{"id":163,"date":"2023-05-16T16:33:29","date_gmt":"2023-05-16T16:33:29","guid":{"rendered":"https:\/\/alntra.com\/?page_id=163"},"modified":"2024-09-03T11:12:43","modified_gmt":"2024-09-03T07:12:43","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/alntra.com\/index.php\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.21.0&#8243; background_enable_color=&#8221;off&#8221; background_enable_image=&#8221;off&#8221; parallax=&#8221;on&#8221; min_height=&#8221;668.3px&#8221; overflow-x=&#8221;hidden&#8221; overflow-y=&#8221;hidden&#8221; custom_padding=&#8221;6vw||6vw||true|&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.21.0&#8243; z_index=&#8221;1&#8243; width=&#8221;100%&#8221; min_height=&#8221;503px&#8221; custom_margin=&#8221;|auto||auto|false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; admin_label=&#8221;Column&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_font=&#8221;Share Tech||||||||&#8221; text_font_size=&#8221;23px&#8221; text_line_height=&#8221;2em&#8221; header_font=&#8221;Share Tech|500|||||||&#8221; header_text_color=&#8221;#E02B20&#8243; header_font_size=&#8221;50px&#8221; header_line_height=&#8221;1.5em&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;|||16px||&#8221; text_text_shadow_style=&#8221;preset1&#8243; text_text_shadow_blur_strength=&#8221;2em&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Cyber Security<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_font=&#8221;Share Tech||||||||&#8221; text_text_color=&#8221;#E02B20&#8243; text_font_size=&#8221;23px&#8221; text_line_height=&#8221;2em&#8221; header_font=&#8221;Share Tech|500|||||||&#8221; header_font_size=&#8221;52px&#8221; header_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Share Tech||||||||&#8221; header_2_text_color=&#8221;#E02B20&#8243; header_2_font_size=&#8221;25px&#8221; header_2_line_height=&#8221;1.5em&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;|7px||15px||&#8221; text_text_shadow_style=&#8221;preset1&#8243; text_text_shadow_blur_strength=&#8221;2em&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Detect hidden weakness by proactively identifying insecure architecture and controls, misconfigurations, technical vulnerabilities and mistakes. Be confident that sufficient security controls are implemented and are working as expected.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; admin_label=&#8221;Column&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/alntra.com\/wp-content\/uploads\/2023\/05\/Fingerprint-bro.png&#8221; title_text=&#8221;Fingerprint-bro&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;zoom&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Service and Solutions&#8221; _builder_version=&#8221;4.21.0&#8243; min_height=&#8221;562.1px&#8221; custom_margin=&#8221;-50px|||||&#8221; custom_padding=&#8221;||38px|||&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset6&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; max_width=&#8221;800px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_font=&#8221;Share Tech|300|||||||&#8221; text_font_size=&#8221;25px&#8221; text_line_height=&#8221;1.5em&#8221; header_font=&#8221;Share Tech||||||||&#8221; header_font_size=&#8221;60px&#8221; header_line_height=&#8221;1.5em&#8221; header_2_font=&#8221;Share Tech|900|||||||&#8221; header_2_font_size=&#8221;31px&#8221; header_2_line_height=&#8221;1.5em&#8221; header_3_font=&#8221;Overpass|600|||||||&#8221; header_3_text_color=&#8221;#00b4ff&#8221; header_3_font_size=&#8221;30px&#8221; header_3_line_height=&#8221;1.2em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;-43px|||||&#8221; custom_padding=&#8221;|||||&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;off|desktop&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;off|desktop&#8221; header_3_font_tablet=&#8221;&#8221; header_3_font_phone=&#8221;Overpass|700|||||||&#8221; header_3_font_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;24px&#8221; header_3_font_size_phone=&#8221;18px&#8221; header_3_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Our Services &amp; Solutions<\/h1>\n<p>At Alntra, we are committed to providing comprehensive cybersecurity solutions to protect your digital assets from the ever-evolving threat landscape. With our expertise and cutting-edge technologies, we aim to safeguard your sensitive data, systems, and networks from unauthorized access, data breaches, and other cyber attack.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.21.0&#8243; background_enable_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_font=&#8221;Share Tech|300|||||||&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.8em&#8221; header_3_font=&#8221;Share Tech||||||||&#8221; header_3_font_size=&#8221;25px&#8221; header_3_line_height=&#8221;1.5em&#8221; header_4_font=&#8221;Share Tech|900|||||||&#8221; header_4_font_size=&#8221;20px&#8221; header_4_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;9px|13px|34px|15px||&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Network Security<\/h3>\n<p>We offer robust network security solutions to secure your organization&#8217;s network infrastructure, including firewalls, intrusion detection systems, and virtual private networks (VPNs). Our team of experts will help you design, implement, and monitor a resilient network security architecture.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_font=&#8221;Share Tech|300|||||||&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.8em&#8221; header_3_font=&#8221;Share Tech||||||||&#8221; header_3_font_size=&#8221;25px&#8221; header_3_line_height=&#8221;1.5em&#8221; header_4_font=&#8221;Share Tech|900|||||||&#8221; header_4_font_size=&#8221;20px&#8221; header_4_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;9px|5px||15px||&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Endpoint Protection<\/h3>\n<p>Protecting endpoints is crucial in today&#8217;s connected world. We provide endpoint protection solutions that include antivirus software, host intrusion prevention systems, and advanced threat detection technologies to ensure that your devices are secure from malware, ransomware, and other malicious activities.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_font=&#8221;Share Tech|300|||||||&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.8em&#8221; header_3_font=&#8221;Share Tech||||||||&#8221; header_3_font_size=&#8221;25px&#8221; header_3_line_height=&#8221;1.5em&#8221; header_4_font=&#8221;Share Tech|900|||||||&#8221; header_4_font_size=&#8221;20px&#8221; header_4_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;9px|14px|31px|15px||&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Data Encryption<\/h3>\n<p>Safeguarding your sensitive data is of utmost importance. Our data encryption services ensure that your critical information remains secure both at rest and in transit. We employ industry-standard encryption algorithms and key management practices to protect your data from unauthorized access.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.21.0&#8243; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;||34px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_font=&#8221;Share Tech|300|||||||&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.8em&#8221; header_3_font=&#8221;Share Tech||||||||&#8221; header_3_font_size=&#8221;25px&#8221; header_3_line_height=&#8221;1.5em&#8221; header_4_font=&#8221;Share Tech|900|||||||&#8221; header_4_font_size=&#8221;20px&#8221; header_4_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;9px|13px|74px|15px||&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Vulnerability Assessments<\/h3>\n<p>Our team conducts regular vulnerability assessments and penetration testing to identify potential weaknesses in your systems and applications. By performing comprehensive assessments, we can help you proactively address vulnerabilities before they are exploited by malicious actors<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; text_font=&#8221;Share Tech|300|||||||&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.8em&#8221; header_3_font=&#8221;Share Tech||||||||&#8221; header_3_font_size=&#8221;25px&#8221; header_3_line_height=&#8221;1.5em&#8221; header_4_font=&#8221;Share Tech|900|||||||&#8221; header_4_font_size=&#8221;20px&#8221; header_4_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;9px|10px|37px|15px||&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Security Awareness Training<\/h3>\n<p>Employee awareness and education are crucial in maintaining a strong security posture. We offer tailored security awareness training programs to educate your staff about best practices, social engineering attacks, phishing, and other common threats. By empowering your employees, we can significantly reduce the human factor risks.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.21.0&#8243; text_font=&#8221;Share Tech|300|||||||&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.8em&#8221; header_3_font=&#8221;Share Tech||||||||&#8221; header_3_font_size=&#8221;25px&#8221; header_3_line_height=&#8221;1.5em&#8221; header_4_font=&#8221;Share Tech|900|||||||&#8221; header_4_font_size=&#8221;20px&#8221; header_4_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;9px|8px|34px|15px||&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Incident Response and Forensics<\/h3>\n<p>In the unfortunate event of a security breach, our incident response team is ready to assist you. We will promptly respond to the incident, contain the breach, and conduct forensic investigations to determine the extent of the compromise and provide recommendations for mitigating future incidents.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Why Choose Us&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_color_gradient_direction=&#8221;-130deg&#8221; background_image=&#8221;https:\/\/alntra.com\/wp-content\/uploads\/2023\/05\/cyber-security-04.png&#8221; min_height=&#8221;963px&#8221; custom_margin=&#8221;-52px|||||&#8221; custom_padding=&#8221;||||false|false&#8221; box_shadow_style=&#8221;preset6&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; text_text_color=&#8221;#E02B20&#8243; header_font=&#8221;Share Tech||||||||&#8221; header_text_color=&#8221;#E02B20&#8243; header_font_size=&#8221;55px&#8221; header_line_height=&#8221;1.5em&#8221; header_2_font=&#8221;Share Tech||||||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;64px&#8221; header_2_line_height=&#8221;1.1em&#8221; custom_margin=&#8221;||16px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><span>Why Choose Us<\/span><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Expertise&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf2bb;||fa||900&#8243; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;58e41a12-d2dc-4bc3-82a3-e7e2a77a32bd&#8221; header_font=&#8221;Share Tech|||on|||||&#8221; header_text_color=&#8221;#161740&#8243; header_font_size=&#8221;23px&#8221; header_line_height=&#8221;1.3em&#8221; body_font=&#8221;Share Tech||||||||&#8221; body_text_color=&#8221;rgba(0,0,0,0.66)&#8221; body_font_size=&#8221;17px&#8221; body_line_height=&#8221;1.8em&#8221; custom_padding=&#8221;13px||21px|12px||&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;&#8221; body_font_size_phone=&#8221;14px&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span>Our team of cybersecurity professionals has extensive experience in the field and stays up to date with the latest trends, threats, and technologies..<\/span><\/h3>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Customized Solutions&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf5fc;||fa||900&#8243; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;58e41a12-d2dc-4bc3-82a3-e7e2a77a32bd&#8221; header_font=&#8221;Share Tech|||on|||||&#8221; header_text_color=&#8221;#161740&#8243; header_font_size=&#8221;23px&#8221; header_line_height=&#8221;1.3em&#8221; body_font=&#8221;Share Tech||||||||&#8221; body_text_color=&#8221;rgba(0,0,0,0.66)&#8221; body_font_size=&#8221;17px&#8221; body_line_height=&#8221;1.8em&#8221; custom_padding=&#8221;13px|||12px||&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;&#8221; body_font_size_phone=&#8221;14px&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span>We understand that every organization has unique security requirements. We work closely with you to develop customized solutions that align with your specific needs and industry standards.<\/span><\/h3>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Proactive Approach&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf6ff;||fa||900&#8243; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;58e41a12-d2dc-4bc3-82a3-e7e2a77a32bd&#8221; header_font=&#8221;Share Tech|||on|||||&#8221; header_text_color=&#8221;#161740&#8243; header_font_size=&#8221;23px&#8221; header_line_height=&#8221;1.3em&#8221; body_font=&#8221;Share Tech||||||||&#8221; body_text_color=&#8221;rgba(0,0,0,0.66)&#8221; body_font_size=&#8221;17px&#8221; body_line_height=&#8221;1.8em&#8221; custom_padding=&#8221;13px|||12px||&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;&#8221; body_font_size_phone=&#8221;14px&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span>We believe in taking a proactive approach to cybersecurity. By regularly assessing and monitoring your systems, we can detect and address vulnerabilities before they turn into major security incidents.<\/span><\/h3>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Monitoring and Support&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf590;||fa||900&#8243; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;58e41a12-d2dc-4bc3-82a3-e7e2a77a32bd&#8221; header_font=&#8221;Share Tech|||on|||||&#8221; header_text_color=&#8221;#161740&#8243; header_font_size=&#8221;23px&#8221; header_line_height=&#8221;1.3em&#8221; body_font=&#8221;Share Tech||||||||&#8221; body_text_color=&#8221;rgba(0,0,0,0.66)&#8221; body_font_size=&#8221;17px&#8221; body_line_height=&#8221;1.8em&#8221; custom_padding=&#8221;13px|||12px||&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;&#8221; body_font_size_phone=&#8221;14px&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span> Our dedicated security operations center (SOC) ensures round-the-clock monitoring of your systems for any suspicious activities. We provide continuous support to address any security concerns or incidents promptly.<\/span><\/h3>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Compliance and Regulations:&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe101;||divi||400&#8243; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;58e41a12-d2dc-4bc3-82a3-e7e2a77a32bd&#8221; header_font=&#8221;Share Tech|||on|||||&#8221; header_text_color=&#8221;#161740&#8243; header_font_size=&#8221;23px&#8221; header_line_height=&#8221;1.3em&#8221; body_font=&#8221;Share Tech||||||||&#8221; body_text_color=&#8221;rgba(0,0,0,0.66)&#8221; body_font_size=&#8221;17px&#8221; body_line_height=&#8221;1.8em&#8221; custom_padding=&#8221;13px||21px|12px||&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;&#8221; body_font_size_phone=&#8221;14px&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span>We help you navigate through complex compliance requirements and ensure that your cybersecurity practices meet industry regulations and standards.<\/span><\/h3>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber SecurityDetect hidden weakness by proactively identifying insecure architecture and controls, misconfigurations, technical vulnerabilities and mistakes. Be confident that sufficient security controls are implemented and are working as expected.Our Services &amp; Solutions At Alntra, we are committed to providing comprehensive cybersecurity solutions to protect your digital assets from the ever-evolving threat landscape. With our expertise [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-163","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/alntra.com\/index.php\/wp-json\/wp\/v2\/pages\/163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alntra.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/alntra.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/alntra.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/alntra.com\/index.php\/wp-json\/wp\/v2\/comments?post=163"}],"version-history":[{"count":29,"href":"https:\/\/alntra.com\/index.php\/wp-json\/wp\/v2\/pages\/163\/revisions"}],"predecessor-version":[{"id":1285,"href":"https:\/\/alntra.com\/index.php\/wp-json\/wp\/v2\/pages\/163\/revisions\/1285"}],"wp:attachment":[{"href":"https:\/\/alntra.com\/index.php\/wp-json\/wp\/v2\/media?parent=163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}