{"id":594,"date":"2025-11-07T13:57:51","date_gmt":"2025-11-07T13:57:51","guid":{"rendered":"https:\/\/dev.cloudengin.com\/?page_id=594"},"modified":"2026-01-15T04:35:14","modified_gmt":"2026-01-15T04:35:14","slug":"vulnerability-assrssment","status":"publish","type":"page","link":"https:\/\/www.cloudengin.com\/?page_id=594","title":{"rendered":"Vulnerability Assessment"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"594\" class=\"elementor elementor-594\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd26803 e-flex e-con-boxed e-con e-parent\" data-id=\"fd26803\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c0226b9 elementor-widget elementor-widget-heading\" data-id=\"c0226b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerability Assessment and Penetration Testing (VAPT) Services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c4a300 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"3c4a300\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"banner-text\"><p class=\"pb30\">Completely secure systems and enterprise data with 360-degree threat and vulnerability analysis, penetration or intrusion testing, and proactive patching and remediation of gaps<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e36ed0 elementor-widget elementor-widget-button\" data-id=\"7e36ed0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-67be77b e-flex e-con-boxed e-con e-parent\" data-id=\"67be77b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e1a2e7f e-con-full e-flex e-con e-child\" data-id=\"e1a2e7f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f97534f elementor-widget elementor-widget-heading\" data-id=\"f97534f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Explore the smart capabilities of CloudEngin state-of-the-art vulnerability assessment and testing services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32be785 e-con-full e-flex e-con e-child\" data-id=\"32be785\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd2af60 elementor-widget elementor-widget-text-editor\" data-id=\"cd2af60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-left col-lg-6\"><div class=\"col-left col-lg-6\"><div class=\"col-left col-lg-6\"><p>As technology has advanced, so has the sophistication of cyber-attacks and malicious attempts from hackers to steal data and resources. This has also been aided by the free availability of various vulnerability exploitation tools on the internet that even script kiddies can leverage to cause serious damage to the organization.<\/p><p>Even small and medium enterprises cannot afford to overlook their organizational security posture as vulnerabilities would almost definitely lead to successful breaches and ransomware incidents. These small and medium enterprises today play an integral part in their respective ecosystems. Due to business functionalities or as outsourced services partners for MNCs (which would have the latest defences), they handle and work with sensitive PII. So, it becomes easier for hackers to target these smaller organizations and exploit their vulnerabilities.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6bf0bf2 e-con-full e-flex e-con e-child\" data-id=\"6bf0bf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c16608c elementor-widget elementor-widget-text-editor\" data-id=\"c16608c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"row pt10\"><div class=\"col-sm-12 mt-mobile-4 pb20-m\"><div class=\"col-md-7 pl-4 pr-4\"><div class=\"pb50\"><div class=\"row\"><div class=\"col-md-8\"><div class=\"col-left col-lg-6\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"card-white--full-height pt50\"><div class=\"row \"><div class=\"col-12\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"row \"><div class=\"col-md-12\"><div class=\"col-left col-lg-6\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"card-white--full-height pt50\"><div class=\"row \"><div class=\"col-12\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"row \"><div class=\"col-md-12\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"row \"><div class=\"col-md-12\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"card-white--full-height pt50\"><div class=\"row \"><div class=\"col-12\"><div><p>This is why Vulnerability Risk Assessment and Penetration Testing (VAPT) is mandatory for industries and sectors where security is paramount. Most global compliance standards such as PCI DSS, HIPAA, CERT-In, etc., require periodic audits to ensure that organizations are able to identify, assess, and patch critical vulnerabilities quickly, and effectively. CloudEngin one-stop VAPT solutions with end-to-end vulnerability analysis and vulnerability scan help organizations identify and eradicate complex and hidden vulnerabilities and secure sensitive data.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ab4f16 e-flex e-con-boxed e-con e-parent\" data-id=\"5ab4f16\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d3ec70 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"6d3ec70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Common Enterprise Challenges vs Benefits:\nWhy Your Enterprise Needs End-to-end Vulnerability Assessment and Penetration Testing?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a3ca12 e-flex e-con-boxed e-con e-parent\" data-id=\"2a3ca12\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f756a43 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"f756a43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"259353155\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-2593531551\" data-tab-title-id=\"e-n-tab-title-2593531551\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-2593531551\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tData breach due to insecure configurations\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2593531552\" data-tab-title-id=\"e-n-tab-title-2593531552\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2593531552\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tFaulty encryption methods\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2593531553\" data-tab-title-id=\"e-n-tab-title-2593531553\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2593531553\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tFlaws in software source code\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2593531554\" data-tab-title-id=\"e-n-tab-title-2593531554\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2593531554\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tFaulty cookies management\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2593531555\" data-tab-title-id=\"e-n-tab-title-2593531555\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2593531555\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tVulnerabilities across networks, devices, and applications\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2593531556\" data-tab-title-id=\"e-n-tab-title-2593531556\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2593531556\" style=\"--n-tabs-title-order: 6;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tImproper asset vulnerability management\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-2593531551\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2593531551\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-86afb8b e-con-full e-flex e-con e-child\" data-id=\"86afb8b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-4547066 e-flex e-con-boxed e-con e-child\" data-id=\"4547066\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ceff801 elementor-widget elementor-widget-image\" data-id=\"ceff801\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/10f4323256a743299b4f2d0054684383-rf854g2feax7v00rqb0mnxil1bvv5pw24v2kq6rngo.jpg\" title=\"10f4323256a743299b4f2d0054684383\" alt=\"10f4323256a743299b4f2d0054684383\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b5c29a elementor-widget elementor-widget-text-editor\" data-id=\"5b5c29a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div>Comprehensive scanning for open ports and assessment of password credentials and complex configuration issues that can be easily exploited by cybercriminals to gain network access.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-black\"><div class=\"container\"><div class=\"\"><div class=\"info-section max-width\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-intelligent-security-analytics-SIEMpage-2_0.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2593531552\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2593531552\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-a7b54c6 e-con-full e-flex e-con e-child\" data-id=\"a7b54c6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-74bf911 e-flex e-con-boxed e-con e-child\" data-id=\"74bf911\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c47b78b elementor-widget elementor-widget-image\" data-id=\"c47b78b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/ramsay-rf855ilt6idz30gsh9oc05she4lwxb51y5thej6idk.jpg\" title=\"ramsay\" alt=\"ramsay\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e98107 elementor-widget elementor-widget-text-editor\" data-id=\"0e98107\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div>A thorough analysis of the encryption methods used in data transmission to ensure complete elimination of eavesdropping and tampering.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-black\"><div class=\"container\"><div class=\"\"><div class=\"info-section max-width\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-security-monitoring-SIEMpage-3_0.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-tools-and-technology-expertise-ManagedSOCpage-3.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-tools-and-technology-expertise-ManagedSOCpage-3.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2593531553\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2593531553\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-0ce0338 e-con-full e-flex e-con e-child\" data-id=\"0ce0338\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-11524a2 e-flex e-con-boxed e-con e-child\" data-id=\"11524a2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8adfb52 elementor-widget elementor-widget-image\" data-id=\"8adfb52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/78b12fdbab6ec25db14e8ce74fd2e677-rf856ujkv27lj4j5pceb1bozos1mtvfd4r38vn7fk8.jpg\" title=\"78b12fdbab6ec25db14e8ce74fd2e677\" alt=\"78b12fdbab6ec25db14e8ce74fd2e677\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c1715c elementor-widget elementor-widget-text-editor\" data-id=\"7c1715c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel2\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel2\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel2\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div>Detailed assessment of every software source code to identify source code inject and flaws that can cause data leakages.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-black\"><div class=\"container\"><div class=\"\"><div class=\"info-section max-width\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alerts-management-SIEMpage-4_0.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2593531554\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2593531554\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-8ab9faf e-con-full e-flex e-con e-child\" data-id=\"8ab9faf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-1e8b7dd e-flex e-con-boxed e-con e-child\" data-id=\"1e8b7dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67b427e elementor-widget elementor-widget-image\" data-id=\"67b427e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/AA1LvcbR-rf8586hcjm17z8lixf4a2hlhzfhcqfpobcd0cr8cqw.jpeg\" title=\"AA1LvcbR\" alt=\"AA1LvcbR\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd450d4 elementor-widget elementor-widget-text-editor\" data-id=\"dd450d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel3\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel3\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel3\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div>Testing of cookies used by software to eliminate vulnerabilities that can be exploited to gain network access.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-black\"><div class=\"container\"><div class=\"\"><div class=\"info-section max-width\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/mage-for-reporting-SIEMpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/threat-monitoring-ManagedSOCpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/threat-monitoring-ManagedSOCpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2593531555\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2593531555\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-0847af6 e-flex e-con-boxed e-con e-child\" data-id=\"0847af6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-17f0658 e-con-full e-flex e-con e-child\" data-id=\"17f0658\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd54f38 elementor-widget elementor-widget-image\" data-id=\"dd54f38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/\u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u0430\u043a\u0442\u0438\u0432\u0430\u0446\u0438\u0438-\u0432\u0435\u0449\u0435\u0439-58358707-rf85bgx0gqjcm3thpub9snpktz9loarurmk6tmcqyw.jpg\" title=\"\u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u0430\u043a\u0442\u0438\u0432\u0430\u0446\u0438\u0438-\u0432\u0435\u0449\u0435\u0439-58358707\" alt=\"\u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u0430\u043a\u0442\u0438\u0432\u0430\u0446\u0438\u0438-\u0432\u0435\u0449\u0435\u0439-58358707\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29a4afc elementor-widget elementor-widget-text-editor\" data-id=\"29a4afc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel4\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel4\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel4\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel4\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div>Black-box, gray-box, and white-box testing to identify and assess vulnerabilities based on NIST CVSS v3 scoring and reports based on industry best practices.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-black\"><div class=\"container\"><div class=\"\"><div class=\"info-section max-width\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-compliance-management-SIEMpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alert-management-ManagedSOCpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alert-management-ManagedSOCpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/threat-monitoring-ManagedSOCpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2593531556\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2593531556\" data-tab-index=\"6\" style=\"--n-tabs-title-order: 6;\" class=\" elementor-element elementor-element-1d6a212 e-flex e-con-boxed e-con e-child\" data-id=\"1d6a212\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d6a7d8d e-con-full e-flex e-con e-child\" data-id=\"d6a7d8d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6944bb4 elementor-widget elementor-widget-image\" data-id=\"6944bb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/elementor\/thumbs\/gi-kl-1255683032-1920x1080-1-rf85ed93jci6etlxsleuzfdqrqzcepa25yz33c21s8.jpg\" title=\"gi-kl-1255683032-1920&#215;1080\" alt=\"gi-kl-1255683032-1920x1080\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af82542 elementor-widget elementor-widget-text-editor\" data-id=\"af82542\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel4\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel4\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div class=\"col-md-7 pd-lft\"><div class=\"col-md-7 pd-lft\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel4\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel5\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div><div>Complete analysis of network and IT infrastructure to determine the overall status of the existing security posture.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-black\"><div class=\"container\"><div class=\"\"><div class=\"info-section max-width\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-compliance-management-SIEMpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alert-management-ManagedSOCpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-alert-management-ManagedSOCpage-6.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/threat-monitoring-ManagedSOCpage-5.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/preventive-maintenance-ManagedSOCpage-4.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><div class=\"col-md-5 img-tb-col\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/Image-for-asset-visibility-and-protection-ManagedSOCpage-2.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ed90e4e e-flex e-con-boxed e-con e-parent\" data-id=\"ed90e4e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d57219a e-con-full e-flex e-con e-child\" data-id=\"d57219a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16df7e5 elementor-widget elementor-widget-heading\" data-id=\"16df7e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Connect with our Vulnerability Assessment Experts\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d298062 e-con-full e-flex e-con e-child\" data-id=\"d298062\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e835fb elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1e835fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-165405e e-flex e-con-boxed e-con e-parent\" data-id=\"165405e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41002c4 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"41002c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The CloudEngin Methodology of VAPT Services\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce0927a e-flex e-con-boxed e-con e-parent\" data-id=\"ce0927a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84ad919 elementor-widget__width-initial e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"84ad919\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;stretch&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"139122969\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1391229691\" data-tab-title-id=\"e-n-tab-title-1391229691\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1391229691\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tObjective of Vulnerability Assessment Services\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1391229692\" data-tab-title-id=\"e-n-tab-title-1391229692\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1391229692\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tBroader Scope of Service\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1391229693\" data-tab-title-id=\"e-n-tab-title-1391229693\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1391229693\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tThe Implementation Process\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1391229691\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1391229691\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-95d283b e-con-full e-flex e-con e-child\" data-id=\"95d283b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-1c90e61 e-flex e-con-boxed e-con e-child\" data-id=\"1c90e61\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2549915 elementor-widget elementor-widget-text-editor\" data-id=\"2549915\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><div id=\"htab-1\" class=\"tab-pane active\"><ul class=\"bulleted-list\"><li>Identify vulnerabilities and security weaknesses that may expose the information technology (IT) assets of an organization to the risk of compromise by malicious user or party.<\/li><li>Classify discovered vulnerabilities according to risk level and severity.<\/li><li>Improve the security posture of the organization by proactively identifying security weaknesses and insecure configuration present in IT assets and provide remediation actions.<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1391229692\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1391229692\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-44353cf e-con-full e-flex e-con e-child\" data-id=\"44353cf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3a741eb e-flex e-con-boxed e-con e-child\" data-id=\"3a741eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2c3b92a elementor-widget elementor-widget-text-editor\" data-id=\"2c3b92a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section><section><div id=\"htab-2\" class=\"tab-pane active\"><div id=\"htab-2\" class=\"tab-pane active\"><div id=\"htab-2\" class=\"tab-pane active\"><p>The scope of the Vulnerability Assessment service includes all IT assets that are connected to the organization\u2019s network. Vulnerability Assessment provides an insight into an organization\u2019s current state of security, and the effectiveness of its countermeasures. Vulnerability Assessments is performed in two formats:<\/p><p><span class=\"txt-bold\">External Vulnerability Assessment:<\/span><br \/>Performed remotely with no internal access provided to our SOC team. The goal of this test is to identify and classify the weaknesses of the internet-facing IT assets of an organization such as Web applications, web servers, network endpoints, VPN, and e-mail servers. This test helps an organization to learn what external IT assets need security controls, patches, and general hardening.<\/p><p><span class=\"txt-bold\">Internal Vulnerability Assessment:<\/span><br \/>Performed from within the premises of the target organization, usually to identify and classify threats and weaknesses in the internal network. It helps an organization determine its compliance to global or local policies, standards and procedures in terms of information security, data protection and segmentation of networks.<\/p><\/div><\/div><\/div><\/section><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1391229693\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1391229693\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-58e1369 e-flex e-con-boxed e-con e-child\" data-id=\"58e1369\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-55af564 e-con-full e-flex e-con e-child\" data-id=\"55af564\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33f5ae7 elementor-widget elementor-widget-text-editor\" data-id=\"33f5ae7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"benefits\" class=\"vertical-tabs tabs-dropdown\"><div class=\"collapsible-wrapper\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel\" class=\"collapsible-tabs-panel show h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"vertical-tabs tabs-dropdown pb50\"><div class=\"collapsible-items\"><div class=\"collapsible-tabs\"><div class=\"collapsible-tabs-content\"><div id=\"v-panel1\" class=\"collapsible-tabs-panel h-100\"><div class=\"d-flex h-100 justify-content-around\"><div class=\"collapsible-tabs-text\"><div class=\"d-flex flex-column justify-content-between h-100\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><div id=\"htab-3\" class=\"tab-pane active\"><p>Vulnerability Assessment is usually performed according to the following steps:<\/p><ul class=\"bulleted-list\"><li>Discovery and Objectivity, Maturity Analysis<\/li><li>Vulnerability Scanning across the IT landscape: infra, platforms, networks, databases, apps, workloads<\/li><li>Identify IT assets against known security vulnerabilities<\/li><li>Perform Advanced Penetration Testing on scanned assets<\/li><li>Result Analysis and presentation<\/li><li>Review of identified vulnerabilities and eliminate false positives<\/li><li>Blueprint to remediate risks and enhance IT security end-to-end<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50bd4b8 e-flex e-con-boxed e-con e-parent\" data-id=\"50bd4b8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55bd42b elementor-widget elementor-widget-heading\" data-id=\"55bd42b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CloudEngin End-to-end Managed Vulnerability Assessment and Penetration Testing Services\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-688a9c3 e-flex e-con-boxed e-con e-parent\" data-id=\"688a9c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-12042f6 e-con-full e-flex e-con e-child\" data-id=\"12042f6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3a27a08 e-con-full e-flex e-con e-child\" data-id=\"3a27a08\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-37db0a3 e-con-full e-flex e-con e-child\" data-id=\"37db0a3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8645e11 elementor-widget elementor-widget-image\" data-id=\"8645e11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/iconfinder-contat-us-16important-mail-4211843_115045.png\" class=\"attachment-large size-large wp-image-1491\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/iconfinder-contat-us-16important-mail-4211843_115045.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/iconfinder-contat-us-16important-mail-4211843_115045-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/iconfinder-contat-us-16important-mail-4211843_115045-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c2a5e2e e-con-full e-flex e-con e-child\" data-id=\"c2a5e2e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8ccedf elementor-widget elementor-widget-heading\" data-id=\"b8ccedf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerability Assessment and Penetration Testing for Web Applications\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83e2b3f elementor-widget elementor-widget-text-editor\" data-id=\"83e2b3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div class=\"col-md-4 mb30-d different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-lg-6 col-md-6 equal-height-parent-2\"><div class=\"icon-left-text-right card-white__wrapper align-items-start equal-height\"><div class=\"icon-text-right\"><p>CloudEngin relies on a comprehensive framework for conducting a complete assessment of web applications. Our specialist penetration testing cloud team conducts thorough testing to identify and eliminate security vulnerabilities.<\/p><\/div><\/div><\/div><div class=\"col-lg-6 col-md-6 equal-height-parent-2\"><div class=\"icon-left-text-right card-white__wrapper align-items-start equal-height\"><div class=\"icon-img-left\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9792f75 e-con-full e-flex e-con e-child\" data-id=\"9792f75\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-46bec8a e-con-full e-flex e-con e-child\" data-id=\"46bec8a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f127e24 elementor-widget elementor-widget-image\" data-id=\"f127e24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1035211.png\" class=\"attachment-large size-large wp-image-1495\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1035211.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1035211-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1035211-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-22e4fb2 e-con-full e-flex e-con e-child\" data-id=\"22e4fb2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df41f01 elementor-widget elementor-widget-heading\" data-id=\"df41f01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Penetration Testing for Internal and External Networks\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-975b34d elementor-widget elementor-widget-text-editor\" data-id=\"975b34d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div class=\"col-md-4 mb30-d different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-lg-6 col-md-6 equal-height-parent-3\"><div class=\"icon-left-text-right card-white__wrapper align-items-start equal-height\"><div class=\"icon-text-right\"><p>We provide comprehensive Penetration Testing Services for internal and external works to simulate real-world attacks in order to identify and bridge the gaps in the network infrastructure.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-304d3ef e-con-full e-flex e-con e-child\" data-id=\"304d3ef\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5f7289f e-con-full e-flex e-con e-child\" data-id=\"5f7289f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-987bfde elementor-widget elementor-widget-image\" data-id=\"987bfde\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5770602.png\" class=\"attachment-large size-large wp-image-1497\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5770602.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5770602-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5770602-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c72f6a0 e-con-full e-flex e-con e-child\" data-id=\"c72f6a0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-02b0c8b elementor-widget elementor-widget-heading\" data-id=\"02b0c8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerability Assessment for Remote Working Environment\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5444c92 elementor-widget elementor-widget-text-editor\" data-id=\"5444c92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div class=\"col-md-4 mb30-d different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-md-4 different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-lg-6 col-md-6 equal-height-parent-4\"><div class=\"icon-left-text-right card-white__wrapper align-items-start equal-height\"><div class=\"icon-text-right\"><p>We ensure that organizational networks, applications, and devices are completely protected and fully secured with an end-to-end remote working security assessment.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-81072d1 e-con-full e-flex e-con e-child\" data-id=\"81072d1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2d8848d e-con-full e-flex e-con e-child\" data-id=\"2d8848d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-500145f elementor-widget elementor-widget-image\" data-id=\"500145f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5770602.png\" class=\"attachment-large size-large wp-image-1497\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5770602.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5770602-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5770602-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8633f9f e-con-full e-flex e-con e-child\" data-id=\"8633f9f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ce499d elementor-widget elementor-widget-heading\" data-id=\"3ce499d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Subnet Scanning\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3dc67b0 elementor-widget elementor-widget-text-editor\" data-id=\"3dc67b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div class=\"col-md-4 mb30-d different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-md-4 different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-lg-6 col-md-6 equal-height-parent-5\"><div class=\"icon-left-text-right card-white__wrapper align-items-start equal-height\"><div class=\"icon-text-right\"><p>We perform subnet scanning to identify active IP addresses and end-of-life operating systems and devices that can pose security risks.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9cd7f79 e-con-full e-flex e-con e-child\" data-id=\"9cd7f79\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ea65064 e-con-full e-flex e-con e-child\" data-id=\"ea65064\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fef8871 e-con-full e-flex e-con e-child\" data-id=\"fef8871\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8c403f elementor-widget elementor-widget-image\" data-id=\"e8c403f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/14197730.png\" class=\"attachment-large size-large wp-image-1494\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/14197730.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/14197730-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/14197730-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa8b39d e-con-full e-flex e-con e-child\" data-id=\"fa8b39d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b88e4f elementor-widget elementor-widget-heading\" data-id=\"6b88e4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerability Assessment and Penetration Testing for Mobile Applications\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0f0448 elementor-widget elementor-widget-text-editor\" data-id=\"d0f0448\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div class=\"col-lg-6 col-md-6 equal-height-parent-2\"><div class=\"icon-left-text-right card-white__wrapper align-items-start equal-height\"><div class=\"icon-text-right\"><p>At CloudEngin, we follow Open Source Security Testing and Standard Penetration Testing methodologies to identify and eliminate the vulnerabilities in iOS and Android applications.<\/p><\/div><\/div><\/div><div class=\"col-lg-6 col-md-6 equal-height-parent-3\"><div class=\"icon-left-text-right card-white__wrapper align-items-start equal-height\"><div class=\"icon-img-left\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-76ac4d9 e-con-full e-flex e-con e-child\" data-id=\"76ac4d9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-bbcc383 e-con-full e-flex e-con e-child\" data-id=\"bbcc383\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2638c9d elementor-widget elementor-widget-image\" data-id=\"2638c9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/contacts.svg\" class=\"attachment-large size-large wp-image-1496\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3bb3194 e-con-full e-flex e-con e-child\" data-id=\"3bb3194\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db79d58 elementor-widget elementor-widget-heading\" data-id=\"db79d58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Penetration Testing for Wireless Network\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b06cf1 elementor-widget elementor-widget-text-editor\" data-id=\"6b06cf1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"microsoft-azure\"><div class=\"row justify-content-center equal-height-parent-11\"><div class=\"col-md-6\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div><div class=\"col-md-4 different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-lg-6 col-md-6 equal-height-parent-3\"><div class=\"icon-left-text-right card-white__wrapper align-items-start equal-height\"><div class=\"icon-text-right\"><p>CloudEngin provides a range of wireless penetration services to identify vulnerabilities and quantify the damage that could be caused. It helps to restrict unknown entry to the organization&#8217;s network.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d1de0cc e-con-full e-flex e-con e-child\" data-id=\"d1de0cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-505c81d e-con-full e-flex e-con e-child\" data-id=\"505c81d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88f9bc1 elementor-widget elementor-widget-image\" data-id=\"88f9bc1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146.png\" class=\"attachment-large size-large wp-image-1054\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146.png 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-150x150.png 150w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b20a56 e-con-full e-flex e-con e-child\" data-id=\"6b20a56\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-049219c elementor-widget elementor-widget-heading\" data-id=\"049219c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Deep Assessments\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba9951a elementor-widget elementor-widget-text-editor\" data-id=\"ba9951a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"microsoft-azure\"><div class=\"row justify-content-center equal-height-parent-11\"><div class=\"col-md-6\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div><div class=\"col-md-4 different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"differentiators\" class=\"card-white--full-height email-card-con\"><div class=\"row grid-center\"><div class=\"col-md-4 different-height-md equal-height-parent\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-lg-6 col-md-6 equal-height-parent-4\"><div class=\"icon-left-text-right card-white__wrapper align-items-start equal-height\"><div class=\"icon-text-right\"><p>CloudEngin vulnerability assessment can be performed to identify all the affected assets of the organization. The goal is to identify known security exposures before malicious attackers can exploit them.<\/p><\/div><\/div><\/div><div class=\"col-lg-6 col-md-6 equal-height-parent-5\"><div class=\"icon-left-text-right card-white__wrapper align-items-start equal-height\"><div class=\"icon-img-left\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0ca904b e-con-full e-flex e-con e-child\" data-id=\"0ca904b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c7e43df e-con-full e-flex e-con e-child\" data-id=\"c7e43df\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c26cf41 elementor-widget elementor-widget-image\" data-id=\"c26cf41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146.png\" class=\"attachment-large size-large wp-image-1054\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146.png 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-150x150.png 150w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f34357e e-con-full e-flex e-con e-child\" data-id=\"f34357e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-645e70a elementor-widget elementor-widget-heading\" data-id=\"645e70a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Firewall Configuration Review\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68da41f elementor-widget elementor-widget-text-editor\" data-id=\"68da41f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"microsoft-azure\"><div class=\"row justify-content-center equal-height-parent-11\"><div class=\"col-md-6\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div><div class=\"col-md-4 different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"differentiators\" class=\"card-white--full-height email-card-con\"><div class=\"row grid-center\"><div class=\"col-md-4 different-height-md equal-height-parent\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div class=\"row secops-card-con\"><div class=\"col-lg-6 col-md-6 equal-height-parent-5\"><div class=\"icon-left-text-right card-white__wrapper align-items-start equal-height\"><div class=\"icon-text-right\"><p>CloudEngin advanced penetration tester can easily detect unsafe configurations and instantly recommend protocols and changes to secure configuration.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-black\"><div class=\"container\"><div class=\"\"><div class=\"info-section max-width\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-00aff52 e-flex e-con-boxed e-con e-parent\" data-id=\"00aff52\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6f6aa55 e-con-full e-flex e-con e-child\" data-id=\"6f6aa55\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dc47a36 elementor-widget elementor-widget-heading\" data-id=\"dc47a36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Connect with our Vulnerability Assessment Experts\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-87726e6 e-con-full e-flex e-con e-child\" data-id=\"87726e6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc50354 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"fc50354\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ea44606 e-flex e-con-boxed e-con e-parent\" data-id=\"ea44606\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8cec2cf elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"8cec2cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Difference Maker - Why Rely on CloudEngin for Vulnerability Assessment and Penetration Testing Services?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-86fc372 e-flex e-con-boxed e-con e-parent\" data-id=\"86fc372\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-05749f6 e-con-full e-flex e-con e-child\" data-id=\"05749f6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3372227 e-con-full e-flex e-con e-child\" data-id=\"3372227\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1d6a1ee e-con-full e-flex e-con e-child\" data-id=\"1d6a1ee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4bf7b8d elementor-widget elementor-widget-heading\" data-id=\"4bf7b8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Service Enumeration\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2db916f elementor-widget elementor-widget-text-editor\" data-id=\"2db916f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div class=\"col-md-4 mb30-d different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Service enumeration on the internal subnets to identify vulnerable services due to a lack of hardening controls or plain text protocols.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a00f5c3 e-con-full e-flex e-con e-child\" data-id=\"a00f5c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5490b94 e-con-full e-flex e-con e-child\" data-id=\"5490b94\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-455bef6 elementor-widget elementor-widget-heading\" data-id=\"455bef6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CIS Hardening assessment\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61a68ce elementor-widget elementor-widget-text-editor\" data-id=\"61a68ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div class=\"col-md-4 mb30-d different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-7\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Assess organizational assets using CIS benchmarks with periodic checks is crucial to maintain its integrity, as well as improves the compliance of an asset<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a9a4345 e-con-full e-flex e-con e-child\" data-id=\"a9a4345\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2b3ec1e e-con-full e-flex e-con e-child\" data-id=\"2b3ec1e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9df13e3 elementor-widget elementor-widget-heading\" data-id=\"9df13e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Comprehensive reporting\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c35df1 elementor-widget elementor-widget-text-editor\" data-id=\"3c35df1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div class=\"col-md-4 mb30-d different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-7\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-8\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>CloudEngin VAPT offers comprehensive and out of box compliance reports for regulatory and custom requirements<\/p><\/div><\/div><\/div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-8\"><div class=\"equal-height pcs-card-con no-margin-d\"><div>\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-16540b2 e-con-full e-flex e-con e-child\" data-id=\"16540b2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-182d3ce e-con-full e-flex e-con e-child\" data-id=\"182d3ce\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d29bfbb elementor-widget elementor-widget-heading\" data-id=\"d29bfbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Detailed Insights\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dee4862 elementor-widget elementor-widget-text-editor\" data-id=\"dee4862\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div class=\"col-md-4 mb30-d different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-7\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-8\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-10\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>CloudEngin offers a complete overview of identified risks and the business impact. Insights into vulnerabilities backed with actionable recommendations and strategic security recommendations help to secure organization data and infrastructure.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5cb5a13 e-con-full e-flex e-con e-child\" data-id=\"5cb5a13\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5da2fb6 e-con-full e-flex e-con e-child\" data-id=\"5da2fb6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a38df94 elementor-widget elementor-widget-heading\" data-id=\"a38df94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Immediate Identification of Exact Vulnerabilities\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c853c26 elementor-widget elementor-widget-text-editor\" data-id=\"c853c26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div class=\"col-md-4 mb30-d different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-7\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-8\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-10\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-11\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Continuous vulnerability assessment is imperative to identify vulnerabilities so they are reported along with vulnerability ageing, available exploits for these vulnerabilities, etc.<\/p><\/div><\/div><\/div><div class=\"col-md-6 mb30-d equal-height-parent-11\"><div class=\"equal-height pcs-card-con no-margin-d\"><div>\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-78b238a e-con-full e-flex e-con e-child\" data-id=\"78b238a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-420300a e-con-full e-flex e-con e-child\" data-id=\"420300a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0773d87 e-con-full e-flex e-con e-child\" data-id=\"0773d87\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9857c5b elementor-widget elementor-widget-heading\" data-id=\"9857c5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Categorize vulnerabilities\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3457355 elementor-widget elementor-widget-text-editor\" data-id=\"3457355\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div class=\"col-md-4 mb30-d different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>CloudEngin VAPT empowers organizations to assess assets and categorize vulnerabilities into critical, severe, and moderate groups based on NIST CVSS v3 scoring<\/p><\/div><\/div><\/div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-7\"><div class=\"equal-height pcs-card-con no-margin-d\"><div>\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cce820c e-con-full e-flex e-con e-child\" data-id=\"cce820c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ffcf720 e-con-full e-flex e-con e-child\" data-id=\"ffcf720\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2423202 elementor-widget elementor-widget-heading\" data-id=\"2423202\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Automated penetration testing\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9510dc9 elementor-widget elementor-widget-text-editor\" data-id=\"9510dc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div class=\"col-md-4 mb30-d different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-7\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-7\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>CloudEngin VAPT automates exploitable critical vulnerabilities reported in the vulnerability assessment to prioritize critical vulnerabilities to address<\/p><\/div><\/div><\/div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-8\"><div class=\"equal-height pcs-card-con no-margin-d\"><div>\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-940f744 e-con-full e-flex e-con e-child\" data-id=\"940f744\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-526f2aa e-con-full e-flex e-con e-child\" data-id=\"526f2aa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c4e5b80 elementor-widget elementor-widget-heading\" data-id=\"c4e5b80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ASV Certified\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81a4dc2 elementor-widget elementor-widget-text-editor\" data-id=\"81a4dc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div class=\"col-md-4 mb30-d different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-7\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-8\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-8\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Vulnerability management solution is PCI \u2013DSS Authorized scanning vendor which helps to clear compliance and audit requirements<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bbbcf7f e-con-full e-flex e-con e-child\" data-id=\"bbbcf7f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-40c960f e-con-full e-flex e-con e-child\" data-id=\"40c960f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ff3894 elementor-widget elementor-widget-heading\" data-id=\"5ff3894\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Holistic View of Security Infrastructure\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3396f7 elementor-widget elementor-widget-text-editor\" data-id=\"a3396f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div class=\"col-md-4 mb30-d different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-7\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-8\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-10\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-10\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Even when networks, devices, environments constantly shift, CloudEngin VAPT offers a comprehensive view of all the risks.<\/p><\/div><\/div><\/div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-11\"><div class=\"equal-height pcs-card-con no-margin-d\"><div>\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f6e2401 e-con-full e-flex e-con e-child\" data-id=\"f6e2401\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-944ab38 e-con-full e-flex e-con e-child\" data-id=\"944ab38\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c271c34 elementor-widget elementor-widget-heading\" data-id=\"c271c34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ensure Complete Security with Expert Assistance\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad936ff elementor-widget elementor-widget-text-editor\" data-id=\"ad936ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\"><div class=\"icon-left-text-right\"><div class=\"icon-text-right\"><div class=\"col-md-6 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d cyber-box-shadow\"><div class=\"col-md-4 mb30-d different-height-md equal-height-parent mb15-m\"><div class=\"card-con-blue no-shadow no-margin-d equal-height\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-7\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-8\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-10\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-11\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div id=\"differentiators\" class=\"pcs-card\"><div class=\"row\"><div class=\"col-md-6 mb30-d equal-height-parent-11\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>CloudEngin VAPT experts will help you provide the right information to the right people in your security team.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"cloud4C-advantage\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c174f66 e-flex e-con-boxed e-con e-parent\" data-id=\"c174f66\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fefb45f elementor-widget elementor-widget-heading\" data-id=\"fefb45f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The CloudENgin Advantage\n<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-de31e5c e-con-full e-flex e-con e-child\" data-id=\"de31e5c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-59c682f e-con-full e-flex e-con e-child\" data-id=\"59c682f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cc8ab89 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"cc8ab89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/classic_infrastructure_icon_216392.png\" class=\"attachment-large size-large wp-image-959\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/classic_infrastructure_icon_216392.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/classic_infrastructure_icon_216392-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/classic_infrastructure_icon_216392-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-332af54 elementor-widget elementor-widget-text-editor\" data-id=\"332af54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Trusted, the world\u2019s largest application-focused managed cloud service providers and one of the leading managed cybersecurity companies.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f0bf4e e-con-full e-flex e-con e-child\" data-id=\"8f0bf4e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4efa05e elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"4efa05e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435-2.png\" class=\"attachment-large size-large wp-image-1498\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435-2.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435-2-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/\u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435-2-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4f1362 elementor-widget elementor-widget-text-editor\" data-id=\"d4f1362\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Serving 2500+ enterprises including 50+ Global Fortune 1000 Companies in 29 countries across Americas, Europe, Middle East, and APAC for 12+ years<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bec39a4 e-con-full e-flex e-con e-child\" data-id=\"bec39a4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-701d3c3 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"701d3c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"474\" height=\"474\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75.jpg\" class=\"attachment-large size-large wp-image-1045\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75.jpg 474w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75-300x300.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4e78249a927e4a968e9de81e1ad75e75-150x150.jpg 150w\" sizes=\"(max-width: 474px) 100vw, 474px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b42da4f elementor-widget elementor-widget-text-editor\" data-id=\"b42da4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>40+ Security Controls, 25 Centres of Excellence, 1600+ Global Cloud Experts<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-25c533c e-con-full e-flex e-con e-child\" data-id=\"25c533c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4c1467b e-con-full e-flex e-con e-child\" data-id=\"4c1467b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84ad3dd elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"84ad3dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/08dbb3cd-17cb-44fc-8013-f7705d93bf3f.svg\" class=\"attachment-large size-large wp-image-970\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1927fba elementor-widget elementor-widget-text-editor\" data-id=\"1927fba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>7 Security frameworks utilizing the MITRE ATT &amp; CK, CIS Critical Security Controls, and more.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50a4c19 e-con-full e-flex e-con e-child\" data-id=\"50a4c19\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f120b17 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"f120b17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"222\" height=\"227\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/25.jpg\" class=\"attachment-large size-large wp-image-1006\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ac6d5d elementor-widget elementor-widget-text-editor\" data-id=\"4ac6d5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Comprehensive 24&#215;7 cybersecurity monitoring programs<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a76ee83 e-con-full e-flex e-con e-child\" data-id=\"a76ee83\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f41f363 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"f41f363\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf.png\" class=\"attachment-large size-large wp-image-1050\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28d19ef elementor-widget elementor-widget-text-editor\" data-id=\"28d19ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Automated solutions for security threats prediction, detection, and response: Advanced Managed Detection and Response Solutions.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-64c68b7 e-con-full e-flex e-con e-child\" data-id=\"64c68b7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-de3b232 e-con-full e-flex e-con e-child\" data-id=\"de3b232\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15dd4b5 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"15dd4b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/team_people_icon_205835.png\" class=\"attachment-large size-large wp-image-1499\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/team_people_icon_205835.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/team_people_icon_205835-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/team_people_icon_205835-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c41a90 elementor-widget elementor-widget-text-editor\" data-id=\"4c41a90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Global expertise in managed SOC (Security Operations Center) services and solutions.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-605a827 e-con-full e-flex e-con e-child\" data-id=\"605a827\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a8979f0 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"a8979f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6277940.png\" class=\"attachment-large size-large wp-image-1052\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6277940.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6277940-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6277940-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d1d29c elementor-widget elementor-widget-text-editor\" data-id=\"2d1d29c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Dedicated cybersecurity consulting, cybersecurity assessment, and audit report offerings.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c118e08 e-con-full e-flex e-con e-child\" data-id=\"c118e08\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-633e3b1 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"633e3b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/2029757.png\" class=\"attachment-large size-large wp-image-1437\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/2029757.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/2029757-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/2029757-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3747a2 elementor-widget elementor-widget-text-editor\" data-id=\"b3747a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Advanced CloudEngin Cybersecurity Incident and Response (CSIRT) team.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-238b5fe e-con-full e-flex e-con e-child\" data-id=\"238b5fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-cfac6cb e-con-full e-flex e-con e-child\" data-id=\"cfac6cb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-59f4e16 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"59f4e16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1129004.png\" class=\"attachment-large size-large wp-image-1309\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1129004.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1129004-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/1129004-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b82041 elementor-widget elementor-widget-text-editor\" data-id=\"9b82041\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Threat intelligence powered by industry-leading platforms such as Microsoft, OSINT, STIX&amp;TAXI, MISP, and more.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-702af96 e-con-full e-flex e-con e-child\" data-id=\"702af96\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-30e085b elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"30e085b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146.png\" class=\"attachment-large size-large wp-image-1054\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146.png 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-150x150.png 150w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-258212c elementor-widget elementor-widget-text-editor\" data-id=\"258212c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Considerable threat management expertise in securing large and complex environments, using advanced functionalities of top-notch and leading industry tools as well as Cloud-Native Security tools.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e63e2de e-con-full e-flex e-con e-child\" data-id=\"e63e2de\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-20add7c elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"20add7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169.png\" class=\"attachment-large size-large wp-image-1056\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b26742e elementor-widget elementor-widget-text-editor\" data-id=\"b26742e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Experience in deploying and managing robust SIEM &#8211; helping enterprises proactively assess vulnerabilities and automate incident response.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0a7d3f3 e-con-full e-flex e-con e-child\" data-id=\"0a7d3f3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2e51cb2 e-con-full e-flex e-con e-child\" data-id=\"2e51cb2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-436056c elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"436056c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/970799.png\" class=\"attachment-large size-large wp-image-1312\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/970799.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/970799-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/970799-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee37210 elementor-widget elementor-widget-text-editor\" data-id=\"ee37210\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Dedicated alert identity and access management operations with 24\/7 monitoring and response.<\/p><\/div><\/div><\/div><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-511569f e-con-full e-flex e-con e-child\" data-id=\"511569f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83a4667 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"83a4667\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4374976.png\" class=\"attachment-large size-large wp-image-1115\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4374976.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4374976-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4374976-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22e96de elementor-widget elementor-widget-text-editor\" data-id=\"22e96de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"cloud4C-advantage\"><div class=\"row justify-content-center equal-height-parent-9\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Real-time security reports and strategies<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"faq\" class=\"faq-wrapper\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-68576be e-flex e-con-boxed e-con e-parent\" data-id=\"68576be\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33c2662 elementor-widget elementor-widget-heading\" data-id=\"33c2662\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Email Security Solutions - FAQs\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7463ca5 elementor-widget elementor-widget-n-accordion\" data-id=\"7463ca5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1220\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1220\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What is Vulnerability Assessment? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1220\" class=\"elementor-element elementor-element-3c1026f e-con-full e-flex e-con e-child\" data-id=\"3c1026f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2c1ee8c elementor-widget elementor-widget-text-editor\" data-id=\"2c1ee8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><p>Vulnerability assessment involves a consistent review of security weaknesses and loopholes. It determines if the security is susceptible to any potential threats and classifies them according to severity and recommends solutions to mitigate those issues.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1221\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1221\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What is Penetration Testing? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1221\" class=\"elementor-element elementor-element-7282dec e-con-full e-flex e-con e-child\" data-id=\"7282dec\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a08f2df elementor-widget elementor-widget-text-editor\" data-id=\"a08f2df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><p>Pen testing is a security procedure where cyber experts assess existing security to identify loopholes and vulnerabilities.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1222\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1222\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What are the Different Types of Penetration Testing? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1222\" class=\"elementor-element elementor-element-d6f2560 e-con-full e-flex e-con e-child\" data-id=\"d6f2560\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef90cd3 elementor-widget elementor-widget-text-editor\" data-id=\"ef90cd3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><div class=\"coll-pos\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"faq\" class=\"faq-wrapper\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><div class=\"coll-pos\"><p>There are different types of penetration testing cloud which are as follows:<\/p><ul><li><span class=\"txt-bold\">White-Box Penetration Testing &#8211;<\/span>\u00a0Cyber experts start penetration testing with some information regarding the company&#8217;s existing security posture.<\/li><li><span class=\"txt-bold\">Black-Box Penetration Testing &#8211;<\/span>\u00a0Cyber experts start penetration testing without any information regarding the company&#8217;s existing security posture.<\/li><li><span class=\"txt-bold\">Double-Blind Penetration Testing &#8211;<\/span>\u00a0It is a form of pen test where no one in the company is aware of the testing. It involves understanding the real-time response of professionals during a cyberattack.<\/li><li><span class=\"txt-bold\">External Penetration Testing &#8211;<\/span>\u00a0Penetration testing is conducted on the organization&#8217;s external technology such as external networks and websites.<\/li><li><span class=\"txt-bold\">Internal Penetration Testing &#8211;<\/span>\u00a0Penetration testing is conducted on the organization&#8217;s internal network.<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2620e69 e-flex e-con-boxed e-con e-parent\" data-id=\"2620e69\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-50f2cbb e-con-full e-flex e-con e-child\" data-id=\"50f2cbb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f02d250 e-con-full e-flex e-con e-child\" data-id=\"f02d250\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5fcf03f elementor-widget elementor-widget-heading\" data-id=\"5fcf03f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Solidify your enterprise Cybersecurity with CloudEngin<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9ff19a6 e-con-full e-flex e-con e-child\" data-id=\"9ff19a6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-528db52 elementor-widget elementor-widget-text-editor\" data-id=\"528db52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Schedule a consultation with our Cloud experts and get answers for any specific queries you may have. You can also schedule a visit to our Datacenters, or share feedback on our website and services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b7a634 e-con-full e-flex e-con e-child\" data-id=\"6b7a634\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-532882d elementor-widget elementor-widget-heading\" data-id=\"532882d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Get in Touch<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38de660 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"38de660\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"New Form\" aria-label=\"New Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"594\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"38de660\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Vulnerability Assessment\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"594\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tName\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Name\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Email\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_815e145 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_815e145\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tTel\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_815e145]\" id=\"form-field-field_815e145\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Tel\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Only numbers and phone characters (#, -, *, etc) are accepted.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_169bf39 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_169bf39\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCompany\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_169bf39]\" id=\"form-field-field_169bf39\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Company\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tMessage\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"5\" placeholder=\"Your Message...\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_2c751e3 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_2c751e3]\" id=\"form-field-field_2c751e3\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-field_2c751e3\">I\u2019d like to receive more information from CloudEngin. By submitting this form, I am providing consent to receive marketing communications and I understand and agree to the usage of my corporate contact information in accordance with CloudEngin privacy statement.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Submit<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5876866 elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"5876866\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"form\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Vulnerability Assessment and Penetration Testing (VAPT) Services Completely secure systems and enterprise data with 360-degree threat and vulnerability analysis, penetration [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-594","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=594"}],"version-history":[{"count":14,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/594\/revisions"}],"predecessor-version":[{"id":4249,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/594\/revisions\/4249"}],"wp:attachment":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}