &#8211;<\/span>\u00a0Managed Kubernetes security, container workload security management, CI\/CD Scanning, Container-to-container micro-segmentation, Access Controls, incident response, forensic analysis<\/li><li><span class=\"font-700\">SaaS Security &#8211;<\/span>\u00a0Network environment, platforms, systems, monitoring, and protection including firewalls, servers, emails, web applications<\/li><li><span class=\"font-700\">Cloud Workload Protection Platforms (CWPP) &#8211;<\/span>\u00a0VMs, Hosts, IaaS, PaaS or cloud native platform, CaaS, SaaS, data<\/li><li><span class=\"font-700\">Cloud Security Posture Management (CSPM) &#8211;<\/span>\u00a0Multi-cloud security posture, Asset Inventory Management, Misconfiguration Monitoring, and Remediation, Compliance Monitoring and Reporting<\/li><li><span class=\"font-700\">Cloud Access Security Broker (CASB) &#8211;<\/span>\u00a0Overall visibility, Threat Protection, Data Security, Access Control Management Hybrid\/Multi-cloud managed security services<\/li><\/ul><\/div><\/div><\/section><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1000156533\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1000156533\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-a535d4a e-flex e-con-boxed e-con e-child\" data-id=\"a535d4a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b196484 e-con-full e-flex e-con e-child\" data-id=\"b196484\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bebde35 elementor-widget elementor-widget-text-editor\" data-id=\"bebde35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><p>Compliance-related complications often result in major loopholes in an organization\u2019s IT workflows. This might be an inviting proposition to cybercriminals. CloudEngin compliant-ready offerings as part of the extended SOC-as-a-service suite ensure client facilities are duly compliant with data localization-residency laws, national regulations, local compliances, and international certifications. Compliance adherences, not limited to are:<\/p><ul class=\"bulleted-list pt-20\"><li>IRAP<\/li><li>Bank Negara<\/li><li>Central Bank of Oman<\/li><li>SAMA<\/li><li>FINMA<\/li><li>UAE Compliances<\/li><li>RBI<\/li><li>MAS<\/li><li>OJK<\/li><li>GDPR<\/li><li>CSA<\/li><li>PCI-DSS<\/li><li>HIPAA<\/li><li>GXP<\/li><li>International Standards: ISO-27001, ISO-27017, ISO-27018, ISO-22301, ISO-20000, AICPA SOC, AICPA SOC2<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1000156534\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1000156534\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-94ad693 e-flex e-con-boxed e-con e-child\" data-id=\"94ad693\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f8bd51a e-con-full e-flex e-con e-child\" data-id=\"f8bd51a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-153046f elementor-widget elementor-widget-text-editor\" data-id=\"153046f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel7\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"myTab\" class=\"custom-tabs custom-tabs-mdr\"><div class=\"pb50\"><div class=\"tab-content-mdr\"><div id=\"htab-4\" class=\"tab-pane active\"><div id=\"htab-4\" class=\"tab-pane active\"><div class=\"pb50\"><div class=\"tab-content-mdr\"><div id=\"htab-4\" class=\"tab-pane active\"><div id=\"htab-4\" class=\"tab-pane active\"><div id=\"htab-4\" class=\"tab-pane active\"><p>Adopt Managed Security Center Operations or SOC services to integrate cutting-edge threat intelligence and automation solutions within organizational workflows or as part of CSIRT, SIEM operations. Consolidate cybersecurity management for IP\/Domain Reputation, File Reputation, CWPP, CSPM, CASB, Phishing-malware-ransomware feeds, IT assets. Avail the proprietary Self Healing or Preventive Maintenance Platform to not only reduce Meantime to Detect and Meantime to Repair but do away with threats via advanced risk prediction and automated risk healing processes. Modernize cybersecurity administration with advanced AI-driven platforms under the supervision of a world-class SOC team.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f2e15f6 e-flex e-con-boxed e-con e-parent\" data-id=\"f2e15f6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8a363aa e-con-full e-flex e-con e-child\" data-id=\"8a363aa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-892087e elementor-widget elementor-widget-heading\" data-id=\"892087e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Connect with our Managed Security Operations Center Experts\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0329060 e-con-full e-flex e-con e-child\" data-id=\"0329060\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-29aff94 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"29aff94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc70e95 e-flex e-con-boxed e-con e-parent\" data-id=\"fc70e95\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c78fe07 elementor-widget elementor-widget-heading\" data-id=\"c78fe07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Impact: Why Managed SOC Offerings from CloudEngin?\n<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b1cd011 e-con-full e-flex e-con e-child\" data-id=\"b1cd011\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e277512 e-con-full e-flex e-con e-child\" data-id=\"e277512\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c3bc7b2 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"c3bc7b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9404214.jpeg\" class=\"attachment-large size-large wp-image-1323\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9404214.jpeg 400w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9404214-300x300.jpeg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9404214-150x150.jpeg 150w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-856acb4 elementor-widget elementor-widget-text-editor\" data-id=\"856acb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>World\u2019s largest application-focused managed service provider with dedicated Managed Security Services and advanced managed Security Operations Center Offerings<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-be8e31f e-con-full e-flex e-con e-child\" data-id=\"be8e31f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b1702b1 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"b1702b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"474\" height=\"474\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75.jpg\" class=\"attachment-large size-large wp-image-1045\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75.jpg 474w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75-300x300.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75-150x150.jpg 150w\" sizes=\"(max-width: 474px) 100vw, 474px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-adf37b4 elementor-widget elementor-widget-text-editor\" data-id=\"adf37b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Serving 2500+ enterprises including 50+ Global Fortune 1000 Companies in 29 countries across Americas, Europe, Middle East, and APAC for 12+ years<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c8cd95a e-con-full e-flex e-con e-child\" data-id=\"c8cd95a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d4cf136 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"d4cf136\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1252927.png\" class=\"attachment-large size-large wp-image-1411\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1252927.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1252927-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1252927-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec2c51e elementor-widget elementor-widget-text-editor\" data-id=\"ec2c51e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>40+ Security Controls, 25 Centres of Excellence, 1600+ Global Cloud Experts<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f96f08 e-con-full e-flex e-con e-child\" data-id=\"7f96f08\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e5f5eae e-con-full e-flex e-con e-child\" data-id=\"e5f5eae\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d62d9c9 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"d62d9c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/7283164421.jpg\" class=\"attachment-large size-large wp-image-1412\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/7283164421.jpg 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/7283164421-300x300.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/7283164421-150x150.jpg 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4229fee elementor-widget elementor-widget-text-editor\" data-id=\"4229fee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>7 Security frameworks utilizing the MITRE ATT &amp; CK, CIS Critical Security Controls, and more.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2ce4977 e-con-full e-flex e-con e-child\" data-id=\"2ce4977\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bbb55da elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"bbb55da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"222\" height=\"227\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/25.jpg\" class=\"attachment-large size-large wp-image-1006\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-665201e elementor-widget elementor-widget-text-editor\" data-id=\"665201e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Comprehensive 24&#215;7 cybersecurity monitoring programs<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-38cf19c e-con-full e-flex e-con e-child\" data-id=\"38cf19c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-827ba5b elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"827ba5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/2483419.png\" class=\"attachment-large size-large wp-image-1283\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/2483419.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/2483419-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/2483419-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-973e2e5 elementor-widget elementor-widget-text-editor\" data-id=\"973e2e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Automated solutions for security threats prediction, detection, and response: Advanced Managed Detection and Response Solutions.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3945005 e-con-full e-flex e-con e-child\" data-id=\"3945005\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1b775b6 e-con-full e-flex e-con e-child\" data-id=\"1b775b6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8dc8095 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"8dc8095\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/campoal-org-icon.svg\" class=\"attachment-large size-large wp-image-1307\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11ffeb0 elementor-widget elementor-widget-text-editor\" data-id=\"11ffeb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Global expertise in managed SOC (Security Operations Center) services and solutions.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4ae573a e-con-full e-flex e-con e-child\" data-id=\"4ae573a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b52579d elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"b52579d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9396814.png\" class=\"attachment-large size-large wp-image-1284\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9396814.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9396814-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9396814-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a88726a elementor-widget elementor-widget-text-editor\" data-id=\"a88726a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Dedicated cybersecurity consulting, cybersecurity assessment, and audit report offerings.<\/p><\/div><\/div><\/div><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-75ff48d e-con-full e-flex e-con e-child\" data-id=\"75ff48d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f301945 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"f301945\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/hp-incident-management-bl.svg\" class=\"attachment-large size-large wp-image-1385\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-317cd36 elementor-widget elementor-widget-text-editor\" data-id=\"317cd36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Advanced CloudEngin Cybersecurity Incident and Response (CSIRT) team.<\/p><\/div><\/div><\/div><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c2dd240 e-con-full e-flex e-con e-child\" data-id=\"c2dd240\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6261472 e-con-full e-flex e-con e-child\" data-id=\"6261472\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e4dc93 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"3e4dc93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1129004.png\" class=\"attachment-large size-large wp-image-1309\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1129004.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1129004-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1129004-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c20bab3 elementor-widget elementor-widget-text-editor\" data-id=\"c20bab3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"differentiators\"><div class=\"row justify-content-center equal-height-parent-11\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"cloud4C-advantage\"><div class=\"row justify-content-center equal-height-parent-9\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"cloud4C-advantage\"><div class=\"row justify-content-center equal-height-parent-9\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>1600+ cloud experts and a world-class security team with industry-leading certifications: Hyperscaler Security, Hyperscaler Platform, CISSP, OSCP, CEH, CHFI, Comp TIA Security<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ddcdf9e e-con-full e-flex e-con e-child\" data-id=\"ddcdf9e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f176149 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"f176149\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/artificial-intelligence-1743104-1482205.png\" class=\"attachment-large size-large wp-image-1053\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/artificial-intelligence-1743104-1482205.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/artificial-intelligence-1743104-1482205-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/artificial-intelligence-1743104-1482205-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d34871f elementor-widget elementor-widget-text-editor\" data-id=\"d34871f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"differentiators\"><div class=\"row justify-content-center equal-height-parent-11\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"cloud4C-advantage\"><div class=\"row justify-content-center equal-height-parent-9\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"cloud4C-advantage\"><div class=\"row justify-content-center equal-height-parent-9\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Threat intelligence powered by industry-leading platforms such as Microsoft, OSINT, STIX&amp;TAXI, MISP, and more.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-56c4837 e-flex e-con-boxed e-con e-parent\" data-id=\"56c4837\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e33ae7 elementor-widget elementor-widget-heading\" data-id=\"4e33ae7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity - FAQs\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac4dcd6 elementor-widget elementor-widget-n-accordion\" data-id=\"ac4dcd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1800\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1800\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What does SOC mean? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1800\" class=\"elementor-element elementor-element-d81a9c7 e-con-full e-flex e-con e-child\" data-id=\"d81a9c7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0b141af elementor-widget elementor-widget-text-editor\" data-id=\"0b141af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><p>SOC or Security Operations Center is a framework concerning people, resources, methodologies, and processes to unify cybersecurity administration within an organization. The team collects telemetry and information from multiple sources and IT-cloud assets, performs 24\/7 monitoring, engages in deep level threat investigations, and initiates hyper-fast responses during breach incidents.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1801\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1801\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What does the SOC team do and what are their roles? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1801\" class=\"elementor-element elementor-element-c09b102 e-con-full e-flex e-con e-child\" data-id=\"c09b102\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f245c87 elementor-widget elementor-widget-text-editor\" data-id=\"f245c87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><p>A Security Operation Center or SOC services team is comprised of Security Officers, Main Administrator, Security Engineers, Threat investigators and responders, and security auditors. The team is responsible for constant monitoring of dataflows across multiple business processes, systems, IT assets including networks, computing devices, middleware platforms, software, cloud environments, etc. The team members conduct deep level threat investigation once a breach has occurred including immediate response management and system recovery. The Security Operations Center or SOC-as-a-service team also equips the IT systems with advanced security solutions such as threat intelligence, automations, and frameworks to keep the firm up to date with modern cybersecurity trends. In addition, the SOC audit team ensures fail-proof compliance of IT systems with national, international regulations and standards.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1802\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1802\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What should a SOC monitor? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1802\" class=\"elementor-element elementor-element-e517e1a e-con-full e-flex e-con e-child\" data-id=\"e517e1a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d2e05c elementor-widget elementor-widget-text-editor\" data-id=\"3d2e05c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><div class=\"coll-pos\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"faq\" class=\"faq-wrapper\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><p>A Security Operations Center services or SOC-as-a-Service team constantly monitors all assets and dataflows, telemetry from applications, data, business processes, middleware, platforms, OS, computing infra, cloud environments, endpoint and IoT landscapes to detect, analyze, and prevent any lurking threats, signature malicious codes, or planned attacks.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1803\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1803\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What is a cyber SOC? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1803\" class=\"elementor-element elementor-element-ca01f5a e-con-full e-flex e-con e-child\" data-id=\"ca01f5a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd5dd09 elementor-widget elementor-widget-text-editor\" data-id=\"bd5dd09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><div class=\"coll-pos\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"faq\" class=\"faq-wrapper\"><div class=\"coll-pos\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"faq\" class=\"faq-wrapper\"><div class=\"coll-pos\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"faq\" class=\"faq-wrapper\"><div class=\"coll-pos\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"faq\" class=\"faq-wrapper\"><div class=\"coll-pos\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"faq\" class=\"faq-wrapper\"><div class=\"coll-pos\"><p>A Cyber Security Operations Center is an online-centric managed SOC framework wherein a client is equipped with cutting-edge security automation solutions and an extended team to detect, analyze, and respond to all attacks occurring on digital and web assets.<\/p><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50  bg-gray \"><div class=\" container\"><div class=\"row justify-content-between \"><div class=\"col-lg-6\"><div class=\"\"><div id=\"contact\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/section><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bba631d e-flex e-con-boxed e-con e-parent\" data-id=\"bba631d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a8ad57b e-con-full e-flex e-con e-child\" data-id=\"a8ad57b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5941ee9 e-con-full e-flex e-con e-child\" data-id=\"5941ee9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc9ad41 elementor-widget elementor-widget-heading\" data-id=\"fc9ad41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Solidify your enterprise Cybersecurity with CloudEngin<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-14bff16 e-con-full e-flex e-con e-child\" data-id=\"14bff16\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca90b84 elementor-widget elementor-widget-text-editor\" data-id=\"ca90b84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Schedule a consultation with our Cloud experts and get answers for any specific queries you may have. You can also schedule a visit to our Datacenters, or share feedback on our website and services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-03ff01b e-con-full e-flex e-con e-child\" data-id=\"03ff01b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0499a19 elementor-widget elementor-widget-heading\" data-id=\"0499a19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Get in Touch<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2526e84 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"2526e84\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"New Form\" aria-label=\"New Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"572\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"2526e84\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Managed SOC\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"572\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tName\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Name\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Email\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_815e145 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_815e145\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tTel\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_815e145]\" id=\"form-field-field_815e145\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Tel\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Only numbers and phone characters (#, -, *, etc) are accepted.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_169bf39 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_169bf39\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCompany\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_169bf39]\" id=\"form-field-field_169bf39\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Company\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tMessage\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"5\" placeholder=\"Your Message...\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_2c751e3 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_2c751e3]\" id=\"form-field-field_2c751e3\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-field_2c751e3\">I\u2019d like to receive more information from CloudEngin. By submitting this form, I am providing consent to receive marketing communications and I understand and agree to the usage of my corporate contact information in accordance with CloudEngin privacy statement.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Submit<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-925f316 elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"925f316\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"form\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>managed security Operations Center (SOC) Services Centralize organizational security with a world-class threat monitoring, detection, analysis, response, and Managed SOC [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-572","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=572"}],"version-history":[{"count":16,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/572\/revisions"}],"predecessor-version":[{"id":4224,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/572\/revisions\/4224"}],"wp:attachment":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}