{"id":1440,"date":"2023-05-12T16:04:47","date_gmt":"2023-05-12T08:04:47","guid":{"rendered":"https:\/\/cyberspacetech.net\/?p=1440"},"modified":"2023-05-19T14:14:22","modified_gmt":"2023-05-19T06:14:22","slug":"cyber-security-services","status":"publish","type":"post","link":"https:\/\/cyberspacetech.net\/index.php\/2023\/05\/12\/cyber-security-services\/","title":{"rendered":"Cyber Security Services"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1440\" class=\"elementor elementor-1440\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-68073d960 elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"68073d960\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-52d8221b\" data-id=\"52d8221b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2c67e481 elementor-widget elementor-widget-heading\" data-id=\"2c67e481\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Security Services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b71522a elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"1b71522a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-658b2986\" data-id=\"658b2986\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-14963f70 elementor-widget elementor-widget-text-editor\" data-id=\"14963f70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyberspace Technology Pte.Ltd<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c308338 elementor-widget elementor-widget-heading\" data-id=\"5c308338\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/wa.link\/z1612l\">Our Expertise<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55cbf711 elementor-widget elementor-widget-text-editor\" data-id=\"55cbf711\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #14142b; font-family: 'HCLTech Roobert', sans-serif; font-size: 16px; letter-spacing: normal; text-align: left;\">We help you counter these risks effectively through our Dynamic Cybersecurity model. Cyberspace Technology Cybersecurity Services help organizations rethink, reimagine, and reengineer enterprise security for a dynamic business.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5a22fae elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"5a22fae\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-14967d80\" data-id=\"14967d80\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-13769d58 wpr-flip-box-anim-direction-down wpr-flip-box-animation-flip wpr-flip-box-animation-3d-yes wpr-flip-box-front-align-center wpr-flip-box-back-align-center elementor-widget elementor-widget-wpr-flip-box\" data-id=\"13769d58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\n\t\t<div class=\"wpr-flip-box\" data-trigger=\"hover\">\n\t\t\t\n\t\t\t<div class=\"wpr-flip-box-item wpr-flip-box-front wpr-anim-timing-ease-default\">\n\n\t\t\t\t<div class=\"wpr-flip-box-overlay\"><\/div>\n\n\t\t\t\t<div class=\"wpr-flip-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-image\">\n\t\t\t\t\t\t<img decoding=\"async\" alt=\"Cyberspace Technology-Cybersecurity\" src=\"https:\/\/cyberspacetech.net\/wp-content\/uploads\/2023\/05\/pngegg-10-1024x768.png\" >\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"wpr-flip-box-title\">Infrastructure &amp; Cloud Security<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-description\"><p>Infrastructure including networks, hybrid cloud, devices and endpoints, are highly vulnerable to threats and attacks. A security system that provides end-to-end visibility and greater awareness of cyber-threats are imperative to protect your enterprise.<\/p><\/div>\t\t\t\t\t\t\n\t\t\t\t\t\t\n\n\t\t\t\t\t\t\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"wpr-flip-box-item wpr-flip-box-back wpr-anim-timing-ease-default\">\n\n\t\t\t\t<div class=\"wpr-flip-box-overlay\"><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"wpr-flip-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-description\"><p><span style=\"text-decoration: underline\">Strategy, Consulting &amp; Architecture<\/span><br \/>Security technology framework assessment, Security roadmap, Security technology gap assessment, Security\u00a0solution architecture<br \/><span style=\"text-decoration: underline\">Transformation &amp; Integration<\/span><br \/>Product Evaluation, Solution Design, Solution integration and implementation, Technology refresh, Migration management, Project\u00a0Management<br \/><span style=\"text-decoration: underline\">Managed Security Services<\/span><br \/>Security incident monitoring and reporting service, Security infrastructure management service, Vulnerability assessment &amp; Penetration test, Application code review &amp; security test<\/p><\/div>\t\t\t\t\t\t\n\t\t\t\t\t\t\n\n\t\t\t\t\t\t\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4fcc4ba9\" data-id=\"4fcc4ba9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-58d38bfc wpr-flip-box-anim-direction-down wpr-flip-box-animation-flip wpr-flip-box-animation-3d-yes wpr-flip-box-front-align-center wpr-flip-box-back-align-center elementor-widget elementor-widget-wpr-flip-box\" data-id=\"58d38bfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\n\t\t<div class=\"wpr-flip-box\" data-trigger=\"hover\">\n\t\t\t\n\t\t\t<div class=\"wpr-flip-box-item wpr-flip-box-front wpr-anim-timing-ease-default\">\n\n\t\t\t\t<div class=\"wpr-flip-box-overlay\"><\/div>\n\n\t\t\t\t<div class=\"wpr-flip-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-image\">\n\t\t\t\t\t\t<img decoding=\"async\" alt=\"\" src=\"https:\/\/cyberspacetech.net\/wp-content\/uploads\/2023\/05\/pngegg-9.png\" >\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"wpr-flip-box-title\">Application Security<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-description\"><p>application security solution is robust, scalable, and business-centric and seamlessly aligns with the dynamics of application development. By moving beyond traditional, siloed approaches, We equips enterprises with the right methodology to effectively identify and remediate vulnerabilities.<\/p><\/div>\t\t\t\t\t\t\n\t\t\t\t\t\t\n\n\t\t\t\t\t\t\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"wpr-flip-box-item wpr-flip-box-back wpr-anim-timing-ease-default\">\n\n\t\t\t\t<div class=\"wpr-flip-box-overlay\"><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"wpr-flip-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"wpr-flip-box-title\">\n\t\t\t\t\t\t\t<a href=\"#\">Construction materials\u200b<\/a>\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-description\"><p><span style=\"text-decoration: underline\">Strategy, consulting and architecture<br \/><\/span>Secure-Software Development Lifecycle, Consulting , Application <br \/>security design consulting,<br \/>Application security, architecture review \/Threat modeling services, Static Appsec assessment, Dynamic Appsec assessment, Mobile application security testing, Application security training<br \/><span style=\"text-decoration: underline\">Transformation and integration<br \/><\/span>DevSecOps integration services, AppSec program management, Tool implementation<br \/>\u00a0(SAST\/DAST\/SCA), API testing, SAP applications vulnerability assessment, Application real time protection<br \/><span style=\"text-decoration: underline\">Managed Security Services<br \/><\/span>Application security On-demand, Application security assurance-as-a-service, Vulnerability validation, Customized reporting<\/p><\/div>\t\t\t\t\t\t\n\t\t\t\t\t\t\n\n\t\t\t\t\t\t\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5228782c\" data-id=\"5228782c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-351ddf9b wpr-flip-box-anim-direction-down wpr-flip-box-animation-flip wpr-flip-box-animation-3d-yes wpr-flip-box-front-align-center wpr-flip-box-back-align-center elementor-widget elementor-widget-wpr-flip-box\" data-id=\"351ddf9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\n\t\t<div class=\"wpr-flip-box\" data-trigger=\"hover\">\n\t\t\t\n\t\t\t<div class=\"wpr-flip-box-item wpr-flip-box-front wpr-anim-timing-ease-default\">\n\n\t\t\t\t<div class=\"wpr-flip-box-overlay\"><\/div>\n\n\t\t\t\t<div class=\"wpr-flip-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-image\">\n\t\t\t\t\t\t<img decoding=\"async\" alt=\"Cyberspace-Technology-GRC\" src=\"https:\/\/cyberspacetech.net\/wp-content\/uploads\/2023\/05\/clipart2049353.png\" >\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"wpr-flip-box-title\">Governance Risk &amp; Compliance<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-description\"><p>Governance, Risk &amp; Compliance (GRC) is about identifying and controlling risks, complying with new rules and regulations maintaining right to do business, guarding brand reputation and increasingly, setting out sustainability practices.<\/p><\/div>\t\t\t\t\t\t\n\t\t\t\t\t\t\n\n\t\t\t\t\t\t\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"wpr-flip-box-item wpr-flip-box-back wpr-anim-timing-ease-default\">\n\n\t\t\t\t<div class=\"wpr-flip-box-overlay\"><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"wpr-flip-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"wpr-flip-box-title\">\n\t\t\t\t\t\t\t<a href=\"#\">Our Governance Risk &amp; Compliance portfolio comprise of:<\/a>\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-description\"><p>Compliance Management Services<\/p><p>Governance and Risk Management Services<\/p><p>Audit and Assessment Services<\/p><p>Data Privacy Services<\/p><p>GRC Platform Implementation and Support Services<\/p><\/div>\t\t\t\t\t\t\n\t\t\t\t\t\t\n\n\t\t\t\t\t\t\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2a275fae elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"2a275fae\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-53a299b\" data-id=\"53a299b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-46d30899 wpr-flip-box-anim-direction-down wpr-flip-box-animation-flip wpr-flip-box-animation-3d-yes wpr-flip-box-front-align-center wpr-flip-box-back-align-center elementor-widget elementor-widget-wpr-flip-box\" data-id=\"46d30899\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\n\t\t<div class=\"wpr-flip-box\" data-trigger=\"hover\">\n\t\t\t\n\t\t\t<div class=\"wpr-flip-box-item wpr-flip-box-front wpr-anim-timing-ease-default\">\n\n\t\t\t\t<div class=\"wpr-flip-box-overlay\"><\/div>\n\n\t\t\t\t<div class=\"wpr-flip-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-image\">\n\t\t\t\t\t\t<img decoding=\"async\" alt=\"Cyberspace-Technology\" src=\"https:\/\/cyberspacetech.net\/wp-content\/uploads\/2023\/05\/vecteezy_facial-recognition-icon-style_5892180.jpg\" >\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"wpr-flip-box-title\">Identity &amp; Access Management<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-description\"><p>Identity &amp; Access Management (IAM) is the foundation for enabling innovation with minimal friction and thus Cyberspace Technology IAM Services can help organizations in establishing secure, productive, and efficient access to technology resources across diverse system\u00a0<\/p><\/div>\t\t\t\t\t\t\n\t\t\t\t\t\t\n\n\t\t\t\t\t\t\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"wpr-flip-box-item wpr-flip-box-back wpr-anim-timing-ease-default\">\n\n\t\t\t\t<div class=\"wpr-flip-box-overlay\"><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"wpr-flip-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"wpr-flip-box-title\">\n\t\t\t\t\t\t\t<a href=\"#\">Services<\/a>\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-description\"><h4 class=\"hide brand-show  text-center\">Strategy, Consulting &amp; Architecture<\/h4><h4 class=\"hide brand-show  text-center\">Transformation &amp; Integration<\/h4><h4 class=\"hide brand-show text-center\">Managed Security Services<\/h4><\/div>\t\t\t\t\t\t\n\t\t\t\t\t\t\n\n\t\t\t\t\t\t\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-64fbdfb6\" data-id=\"64fbdfb6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-451c0eb2 wpr-flip-box-anim-direction-down wpr-flip-box-animation-flip wpr-flip-box-animation-3d-yes wpr-flip-box-front-align-center wpr-flip-box-back-align-center elementor-widget elementor-widget-wpr-flip-box\" data-id=\"451c0eb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\n\t\t<div class=\"wpr-flip-box\" data-trigger=\"hover\">\n\t\t\t\n\t\t\t<div class=\"wpr-flip-box-item wpr-flip-box-front wpr-anim-timing-ease-default\">\n\n\t\t\t\t<div class=\"wpr-flip-box-overlay\"><\/div>\n\n\t\t\t\t<div class=\"wpr-flip-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-image\">\n\t\t\t\t\t\t<img decoding=\"async\" alt=\"Data-Security-Cyberspace\" src=\"https:\/\/cyberspacetech.net\/wp-content\/uploads\/2023\/05\/\u2014Pngtree\u2014global-data-security-personal-data_7255049.png\" >\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"wpr-flip-box-title\">Data Security &amp; Data Privacy<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-description\"><p>Cyberspace Technology modern &amp; scalable solutions help our customers in adopting a centralized system for constant data monitoring and control, while minimizing the risk of sensitive data breaches and infiltration of customer privacy. Therefore, maximizing resiliency by enabling data masking and user authentication at every touchpoint.<\/p><\/div>\t\t\t\t\t\t\n\t\t\t\t\t\t\n\n\t\t\t\t\t\t\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"wpr-flip-box-item wpr-flip-box-back wpr-anim-timing-ease-default\">\n\n\t\t\t\t<div class=\"wpr-flip-box-overlay\"><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"wpr-flip-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"wpr-flip-box-title\">\n\t\t\t\t\t\t\t<a href=\"#\">Our Data Security Services<\/a>\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-description\"><p>Creation of data security and privacy architecture, Technology evaluation and consulting, Roadmap and budgeting for ROI, Data security program design, Articulation of solution requirements, DLP policy evaluation, Data protection model &amp; process, Data protection technology selection, Data discovery &amp; data classification, Data protection risk assessment\/PIA, Data masking, Data classification, Data discovery, Data flow analysis<\/p><\/div>\t\t\t\t\t\t\n\t\t\t\t\t\t\n\n\t\t\t\t\t\t\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-2b192b38\" data-id=\"2b192b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-392042bd wpr-flip-box-anim-direction-down wpr-flip-box-animation-flip wpr-flip-box-animation-3d-yes wpr-flip-box-front-align-center wpr-flip-box-back-align-center elementor-widget elementor-widget-wpr-flip-box\" data-id=\"392042bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\n\t\t<div class=\"wpr-flip-box\" data-trigger=\"hover\">\n\t\t\t\n\t\t\t<div class=\"wpr-flip-box-item wpr-flip-box-front wpr-anim-timing-ease-default\">\n\n\t\t\t\t<div class=\"wpr-flip-box-overlay\"><\/div>\n\n\t\t\t\t<div class=\"wpr-flip-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-image\">\n\t\t\t\t\t\t<img decoding=\"async\" alt=\"Cyberspace-Technology\" src=\"https:\/\/cyberspacetech.net\/wp-content\/uploads\/2023\/05\/transparent-backup-icon-big-data-icon-5fd39984c98557.6395558016077029168254-1.png\" >\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"wpr-flip-box-title\">Resilience<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-description\"><p>Every enterprise needs a plan to keep going, if and when disaster strikes, Our BC\/DR services help you be ready to spring back up fast, through consulting &amp; planning services, technology management, drill adminstration, multivendor management, profile-administration &amp; IT service continuity.<\/p><\/div>\t\t\t\t\t\t\n\t\t\t\t\t\t\n\n\t\t\t\t\t\t\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"wpr-flip-box-item wpr-flip-box-back wpr-anim-timing-ease-default\">\n\n\t\t\t\t<div class=\"wpr-flip-box-overlay\"><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"wpr-flip-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"wpr-flip-box-title\">\n\t\t\t\t\t\t\t<a href=\"#\">Business Continuity Services<\/a>\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"wpr-flip-box-description\"><p><strong>Assessment services:<\/strong>\u00a0Current state evaluation, policy and plan reviews, risk and threat assessment, business impact analysis, DR solution review\/design<br \/><strong>Implementation services:<\/strong>\u00a0Customized disaster recovery and business continuity plan development \u2014 taking people, processes, and technologies into account for swift post-interruption recovery<br \/><strong>Audit services:<\/strong>\u00a0Internal audits for BCP\/DR fulfilling BS25999 and SAS 70 standards, alongside external audits support<br \/><strong>IT and data continuity services:<\/strong>\u00a0IT continuity maintenance and recovery of post-disaster data<br \/><strong>Hosted DR solutions:<\/strong> Flexibility for dedicated infrastructures at captive and partner centers, comprising: Vaulting BCP consulting solutions, Media\/tape management services, Management of virtualized environments<\/p><\/div>\t\t\t\t\t\t\n\t\t\t\t\t\t\n\n\t\t\t\t\t\t\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5593d922 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"5593d922\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-25306391\" data-id=\"25306391\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-78bffb7c elementor-widget elementor-widget-heading\" data-id=\"78bffb7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Find world Best\nServices &amp; Resources!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d83838e elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"3d83838e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We aims to solve our clients concern and needs to deliver the best services to meet client business expectation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-635b8c5f\" data-id=\"635b8c5f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6167e16e wpr-button-icon-style-inline wpr-button-icon-position-right elementor-invisible elementor-widget elementor-widget-wpr-button\" data-id=\"6167e16e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInRight&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"wpr-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\n\t\t\t\n\t\t\n\t\t<div class=\"wpr-button-wrap elementor-clearfix\">\n\t\t<a class=\"wpr-button wpr-button-effect elementor-animation-grow\" data-text=\"\" href=\"#link\">\n\t\t\t\n\t\t\t<span class=\"wpr-button-content\">\n\t\t\t\t\t\t\t\t\t<span class=\"wpr-button-text\">Contact Us<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\n\t\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-314c26cd elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"314c26cd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-340ddd56\" data-id=\"340ddd56\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3022dd6c elementor-widget elementor-widget-heading\" data-id=\"3022dd6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Choose Us?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76416ed8 elementor-widget elementor-widget-text-editor\" data-id=\"76416ed8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Reimagine your value chains<\/strong>\u00a0<\/p><p><strong>Enable enterprise agility and operational resilience<\/strong><\/p><p><strong>Increase data maturity across your organization<\/strong>\u00a0<\/p><p><strong>Make better decisions using the data you collect<\/strong>\u00a0<\/p><p><strong>Improve performance and topline growth<\/strong><\/p><p><strong>Grow your workforce\u2019s digital mindset and skillset<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-26da8731 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"26da8731\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-740c1b17\" data-id=\"740c1b17\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12bf6828 elementor-widget elementor-widget-counter\" data-id=\"12bf6828\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Quality<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"100\" data-from-value=\"70\" data-delimiter=\",\">70<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">%<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-2bdc3b96\" data-id=\"2bdc3b96\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21a1630c elementor-widget elementor-widget-counter\" data-id=\"21a1630c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Objects<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"55\" data-from-value=\"45\" data-delimiter=\",\">45<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">k<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-2d89fbba\" data-id=\"2d89fbba\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d7dccc9 elementor-widget elementor-widget-counter\" data-id=\"4d7dccc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Projects<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"3\" data-from-value=\"1\" data-delimiter=\",\">1<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">k<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2d81aa72\" data-id=\"2d81aa72\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4505ac10 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"4505ac10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Full operating system 24\/7 active <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Multiple IT Services and Management<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Free Consultations<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Hybrid Technology For Enterprises<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Data Security and Cloud Security Services<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d59c915 elementor-widget elementor-widget-text-editor\" data-id=\"2d59c915\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>However venture pursuit he am mr cordial. Forming musical am hearing studied be luckily. Ourselves for determine attending how led gentleman.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-785931ec elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"785931ec\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5cb40414\" data-id=\"5cb40414\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-216ff1f5 elementor-widget elementor-widget-text-editor\" data-id=\"216ff1f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Blogs<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34b64744 elementor-widget elementor-widget-heading\" data-id=\"34b64744\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Powerful Modern Idea<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f14d5d6 wpr-grid-columns-3 wpr-grid-columns--tablet2 wpr-grid-columns--mobile1 wpr-item-styles-inner elementor-widget elementor-widget-wpr-grid\" data-id=\"1f14d5d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"wpr-grid-filters elementor-clearfix wpr-grid-filters-sep-right\"><li class=\" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-none\"><span  data-filter=\"*\" class=\"wpr-grid-filters-item wpr-active-filter \">All Post<\/span><em class=\"wpr-grid-filters-sep\"><\/em><\/li><\/ul><section class=\"wpr-grid elementor-clearfix\" data-settings=\"{&quot;layout&quot;:&quot;fitRows&quot;,&quot;stick_last_element_to_bottom&quot;:&quot;&quot;,&quot;columns_desktop&quot;:3,&quot;gutter_hr&quot;:15,&quot;gutter_hr_mobile&quot;:15,&quot;gutter_hr_mobile_extra&quot;:15,&quot;gutter_hr_tablet&quot;:15,&quot;gutter_hr_tablet_extra&quot;:15,&quot;gutter_hr_laptop&quot;:15,&quot;gutter_hr_widescreen&quot;:15,&quot;gutter_vr&quot;:15,&quot;gutter_vr_mobile&quot;:15,&quot;gutter_vr_mobile_extra&quot;:15,&quot;gutter_vr_tablet&quot;:15,&quot;gutter_vr_tablet_extra&quot;:15,&quot;gutter_vr_laptop&quot;:15,&quot;gutter_vr_widescreen&quot;:15,&quot;animation&quot;:&quot;default&quot;,&quot;animation_duration&quot;:0.3,&quot;animation_delay&quot;:0.1,&quot;deeplinking&quot;:&quot;&quot;,&quot;filters_linkable&quot;:&quot;no&quot;,&quot;filters_default_filter&quot;:&quot;&quot;,&quot;filters_count&quot;:&quot;&quot;,&quot;filters_hide_empty&quot;:&quot;no&quot;,&quot;filters_animation&quot;:&quot;default&quot;,&quot;filters_animation_duration&quot;:0.3,&quot;filters_animation_delay&quot;:0.1,&quot;pagination_type&quot;:&quot;load-more&quot;,&quot;pagination_max_pages&quot;:1,&quot;lightbox&quot;:{&quot;selector&quot;:&quot;.wpr-grid-image-wrap&quot;,&quot;iframeMaxWidth&quot;:&quot;60%&quot;,&quot;hash&quot;:false,&quot;autoplay&quot;:&quot;true&quot;,&quot;pause&quot;:5000,&quot;progressBar&quot;:&quot;true&quot;,&quot;counter&quot;:&quot;true&quot;,&quot;controls&quot;:&quot;true&quot;,&quot;getCaptionFromTitleOrAlt&quot;:&quot;true&quot;,&quot;thumbnail&quot;:&quot;&quot;,&quot;showThumbByDefault&quot;:&quot;&quot;,&quot;share&quot;:&quot;&quot;,&quot;zoom&quot;:&quot;true&quot;,&quot;fullScreen&quot;:&quot;true&quot;,&quot;download&quot;:&quot;true&quot;}}\" data-advanced-filters=\"no\"><article class=\"wpr-grid-item elementor-clearfix post-1440 post type-post status-publish format-standard hentry category-uncategorized\"><div class=\"wpr-grid-item-inner\"><div class=\"wpr-grid-item-below-content elementor-clearfix\"><h2 class=\"wpr-grid-item-title elementor-repeater-item-2490a2d wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-fade\"><div class=\"inner-block\"><a target=\"_self\"  href=\"https:\/\/cyberspacetech.net\/index.php\/2023\/05\/12\/cyber-security-services\/\">Cyber Security Services<\/a><\/div><\/h2><div class=\"wpr-grid-item-date elementor-repeater-item-d916d3d wpr-grid-item-display-inline wpr-grid-item-align-left\"><div class=\"inner-block\"><span>May 12, 2023<span class=\"wpr-grid-extra-text-right\">\/<\/span><\/span><\/div><\/div><div class=\"wpr-grid-item-comments elementor-repeater-item-8a6faee wpr-grid-item-display-inline wpr-grid-item-align-left\"><div class=\"inner-block\"><a href=\"https:\/\/cyberspacetech.net\/index.php\/2023\/05\/12\/cyber-security-services\/#respond\"><span>No Comments<\/span><\/a><\/div><\/div><div class=\"wpr-grid-item-excerpt elementor-repeater-item-c4d0472 wpr-grid-item-display-block wpr-grid-item-align-left\"><div class=\"inner-block\"><p>Cyber Security Services Cyberspace Technology Pte.Ltd Our Expertise We help you counter these risks effectively<\/p><\/div><\/div><div class=\"wpr-grid-item-read-more elementor-repeater-item-eeab5f4 wpr-grid-item-display-block wpr-grid-item-align-left\"><div class=\"inner-block\"><a target=\"_self\" href=\"https:\/\/cyberspacetech.net\/index.php\/2023\/05\/12\/cyber-security-services\/\" class=\"wpr-button-effect wpr-button-none\"><span>Read More<\/span><\/a><\/div><\/div><\/div><\/div><\/article><article class=\"wpr-grid-item elementor-clearfix post-1376 post type-post status-publish format-standard hentry category-uncategorized\"><div class=\"wpr-grid-item-inner\"><div class=\"wpr-grid-item-below-content elementor-clearfix\"><h2 class=\"wpr-grid-item-title elementor-repeater-item-2490a2d wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-fade\"><div class=\"inner-block\"><a target=\"_self\"  href=\"https:\/\/cyberspacetech.net\/index.php\/2023\/03\/15\/cloud-solutions\/\">Cloud Solutions<\/a><\/div><\/h2><div class=\"wpr-grid-item-date elementor-repeater-item-d916d3d wpr-grid-item-display-inline wpr-grid-item-align-left\"><div class=\"inner-block\"><span>March 15, 2023<span class=\"wpr-grid-extra-text-right\">\/<\/span><\/span><\/div><\/div><div class=\"wpr-grid-item-comments elementor-repeater-item-8a6faee wpr-grid-item-display-inline wpr-grid-item-align-left\"><div class=\"inner-block\"><a href=\"https:\/\/cyberspacetech.net\/index.php\/2023\/03\/15\/cloud-solutions\/#respond\"><span>No Comments<\/span><\/a><\/div><\/div><div class=\"wpr-grid-item-excerpt elementor-repeater-item-c4d0472 wpr-grid-item-display-block wpr-grid-item-align-left\"><div class=\"inner-block\"><p>Cyberspace Technology Pte.Ltd Hybrid Cloud 0 Happy Customer Cloud Services Cyberspace has been at the<\/p><\/div><\/div><div class=\"wpr-grid-item-read-more elementor-repeater-item-eeab5f4 wpr-grid-item-display-block wpr-grid-item-align-left\"><div class=\"inner-block\"><a target=\"_self\" href=\"https:\/\/cyberspacetech.net\/index.php\/2023\/03\/15\/cloud-solutions\/\" class=\"wpr-button-effect wpr-button-none\"><span>Read More<\/span><\/a><\/div><\/div><\/div><\/div><\/article><article class=\"wpr-grid-item elementor-clearfix post-1309 post type-post status-publish format-standard hentry category-uncategorized\"><div class=\"wpr-grid-item-inner\"><div class=\"wpr-grid-item-below-content elementor-clearfix\"><h2 class=\"wpr-grid-item-title elementor-repeater-item-2490a2d wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-fade\"><div class=\"inner-block\"><a target=\"_self\"  href=\"https:\/\/cyberspacetech.net\/index.php\/2023\/03\/14\/network-management\/\">Network Management<\/a><\/div><\/h2><div class=\"wpr-grid-item-date elementor-repeater-item-d916d3d wpr-grid-item-display-inline wpr-grid-item-align-left\"><div class=\"inner-block\"><span>March 14, 2023<span class=\"wpr-grid-extra-text-right\">\/<\/span><\/span><\/div><\/div><div class=\"wpr-grid-item-comments elementor-repeater-item-8a6faee wpr-grid-item-display-inline wpr-grid-item-align-left\"><div class=\"inner-block\"><a href=\"https:\/\/cyberspacetech.net\/index.php\/2023\/03\/14\/network-management\/#respond\"><span>No Comments<\/span><\/a><\/div><\/div><div class=\"wpr-grid-item-excerpt elementor-repeater-item-c4d0472 wpr-grid-item-display-block wpr-grid-item-align-left\"><div class=\"inner-block\"><p>Network Management Cyberspace Technology solutions Pte.Ltd Network administration Network operation Network maintenance Network provisioning Network<\/p><\/div><\/div><div class=\"wpr-grid-item-read-more elementor-repeater-item-eeab5f4 wpr-grid-item-display-block wpr-grid-item-align-left\"><div class=\"inner-block\"><a target=\"_self\" href=\"https:\/\/cyberspacetech.net\/index.php\/2023\/03\/14\/network-management\/\" class=\"wpr-button-effect wpr-button-none\"><span>Read More<\/span><\/a><\/div><\/div><\/div><\/div><\/article><article class=\"wpr-grid-item elementor-clearfix post-112 post type-post status-publish format-standard hentry category-uncategorized\"><div class=\"wpr-grid-item-inner\"><div class=\"wpr-grid-item-below-content elementor-clearfix\"><h2 class=\"wpr-grid-item-title elementor-repeater-item-2490a2d wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-fade\"><div class=\"inner-block\"><a target=\"_self\"  href=\"https:\/\/cyberspacetech.net\/index.php\/2023\/02\/15\/it-management-and-support\/\">IT Management And Support<\/a><\/div><\/h2><div class=\"wpr-grid-item-date elementor-repeater-item-d916d3d wpr-grid-item-display-inline wpr-grid-item-align-left\"><div class=\"inner-block\"><span>February 15, 2023<span class=\"wpr-grid-extra-text-right\">\/<\/span><\/span><\/div><\/div><div class=\"wpr-grid-item-comments elementor-repeater-item-8a6faee wpr-grid-item-display-inline wpr-grid-item-align-left\"><div class=\"inner-block\"><a href=\"https:\/\/cyberspacetech.net\/index.php\/2023\/02\/15\/it-management-and-support\/#respond\"><span>No Comments<\/span><\/a><\/div><\/div><div class=\"wpr-grid-item-excerpt elementor-repeater-item-c4d0472 wpr-grid-item-display-block wpr-grid-item-align-left\"><div class=\"inner-block\"><p>IT Manage and Supports Cyberspace Technology Solutions Pte.Ltd Onsite and IT remote support offices in<\/p><\/div><\/div><div class=\"wpr-grid-item-read-more elementor-repeater-item-eeab5f4 wpr-grid-item-display-block wpr-grid-item-align-left\"><div class=\"inner-block\"><a target=\"_self\" href=\"https:\/\/cyberspacetech.net\/index.php\/2023\/02\/15\/it-management-and-support\/\" class=\"wpr-button-effect wpr-button-none\"><span>Read More<\/span><\/a><\/div><\/div><\/div><\/div><\/article><\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Security Services Cyberspace Technology Pte.Ltd Our Expertise We help you counter these risks effectively<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_canvas","format":"standard","meta":{"_eb_attr":"","om_disable_all_campaigns":false,"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[1],"tags":[],"class_list":["post-1440","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberspacetech.net\/index.php\/wp-json\/wp\/v2\/posts\/1440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberspacetech.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberspacetech.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberspacetech.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberspacetech.net\/index.php\/wp-json\/wp\/v2\/comments?post=1440"}],"version-history":[{"count":22,"href":"https:\/\/cyberspacetech.net\/index.php\/wp-json\/wp\/v2\/posts\/1440\/revisions"}],"predecessor-version":[{"id":1540,"href":"https:\/\/cyberspacetech.net\/index.php\/wp-json\/wp\/v2\/posts\/1440\/revisions\/1540"}],"wp:attachment":[{"href":"https:\/\/cyberspacetech.net\/index.php\/wp-json\/wp\/v2\/media?parent=1440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberspacetech.net\/index.php\/wp-json\/wp\/v2\/categories?post=1440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberspacetech.net\/index.php\/wp-json\/wp\/v2\/tags?post=1440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}