{"id":3959,"date":"2024-09-10T18:37:47","date_gmt":"2024-09-10T18:37:47","guid":{"rendered":"https:\/\/goagiletechnologies.com\/?page_id=3959"},"modified":"2024-10-14T03:15:32","modified_gmt":"2024-10-14T03:15:32","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/goagiletechnologies.com\/ar\/cybersecurity\/","title":{"rendered":"\u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"3959\" class=\"elementor elementor-3959\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-537922a elementor-section-content-middle elementor-section-stretched tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"537922a\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ffb2c70\" data-id=\"ffb2c70\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-84f3ca2 elementor-widget elementor-widget-heading\" data-id=\"84f3ca2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Information Technology\nCyber Security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02bcdfe elementor-widget elementor-widget-text-editor\" data-id=\"02bcdfe\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>All-in-one solution for business success<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f24bb80\" data-id=\"f24bb80\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1818b43 elementor-widget elementor-widget-image\" data-id=\"1818b43\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"847\" height=\"515\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/cyber-security-banner-img.png\" class=\"attachment-large size-large wp-image-3974\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/cyber-security-banner-img.png 988w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/cyber-security-banner-img-300x182.png 300w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/cyber-security-banner-img-768x467.png 768w\" sizes=\"(max-width: 847px) 100vw, 847px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7b55a02 tm-bgcolor-grey elementor-section-content-middle elementor-section-stretched tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7b55a02\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-eeb3fc8\" data-id=\"eeb3fc8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-60af2f0 elementor-widget elementor-widget-image\" data-id=\"60af2f0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"758\" height=\"422\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/Group-414.png\" class=\"attachment-large size-large wp-image-3982\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/Group-414.png 758w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/Group-414-300x167.png 300w\" sizes=\"(max-width: 758px) 100vw, 758px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d708c6d\" data-id=\"d708c6d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2404a5b elementor-widget elementor-widget-heading\" data-id=\"2404a5b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Choose GoAgile for Cybersecurity?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-598af90 elementor-widget elementor-widget-text-editor\" data-id=\"598af90\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>GoAgile, a rising IT solutions company, is dedicated to enhancing the security of crucial business assets and safeguarding personnel, data, and infrastructure. Our experienced security consultants guide clients through:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4237cd1 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"4237cd1\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Thorough threat assessments<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Policy reviews<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Development of robust security programs<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b31eb3f elementor-widget elementor-widget-text-editor\" data-id=\"b31eb3f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We serve as your trusted ally, resolving IT security challenges and securing your organization. As your business grows, we proactively manage information security risks, implement mitigative measures, and offer continuous monitoring and managed services to ensure ongoing security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ba8dcda elementor-section-content-middle elementor-section-stretched tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ba8dcda\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8b9357e\" data-id=\"8b9357e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f07cc7f elementor-widget elementor-widget-heading\" data-id=\"f07cc7f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Systems and Network<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb1c434 elementor-widget elementor-widget-heading\" data-id=\"cb1c434\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Holistic Network Fortification:<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e29eeb3 elementor-widget elementor-widget-text-editor\" data-id=\"e29eeb3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Craft robust and secure networks and IT infrastructures tailored to your business needs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e293f65 elementor-widget elementor-widget-heading\" data-id=\"e293f65\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Smooth Internet and cloud connectivity:\n<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3631fe elementor-widget elementor-widget-text-editor\" data-id=\"d3631fe\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ensure uninterrupted connectivity by expertly managing internet and cloud services<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d5fb73 elementor-widget elementor-widget-heading\" data-id=\"1d5fb73\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Efficient Branch Office and Campus Connectivity:<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1432800 elementor-widget elementor-widget-text-editor\" data-id=\"1432800\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Optimize connectivity solutions for seamless operations across<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-fa50d6e\" data-id=\"fa50d6e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-85ce238 elementor-widget elementor-widget-image\" data-id=\"85ce238\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"758\" height=\"422\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/Group-393.png\" class=\"attachment-large size-large wp-image-3989\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/Group-393.png 758w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/Group-393-300x167.png 300w\" sizes=\"(max-width: 758px) 100vw, 758px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1d51ea1 elementor-section-stretched tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1d51ea1\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8922e61\" data-id=\"8922e61\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f9b652d elementor-widget elementor-widget-heading\" data-id=\"f9b652d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cloud Services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-849184a tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"849184a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5d796ad\" data-id=\"5d796ad\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bcf1f0e elementor-widget elementor-widget-image\" data-id=\"bcf1f0e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"499\" height=\"284\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/Mask-Group-125.png\" class=\"attachment-large size-large wp-image-3993\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/Mask-Group-125.png 499w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/Mask-Group-125-300x171.png 300w\" sizes=\"(max-width: 499px) 100vw, 499px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea85adc elementor-widget elementor-widget-heading\" data-id=\"ea85adc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Strategic Cloud Infrastructure\nDevelopment<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37913a7 elementor-widget elementor-widget-text-editor\" data-id=\"37913a7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Tailored cloud infrastructure solutions to optimize performance, scalability, and efficiency.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-8c9c556\" data-id=\"8c9c556\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b1695e5 elementor-widget elementor-widget-image\" data-id=\"b1695e5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"499\" height=\"284\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/Mask-Group-126.png\" class=\"attachment-large size-large wp-image-3994\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/Mask-Group-126.png 499w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/Mask-Group-126-300x171.png 300w\" sizes=\"(max-width: 499px) 100vw, 499px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f0c700 elementor-widget elementor-widget-heading\" data-id=\"3f0c700\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Smooth Cloud Migration Solutions<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa05404 elementor-widget elementor-widget-text-editor\" data-id=\"aa05404\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Seamless and efficient migration services to transition your business to the cloud with minimal disruption.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-8d619c5\" data-id=\"8d619c5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-872086d elementor-widget elementor-widget-image\" data-id=\"872086d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"499\" height=\"284\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/Mask-Group-125.png\" class=\"attachment-large size-large wp-image-3993\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/Mask-Group-125.png 499w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/09\/Mask-Group-125-300x171.png 300w\" sizes=\"(max-width: 499px) 100vw, 499px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e56f2bd elementor-widget elementor-widget-heading\" data-id=\"e56f2bd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Advanced Cloud Security Implementation<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b1ddeb elementor-widget elementor-widget-text-editor\" data-id=\"3b1ddeb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Comprehensive security measures to protect your cloud environment from evolving threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e067263 elementor-section-stretched tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e067263\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-43ebd34\" data-id=\"43ebd34\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9c6cfa7 elementor-widget elementor-widget-heading\" data-id=\"9c6cfa7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u062e\u062f\u0645\u0627\u062a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0645\u064f\u062f\u0627\u0631\u0629<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d44d001 tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d44d001\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-d6a9b53\" data-id=\"d6a9b53\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-108a342 elementor-widget elementor-widget-image\" data-id=\"108a342\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"364\" height=\"263\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-128.png\" class=\"attachment-large size-large wp-image-4276\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-128.png 364w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-128-300x217.png 300w\" sizes=\"(max-width: 364px) 100vw, 364px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d224cb elementor-widget elementor-widget-heading\" data-id=\"9d224cb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Proactive Security Operations Center (SOC) Management<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-7258d54\" data-id=\"7258d54\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-97c4547 elementor-widget elementor-widget-image\" data-id=\"97c4547\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"364\" height=\"263\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-129.png\" class=\"attachment-large size-large wp-image-4277\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-129.png 364w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-129-300x217.png 300w\" sizes=\"(max-width: 364px) 100vw, 364px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cdc891 elementor-widget elementor-widget-heading\" data-id=\"6cdc891\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Efficient Network Operations Center (NOC) Management<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-8b4f7c4\" data-id=\"8b4f7c4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-22f6815 elementor-widget elementor-widget-image\" data-id=\"22f6815\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"364\" height=\"263\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-130.png\" class=\"attachment-large size-large wp-image-4278\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-130.png 364w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-130-300x217.png 300w\" sizes=\"(max-width: 364px) 100vw, 364px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cbcfc82 elementor-widget elementor-widget-heading\" data-id=\"cbcfc82\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Comprehensive Managed Cloud Security<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-9442f9c\" data-id=\"9442f9c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a11efb6 elementor-widget elementor-widget-image\" data-id=\"a11efb6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"364\" height=\"263\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-131.png\" class=\"attachment-large size-large wp-image-4279\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-131.png 364w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-131-300x217.png 300w\" sizes=\"(max-width: 364px) 100vw, 364px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ecfec7b elementor-widget elementor-widget-heading\" data-id=\"ecfec7b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Strategic Managed IT Consulting\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b731e69 elementor-section-stretched tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b731e69\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fd83ea8\" data-id=\"fd83ea8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ec88a4 elementor-widget elementor-widget-heading\" data-id=\"6ec88a4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8b0fd43 tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8b0fd43\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e70e260\" data-id=\"e70e260\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-724ff43 elementor-widget elementor-widget-image\" data-id=\"724ff43\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Robust-Vulnerability-Management.jpg\" class=\"attachment-large size-large wp-image-4293\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Robust-Vulnerability-Management.jpg 500w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Robust-Vulnerability-Management-300x300.jpg 300w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Robust-Vulnerability-Management-150x150.jpg 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78177dd elementor-widget elementor-widget-heading\" data-id=\"78177dd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Robust Vulnerability Management<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe10895 elementor-widget elementor-widget-text-editor\" data-id=\"fe10895\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Conduct thorough vulnerability scanning and penetration testing to fortify your digital defenses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0e065cd\" data-id=\"0e065cd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c01ac92 elementor-widget elementor-widget-image\" data-id=\"c01ac92\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Identity-and-Access-Security-Mastery.jpg\" class=\"attachment-large size-large wp-image-4300\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Identity-and-Access-Security-Mastery.jpg 500w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Identity-and-Access-Security-Mastery-300x300.jpg 300w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Identity-and-Access-Security-Mastery-150x150.jpg 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-042f139 elementor-widget elementor-widget-heading\" data-id=\"042f139\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Identity and Access Security Mastery<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ee3572 elementor-widget elementor-widget-text-editor\" data-id=\"8ee3572\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Implement advanced identity and access management solutions for enhanced security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-82fcbf9 tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"82fcbf9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-89d6d29\" data-id=\"89d6d29\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-22256c5 elementor-widget elementor-widget-image\" data-id=\"22256c5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Proactive-Vulnerability-and-Patch.jpg\" class=\"attachment-large size-large wp-image-4299\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Proactive-Vulnerability-and-Patch.jpg 500w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Proactive-Vulnerability-and-Patch-300x300.jpg 300w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Proactive-Vulnerability-and-Patch-150x150.jpg 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ce3bc4 elementor-widget elementor-widget-heading\" data-id=\"8ce3bc4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Proactive Vulnerability and Patch\nManagement<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8251b45 elementor-widget elementor-widget-text-editor\" data-id=\"8251b45\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Stay ahead of potential threats with proactive vulnerability and patch management services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-10d7063\" data-id=\"10d7063\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e06a91 elementor-widget elementor-widget-image\" data-id=\"1e06a91\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Secure-Backup-Solutions.jpg\" class=\"attachment-large size-large wp-image-4298\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Secure-Backup-Solutions.jpg 500w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Secure-Backup-Solutions-300x300.jpg 300w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Secure-Backup-Solutions-150x150.jpg 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d14f4a elementor-widget elementor-widget-heading\" data-id=\"5d14f4a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Secure Backup Solutions<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f799ada elementor-widget elementor-widget-text-editor\" data-id=\"f799ada\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ensure the safety of your data with comprehensive and secure backup services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1014c9f elementor-section-stretched tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1014c9f\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e3c9903\" data-id=\"e3c9903\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e19c5d elementor-widget elementor-widget-heading\" data-id=\"1e19c5d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Defense Technology<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-63c23f3 tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"63c23f3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-2f8536a\" data-id=\"2f8536a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a19383d elementor-widget elementor-widget-image\" data-id=\"a19383d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Web-Application-Firewall.jpg\" class=\"attachment-large size-large wp-image-4307\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Web-Application-Firewall.jpg 800w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Web-Application-Firewall-300x225.jpg 300w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Web-Application-Firewall-768x576.jpg 768w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Web-Application-Firewall-654x490.jpg 654w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7224cbf elementor-widget elementor-widget-heading\" data-id=\"7224cbf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Next-Generation Firewall Solutions<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e353d46 elementor-widget elementor-widget-text-editor\" data-id=\"e353d46\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Deploy latest Next-Generation Firewalls (NGFWs) and Unified Threat Management systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-78f1c65\" data-id=\"78f1c65\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eba98e9 elementor-widget elementor-widget-image\" data-id=\"eba98e9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Advanced-Security-Information.jpg\" class=\"attachment-large size-large wp-image-4306\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Advanced-Security-Information.jpg 800w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Advanced-Security-Information-300x225.jpg 300w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Advanced-Security-Information-768x576.jpg 768w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Advanced-Security-Information-654x490.jpg 654w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0049fd2 elementor-widget elementor-widget-heading\" data-id=\"0049fd2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Web Application Firewall Expertise<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60edd91 elementor-widget elementor-widget-text-editor\" data-id=\"60edd91\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Protect your web applications with our specialized Web Application Firewall Solutions<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-cc518f9\" data-id=\"cc518f9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-607e832 elementor-widget elementor-widget-image\" data-id=\"607e832\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Comprehensive-Email-and-Web.jpg\" class=\"attachment-large size-large wp-image-4305\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Comprehensive-Email-and-Web.jpg 800w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Comprehensive-Email-and-Web-300x225.jpg 300w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Comprehensive-Email-and-Web-768x576.jpg 768w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Comprehensive-Email-and-Web-654x490.jpg 654w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0e550b elementor-widget elementor-widget-heading\" data-id=\"f0e550b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Advanced Security Information and Event Management (SEIM)<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-227cc96 elementor-widget elementor-widget-text-editor\" data-id=\"227cc96\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Implement sophisticated SEIM solutions to monitor &amp; analyze security events in real-time.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-286580a\" data-id=\"286580a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bc75ea2 elementor-widget elementor-widget-image\" data-id=\"bc75ea2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Next-Generation-Firewall.jpg\" class=\"attachment-large size-large wp-image-4308\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Next-Generation-Firewall.jpg 800w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Next-Generation-Firewall-300x225.jpg 300w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Next-Generation-Firewall-768x576.jpg 768w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Next-Generation-Firewall-654x490.jpg 654w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1271970 elementor-widget elementor-widget-heading\" data-id=\"1271970\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Comprehensive Email and Web Security Services<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39dff32 elementor-widget elementor-widget-text-editor\" data-id=\"39dff32\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Safeguard communication channels with sturdy email and web security services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f0e7ca6 elementor-section-stretched tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f0e7ca6\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fd6e18d\" data-id=\"fd6e18d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0c4a5c0 elementor-widget elementor-widget-heading\" data-id=\"0c4a5c0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Unified Endpoint Management \/ Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-76ecc90 tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"76ecc90\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-11625cd\" data-id=\"11625cd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2c836a9 elementor-widget elementor-widget-image\" data-id=\"2c836a9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"496\" height=\"276\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-415.png\" class=\"attachment-large size-large wp-image-4318\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-415.png 496w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-415-300x167.png 300w\" sizes=\"(max-width: 496px) 100vw, 496px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ded0416\" data-id=\"ded0416\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ac29e7 elementor-widget elementor-widget-heading\" data-id=\"2ac29e7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Endpoint Threat Management Mastery<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45aba34 elementor-widget elementor-widget-text-editor\" data-id=\"45aba34\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Implement advanced Endpoint Detection and Response (EDR), Managed Detection and Response (MDR), and Extended Detection and Response (XDR) solutions<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b6636e5 tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b6636e5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9f01898\" data-id=\"9f01898\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bc42afd elementor-widget elementor-widget-heading\" data-id=\"bc42afd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Endpoint Patch Management<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3b07d2 elementor-widget elementor-widget-text-editor\" data-id=\"b3b07d2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To ensure the security and reliability of software systems, we implement a rigorous patch management process that involves inventory, testing, deployment, and auditing.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-10face3\" data-id=\"10face3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cf6d183 elementor-widget elementor-widget-image\" data-id=\"cf6d183\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"496\" height=\"276\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-382.png\" class=\"attachment-large size-large wp-image-4319\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-382.png 496w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-382-300x167.png 300w\" sizes=\"(max-width: 496px) 100vw, 496px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-97cd1ba tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"97cd1ba\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-232c95b\" data-id=\"232c95b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d7f712d elementor-widget elementor-widget-image\" data-id=\"d7f712d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"496\" height=\"276\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-383.png\" class=\"attachment-large size-large wp-image-4320\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-383.png 496w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-383-300x167.png 300w\" sizes=\"(max-width: 496px) 100vw, 496px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7cee62f\" data-id=\"7cee62f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-674b6d1 elementor-widget elementor-widget-heading\" data-id=\"674b6d1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Comprehensive Mobile Device \/ Application Management<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a504f0 elementor-widget elementor-widget-text-editor\" data-id=\"9a504f0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Secure mobile devices and applications with effective management solutions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d71a696 tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d71a696\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-33960de\" data-id=\"33960de\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-16ad8d9 elementor-widget elementor-widget-heading\" data-id=\"16ad8d9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Single-Sign-On (SSO) and Multifactor Authentications Expertise<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc9f2db elementor-widget elementor-widget-text-editor\" data-id=\"fc9f2db\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Enhance user authentication with single sign-on and multifactor authentication solutions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-29d237c\" data-id=\"29d237c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e9f52a2 elementor-widget elementor-widget-image\" data-id=\"e9f52a2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"496\" height=\"276\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-384.png\" class=\"attachment-large size-large wp-image-4321\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-384.png 496w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-384-300x167.png 300w\" sizes=\"(max-width: 496px) 100vw, 496px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b7fff38 tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b7fff38\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0dcfb11\" data-id=\"0dcfb11\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d2dbc0 elementor-widget elementor-widget-image\" data-id=\"4d2dbc0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"496\" height=\"276\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-385.png\" class=\"attachment-large size-large wp-image-4322\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-385.png 496w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-385-300x167.png 300w\" sizes=\"(max-width: 496px) 100vw, 496px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5376f74\" data-id=\"5376f74\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6ac7e4 elementor-widget elementor-widget-heading\" data-id=\"c6ac7e4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Privileged Access Management Proficiency<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-410e65a elementor-widget elementor-widget-text-editor\" data-id=\"410e65a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Safeguard critical access points with expert-privileged access management solutions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1970ea6 tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1970ea6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-59f0e4a\" data-id=\"59f0e4a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6c8d782 elementor-widget elementor-widget-heading\" data-id=\"6c8d782\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Enterprise Password Management Solutions<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3e8ffc elementor-widget elementor-widget-text-editor\" data-id=\"d3e8ffc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Enhance overall security with comprehensive enterprise password management<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2fa69d1\" data-id=\"2fa69d1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b0f0fcb elementor-widget elementor-widget-image\" data-id=\"b0f0fcb\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"496\" height=\"276\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-386.png\" class=\"attachment-large size-large wp-image-4324\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-386.png 496w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-386-300x167.png 300w\" sizes=\"(max-width: 496px) 100vw, 496px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-df6ae0a elementor-section-stretched tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"df6ae0a\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f66c028\" data-id=\"f66c028\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4427ead elementor-widget elementor-widget-heading\" data-id=\"4427ead\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Governance Risk Management Compliance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b5c8c00 tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b5c8c00\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-94bfa4c\" data-id=\"94bfa4c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f3b391a elementor-widget elementor-widget-image\" data-id=\"f3b391a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"364\" height=\"263\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-141.png\" class=\"attachment-large size-large wp-image-4341\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-141.png 364w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-141-300x217.png 300w\" sizes=\"(max-width: 364px) 100vw, 364px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3280d2a elementor-widget elementor-widget-heading\" data-id=\"3280d2a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Strategic Cybersecurity Governance<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9253aea elementor-widget elementor-widget-text-editor\" data-id=\"9253aea\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Develop and implement robust cybersecurity governance frameworks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-d04250e\" data-id=\"d04250e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c58fa3 elementor-widget elementor-widget-image\" data-id=\"5c58fa3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"364\" height=\"263\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-142.png\" class=\"attachment-large size-large wp-image-4342\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-142.png 364w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Mask-Group-142-300x217.png 300w\" sizes=\"(max-width: 364px) 100vw, 364px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-451d5b9 elementor-widget elementor-widget-heading\" data-id=\"451d5b9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Enterprise Risk Management Expertise<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8654133 elementor-widget elementor-widget-text-editor\" data-id=\"8654133\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Mitigate risks effectively with<br \/>comprehensive enterprise risk management solutions<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-438848d\" data-id=\"438848d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c5ab74f elementor-widget elementor-widget-image\" data-id=\"c5ab74f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"847\" height=\"613\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-14-082321.png\" class=\"attachment-large size-large wp-image-4345\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-14-082321.png 865w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-14-082321-300x217.png 300w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-14-082321-768x556.png 768w\" sizes=\"(max-width: 847px) 100vw, 847px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8477900 elementor-widget elementor-widget-heading\" data-id=\"8477900\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Compliance Certifications Mastery<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f25b8b elementor-widget elementor-widget-text-editor\" data-id=\"1f25b8b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Navigate regulatory landscapes smoothly with expertise in certifications such as ISO, Aramco, SAMA, CITC, and more.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-6d8fb2e\" data-id=\"6d8fb2e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56fdf72 elementor-widget elementor-widget-image\" data-id=\"56fdf72\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"847\" height=\"613\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-14-082358.png\" class=\"attachment-large size-large wp-image-4344\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-14-082358.png 863w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-14-082358-300x217.png 300w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-14-082358-768x556.png 768w\" sizes=\"(max-width: 847px) 100vw, 847px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9f9090 elementor-widget elementor-widget-heading\" data-id=\"b9f9090\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Awareness and Training Programs<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca572a4 elementor-widget elementor-widget-text-editor\" data-id=\"ca572a4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Foster a culture of cybersecurity with specialized awareness and training initiatives.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5523db3 elementor-section-stretched tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5523db3\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-26ac05c\" data-id=\"26ac05c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20eba8a elementor-widget elementor-widget-heading\" data-id=\"20eba8a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Building Secure IT Infrastructure<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c604718 tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c604718\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e7e5ec0\" data-id=\"e7e5ec0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e4cafb8 elementor-widget elementor-widget-image\" data-id=\"e4cafb8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"478\" height=\"267\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-388.png\" class=\"attachment-large size-large wp-image-4349\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-388.png 478w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-388-300x168.png 300w\" sizes=\"(max-width: 478px) 100vw, 478px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2674f04\" data-id=\"2674f04\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12c041a elementor-widget elementor-widget-heading\" data-id=\"12c041a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Infrastructure Security Solution (Datacenter)<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc5ac3f elementor-widget elementor-widget-text-editor\" data-id=\"cc5ac3f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We provide thorough security analyses with insightful recommendations, designing cost-effective and environmentally sustainable Secure Infrastructure Solutions. Our seasoned professionals offer accurate budget projections to assist you in developing effective security designs for your organization&#8217;s premises.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-27d0bdf tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"27d0bdf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-681bd70\" data-id=\"681bd70\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f2f8f97 elementor-widget elementor-widget-heading\" data-id=\"f2f8f97\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Virtualized \/ Cloud Based Datacenter (Private \/ Public \/Hybrid Datacenter)<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c07b58b elementor-widget elementor-widget-text-editor\" data-id=\"c07b58b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Experience the advantages of virtualized data centers, including predictable costs, heightened productivity, and enterprise-level security. GoAgile offers cost-effective Virtual Private Data Center solutions with scalability, reliability, and robust security for businesses of all sizes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-cead33f\" data-id=\"cead33f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e476bfd elementor-widget elementor-widget-image\" data-id=\"e476bfd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"478\" height=\"267\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-389.png\" class=\"attachment-large size-large wp-image-4350\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-389.png 478w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-389-300x168.png 300w\" sizes=\"(max-width: 478px) 100vw, 478px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-11e1887 tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"11e1887\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3e6ba59\" data-id=\"3e6ba59\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f864fda elementor-widget elementor-widget-image\" data-id=\"f864fda\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"478\" height=\"267\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-390.png\" class=\"attachment-large size-large wp-image-4351\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-390.png 478w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-390-300x168.png 300w\" sizes=\"(max-width: 478px) 100vw, 478px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-17dc0ba\" data-id=\"17dc0ba\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-958c82f elementor-widget elementor-widget-heading\" data-id=\"958c82f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Datacenter Migration Physical to Virtual\/Cloud<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-188efd3 elementor-widget elementor-widget-text-editor\" data-id=\"188efd3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Navigating a successful cloud migration and data transition is a daunting task. Whether it&#8217;s public or private cloud, involving migration, re-platforming, rehosting, refactoring, or a hybrid approach \u2014 across any chosen cloud platform \u2014 GoAgile ensures success at every stage. Rely on our trusted experts for guidance, alleviating the burden and ensuring a seamless transition.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ca2c84d elementor-section-stretched tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ca2c84d\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3229545\" data-id=\"3229545\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c098de7 elementor-widget elementor-widget-heading\" data-id=\"c098de7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Information Security Solutions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-fe2f601 tm-column-break-ipad-no tm-col-stretched-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fe2f601\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c3eaca1\" data-id=\"c3eaca1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ccd768d elementor-widget elementor-widget-text-editor\" data-id=\"ccd768d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Every business confronts the constant threat of cyber-attacks. As cybercriminals employ increasingly sophisticated tactics, the question is not if but when an attack will occur. Our services include comprehensive security analyses, improvement recommendations, innovative design solutions, and accurate budget projections. Our seasoned professionals develop cost-effective and environmentally conscious security designs tailored to your organization&#8217;s premises. Our IT Security experts deliver industry-standard solutions, empowering you to effectively assess and address risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e713efb\" data-id=\"e713efb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2eba606 elementor-widget elementor-widget-image\" data-id=\"2eba606\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"478\" height=\"267\" src=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-388.png\" class=\"attachment-large size-large wp-image-4349\" alt=\"\" srcset=\"https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-388.png 478w, https:\/\/goagiletechnologies.com\/wp-content\/uploads\/2024\/10\/Group-388-300x168.png 300w\" sizes=\"(max-width: 478px) 100vw, 478px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Information Technology Cyber Security All-in-one solution for business success Why Choose GoAgile for Cybersecurity? GoAgile, a rising IT solutions company, is dedicated to enhancing the security of crucial business assets and safeguarding personnel, data, and infrastructure. Our experienced security consultants guide clients through: Thorough threat assessments Policy reviews Development of robust security programs We serve &hellip; <a href=\"https:\/\/goagiletechnologies.com\/ar\/cybersecurity\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">\u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a<\/span><\/a><\/p>","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_theme","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-3959","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/pages\/3959","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/comments?post=3959"}],"version-history":[{"count":109,"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/pages\/3959\/revisions"}],"predecessor-version":[{"id":4367,"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/pages\/3959\/revisions\/4367"}],"wp:attachment":[{"href":"https:\/\/goagiletechnologies.com\/ar\/wp-json\/wp\/v2\/media?parent=3959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}