{"id":252787,"date":"2025-05-25T16:24:44","date_gmt":"2025-05-25T14:24:44","guid":{"rendered":"https:\/\/cyberforces.com\/?page_id=252787"},"modified":"2025-05-25T16:24:51","modified_gmt":"2025-05-25T14:24:51","slug":"products","status":"publish","type":"page","link":"https:\/\/cyberforces.com\/en\/products","title":{"rendered":"Products"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;45deg&#8221; background_color_gradient_stops=&#8221;#b01e30 0%|#151c4b 100%&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; module_class=&#8221;cf_hero_section_mobile&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;90%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;48px||48px|48px|true|false&#8221; custom_padding_tablet=&#8221;48px||48px|48px|true|false&#8221; custom_padding_phone=&#8221;|24px||24px|true|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#151C4B&#8221; header_font_size=&#8221;3em&#8221; header_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1 class=\"n-heading-primary u-mb-small\">System and network cybersecurity<\/h1>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_4_font=&#8221;Raleway|500|||||||&#8221; header_4_text_color=&#8221;#485060&#8243; header_4_font_size=&#8221;1.2em&#8221; header_4_line_height=&#8221;1.4em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h4>We specialize in <strong>system and network cybersecurity<\/strong>, combining advanced technical expertise with years of experience in protecting digital assets. We cooperate with leading cybersecurity vendors and provide strategic support to organizations in the <strong>financial<\/strong>, <strong>governmental<\/strong>, <strong>telecommunications<\/strong>, and <strong>industrial<\/strong> sectors.<\/h4>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/security.webp&#8221; title_text=&#8221;security&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;80%&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#EDF2FA&#8221; custom_padding=&#8221;20px||||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2 style=\"text-align: center;\">Scope of Services<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;10%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;12px|24px|12px|24px|true|false&#8221; custom_css_main_element=&#8221;||||||&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/web_infrastructure.webp&#8221; title_text=&#8221;web_infrastructure&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;70%&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; header_4_text_align=&#8221;left&#8221; header_4_text_color=&#8221;#151C4B&#8221; header_4_line_height=&#8221;1.2em&#8221; custom_margin=&#8221;||5px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h4 class=\"n-heading-secondary u-mb-small\" style=\"text-align: left;\">Network Infrastructure Protection:<\/h4>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text module_class=&#8221;cf_bullet&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_line_height=&#8221;1.2em&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<ul>\n<li>Next Generation Firewall (advanced hardware-based firewall)<\/li>\n<li>Load Balancer (network traffic management and optimization)<\/li>\n<li>Web Application Firewall (protection of web applications)<\/li>\n<li>Anti-DDoS (protection against DDoS attacks)<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;12px|24px|12px|24px|true|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/pentest_network_infrastructure.webp&#8221; title_text=&#8221;pentest_network_infrastructure&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;70%&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; header_4_text_align=&#8221;left&#8221; header_4_text_color=&#8221;#151C4B&#8221; custom_margin=&#8221;||5px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h4 class=\"n-heading-secondary u-mb-small\" style=\"text-align: left;\">IT Infrastructure Protection:<\/h4>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text module_class=&#8221;cf_bullet&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<ul>\n<li>Data Loss Prevention (protection against leakage of confidential or sensitive data, including GDPR compliance)<\/li>\n<li>Protection against targeted attacks (EDR, XDR powered by machine learning and AI)<\/li>\n<li>Email protection (against phishing, malware, and spam)<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;12px|24px|12px|24px|true|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/critical_infrastructure.webp&#8221; title_text=&#8221;critical_infrastructure&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;70%&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; header_4_text_align=&#8221;left&#8221; header_4_text_color=&#8221;#151C4B&#8221; header_4_line_height=&#8221;1.2em&#8221; custom_margin=&#8221;||5px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h4 class=\"n-heading-secondary u-mb-small\" style=\"text-align: left;\">Industrial Critical Infrastructure Protection:<\/h4>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text module_class=&#8221;cf_bullet&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<ul>\n<li>Monitoring anomalies in data transmitted to controllers via industrial protocols<\/li>\n<li>Galvanic isolation between IT and OT networks<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px||||false|false&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;12px|24px|12px|24px|true|false&#8221; custom_css_main_element=&#8221;||||||&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/pentest_iot.webp&#8221; title_text=&#8221;pentest_iot&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;70%&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; header_4_text_align=&#8221;left&#8221; header_4_text_color=&#8221;#151C4B&#8221; header_4_line_height=&#8221;1.2em&#8221; custom_margin=&#8221;||5px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h4 class=\"n-heading-secondary u-mb-small\" style=\"text-align: left;\">Endpoint and Mobile Device Protection:<\/h4>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text module_class=&#8221;cf_bullet&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<ul>\n<li>Detection of devices connected to the network (smartphones, tablets)<\/li>\n<li>Enforcing corporate network security policies and standards<\/li>\n<li>BYOD management (device containerization and access control)<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;12px|24px|12px|24px|true|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/scan.webp&#8221; title_text=&#8221;scan&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;70%&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; header_4_text_align=&#8221;left&#8221; header_4_text_color=&#8221;#151C4B&#8221; custom_margin=&#8221;||5px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h4 class=\"n-heading-secondary u-mb-small\" style=\"text-align: left;\">Vulnerability Scanning:<\/h4>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text module_class=&#8221;cf_bullet&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<ul>\n<li>Network and infrastructure scanning<\/li>\n<li>Application vulnerability scanning<\/li>\n<li>Internet of Things (IoT) device scanning<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;12px|24px|12px|24px|true|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/test_vulnerability.webp&#8221; title_text=&#8221;test_vulnerability&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;70%&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; header_4_text_align=&#8221;left&#8221; header_4_text_color=&#8221;#151C4B&#8221; header_4_line_height=&#8221;1.2em&#8221; custom_margin=&#8221;||5px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h4 class=\"n-heading-secondary u-mb-small\" style=\"text-align: left;\">Monitoring and Analytics Systems:<\/h4>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text module_class=&#8221;cf_bullet&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<ul>\n<li>SIEM \/ Log Manager \/ Big Data Analysis<\/li>\n<li>SOAR (Security Orchestration, Automation, and Response for SOCs)<\/li>\n<li>Cybersecurity training simulator for security teams<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#151C4B&#8221; overflow-x=&#8221;hidden&#8221; overflow-y=&#8221;hidden&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; admin_label=&#8221;Column&#8221; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#151C4B&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2 style=\"text-align: center;\">Additional Consulting Services<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;10%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;90%&#8221; max_width=&#8221;1220px&#8221; custom_padding=&#8221;||||false|false&#8221; animation_style=&#8221;fade&#8221; custom_css_free_form=&#8221;.divilife-3-col-feature-blurb-slider .slick-prev:before { ||  content: &#8216;%9234&#8217;; ||}||.divilife-3-col-feature-blurb-slider .slick-next:before { ||  content: &#8216;%9235&#8217;; ||} &#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; module_class=&#8221;divilife-3-col-feature-blurb-slider&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_css_main_element=&#8221;display: flex;||flex-direction: column;&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_blurb title=&#8221;Consulting:&#8221; image=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/consulting.webp&#8221; image_icon_width=&#8221;150px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#151C4B&#8221; header_font_size=&#8221;1em&#8221; body_text_align=&#8221;center&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.2em&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;90%&#8221; max_width=&#8221;350px&#8221; module_alignment=&#8221;center&#8221; min_height=&#8221;440px&#8221; custom_margin=&#8221;||||true|true&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; hover_enabled=&#8221;0&#8243; custom_css_main_element=&#8221; flex: 1;&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"cf_scroll_card\">\n<ul>\n<li>Initial analysis and scoping of cooperation<\/li>\n<\/ul>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Security System Review:&#8221; image=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/osint_2.webp&#8221; image_icon_width=&#8221;150px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#151C4B&#8221; header_font_size=&#8221;1em&#8221; header_line_height=&#8221;1.2em&#8221; body_text_align=&#8221;center&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.2em&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;90%&#8221; max_width=&#8221;350px&#8221; module_alignment=&#8221;center&#8221; min_height=&#8221;440px&#8221; custom_margin=&#8221;||||true|true&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; hover_enabled=&#8221;0&#8243; custom_css_main_element=&#8221; flex: 1;&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"cf_scroll_card\">\n<ul>\n<li style=\"text-align: left;\">Configuration audits of systems and devices<\/li>\n<li style=\"text-align: left;\">External and internal penetration testing to identify vulnerabilities<\/li>\n<\/ul>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Security Architecture Design:&#8221; image=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/process.webp&#8221; image_icon_width=&#8221;150px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#151C4B&#8221; header_font_size=&#8221;1em&#8221; header_line_height=&#8221;1.2em&#8221; body_text_align=&#8221;center&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.2em&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;90%&#8221; max_width=&#8221;350px&#8221; module_alignment=&#8221;center&#8221; min_height=&#8221;440px&#8221; custom_margin=&#8221;||||true|true&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; hover_enabled=&#8221;0&#8243; custom_css_main_element=&#8221; flex: 1;&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"cf_scroll_card\">\n<ul>\n<li>Strategic recommendations and prioritization of critical security actions<\/li>\n<\/ul>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Implementation:&#8221; image=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/network_communication.webp&#8221; image_icon_width=&#8221;150px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#151C4B&#8221; header_font_size=&#8221;1em&#8221; body_text_align=&#8221;center&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.2em&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;90%&#8221; max_width=&#8221;350px&#8221; module_alignment=&#8221;center&#8221; min_height=&#8221;440px&#8221; custom_margin=&#8221;||||true|true&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; hover_enabled=&#8221;0&#8243; custom_css_main_element=&#8221; flex: 1;&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"cf_scroll_card\">\n<ul>\n<li>Deployment of tools and improvements based on an agreed implementation schedule<\/li>\n<\/ul>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Support and Training:&#8221; image=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/quality.webp&#8221; image_icon_width=&#8221;150px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#151C4B&#8221; header_font_size=&#8221;1em&#8221; body_text_align=&#8221;center&#8221; body_text_color=&#8221;#485060&#8243; body_font_size=&#8221;1.2em&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;90%&#8221; max_width=&#8221;350px&#8221; module_alignment=&#8221;center&#8221; min_height=&#8221;440px&#8221; custom_margin=&#8221;||||true|true&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; hover_enabled=&#8221;0&#8243; custom_css_free_form=&#8221;||&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"cf_scroll_card\">\n<ul>\n<li>Ongoing support through service-level agreements (SLAs)<\/li>\n<li>Specialized training for IT and cybersecurity teams<\/li>\n<li>Security awareness programs for employees<\/li>\n<\/ul>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_code admin_label=&#8221;Custom CSS &#038; JS&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;40px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<style><!-- [et_pb_line_break_holder] -->.slick-slider {<!-- [et_pb_line_break_holder] -->  -webkit-user-select: none;<!-- [et_pb_line_break_holder] -->  -moz-user-select: none;<!-- [et_pb_line_break_holder] -->  -ms-user-select: none;<!-- [et_pb_line_break_holder] -->  user-select: none;<!-- [et_pb_line_break_holder] -->  -webkit-touch-callout: none;<!-- [et_pb_line_break_holder] -->  -khtml-user-select: none;<!-- [et_pb_line_break_holder] -->  ms-touch-action: pan-y;<!-- [et_pb_line_break_holder] -->  touch-action: pan-y;<!-- [et_pb_line_break_holder] -->  -webkit-tap-highlight-color: transparent;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.slick-list {<!-- [et_pb_line_break_holder] -->  position: relative;<!-- [et_pb_line_break_holder] -->  display: block;<!-- [et_pb_line_break_holder] -->  overflow-x: hidden;<!-- [et_pb_line_break_holder] -->  margin: 0 0 50px 0;<!-- [et_pb_line_break_holder] -->  padding: 0 0 0px;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->.slick-track:before, .slick-track:after {<!-- [et_pb_line_break_holder] -->  display: table;<!-- [et_pb_line_break_holder] -->  content: '';<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->.slick-slide {<!-- [et_pb_line_break_holder] -->  position: relative;<!-- [et_pb_line_break_holder] -->  float: left;<!-- [et_pb_line_break_holder] -->  height: 100%;<!-- [et_pb_line_break_holder] -->  display: flex;<!-- [et_pb_line_break_holder] -->  align-items: stretch;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-arrow, .divilife-3-col-feature-blurb-slider .slick-arrow:hover, .divilife-3-col-feature-blurb-slider .slick-arrow:focus {<!-- [et_pb_line_break_holder] -->position: absolute;<!-- [et_pb_line_break_holder] -->font-size: 0;<!-- [et_pb_line_break_holder] -->line-height: 0;<!-- [et_pb_line_break_holder] -->padding: 0;<!-- [et_pb_line_break_holder] -->color: transparent;<!-- [et_pb_line_break_holder] -->outline: none;<!-- [et_pb_line_break_holder] -->background: #DADBE2;<!-- [et_pb_line_break_holder] -->border: none;<!-- [et_pb_line_break_holder] -->cursor: pointer;<!-- [et_pb_line_break_holder] -->top: 50%;<!-- [et_pb_line_break_holder] -->transform: translateY(-50%);<!-- [et_pb_line_break_holder] -->z-index: 100;<!-- [et_pb_line_break_holder] -->height: 50px;<!-- [et_pb_line_break_holder] -->vertical-align: middle;<!-- [et_pb_line_break_holder] -->border-radius: 50%;<!-- [et_pb_line_break_holder] -->width: 50px;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-prev { left: -60px; }<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-next { right: -60px; }<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-arrow:before {<!-- [et_pb_line_break_holder] -->font-family: ETmodules;<!-- [et_pb_line_break_holder] -->background: transparent;<!-- [et_pb_line_break_holder] -->opacity: 1;<!-- [et_pb_line_break_holder] -->font-size: 46px;<!-- [et_pb_line_break_holder] -->vertical-align: middle;<!-- [et_pb_line_break_holder] -->color: #151c4b;<!-- [et_pb_line_break_holder] -->text-align: center;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-arrow:hover:before { opacity: 0.8; }<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-prev:before { content: '34'; }<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-next:before { content: '35'; } <!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->.entry-content ul.slick-dots {<!-- [et_pb_line_break_holder] -->  position: absolute;<!-- [et_pb_line_break_holder] -->  bottom: 0;<!-- [et_pb_line_break_holder] -->  \/*display: block;*\/<!-- [et_pb_line_break_holder] -->\tdisplay: none;<!-- [et_pb_line_break_holder] -->  width: 100%;<!-- [et_pb_line_break_holder] -->  padding: 0;<!-- [et_pb_line_break_holder] -->  margin: 0;<!-- [et_pb_line_break_holder] -->  list-style: none;<!-- [et_pb_line_break_holder] -->  text-align: center;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.slick-dots li {<!-- [et_pb_line_break_holder] -->  position: relative;<!-- [et_pb_line_break_holder] -->  \/*display: inline-block;*\/<!-- [et_pb_line_break_holder] -->\tdisplay: none !important;<!-- [et_pb_line_break_holder] -->  margin: 0 5px;<!-- [et_pb_line_break_holder] -->  padding: 0;<!-- [et_pb_line_break_holder] -->  cursor: pointer;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.slick-dots li button {<!-- [et_pb_line_break_holder] -->\tfont-size: 0;<!-- [et_pb_line_break_holder] -->\tline-height: 0;<!-- [et_pb_line_break_holder] -->\t\/*display: block;*\/<!-- [et_pb_line_break_holder] -->  display: none !important;<!-- [et_pb_line_break_holder] -->\twidth: 10px;<!-- [et_pb_line_break_holder] -->\theight: 10px;<!-- [et_pb_line_break_holder] -->\tpadding: 0;<!-- [et_pb_line_break_holder] -->\tcursor: pointer;<!-- [et_pb_line_break_holder] -->\tcolor: transparent;<!-- [et_pb_line_break_holder] -->\tborder: 0;<!-- [et_pb_line_break_holder] -->\toutline: none;<!-- [et_pb_line_break_holder] -->\tbackground-color: #DADBE2;<!-- [et_pb_line_break_holder] -->  border-radius: 10px;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.slick-dots li.slick-active button { <!-- [et_pb_line_break_holder] -->  display: none !important;<!-- [et_pb_line_break_holder] -->  background-color: #B01E30; <!-- [et_pb_line_break_holder] -->  }<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->@media(max-width: 981px) {<!-- [et_pb_line_break_holder] -->\t.divilife-3-col-feature-blurb-slider .slick-prev { left: -32px; }<!-- [et_pb_line_break_holder] -->\t.divilife-3-col-feature-blurb-slider .slick-next { right: -30px; }<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->@media(max-width: 499px) {<!-- [et_pb_line_break_holder] -->\t.divilife-3-col-feature-blurb-slider .slick-prev { left: -26px; }<!-- [et_pb_line_break_holder] -->\t.divilife-3-col-feature-blurb-slider .slick-next { right: -24px; }<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] --><\/style>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/slick-carousel\/1.6.0\/slick.js\"><\/script><!-- [et_pb_line_break_holder] --><script><!-- [et_pb_line_break_holder] -->jQuery(document).ready(function() {<!-- [et_pb_line_break_holder] -->\tjQuery('.divilife-3-col-feature-blurb-slider').slick({<!-- [et_pb_line_break_holder] -->    dots: true,<!-- [et_pb_line_break_holder] -->    slidesToShow: 3,<!-- [et_pb_line_break_holder] -->    slidesToScroll: 1,<!-- [et_pb_line_break_holder] -->    responsive: [<!-- [et_pb_line_break_holder] -->      {<!-- [et_pb_line_break_holder] -->        breakpoint: 1100,<!-- [et_pb_line_break_holder] -->        settings: {<!-- [et_pb_line_break_holder] -->          slidesToShow: 2<!-- [et_pb_line_break_holder] -->        }<!-- [et_pb_line_break_holder] -->      },<!-- [et_pb_line_break_holder] -->      {<!-- [et_pb_line_break_holder] -->        breakpoint: 767,<!-- [et_pb_line_break_holder] -->        settings: {<!-- [et_pb_line_break_holder] -->          slidesToShow: 1<!-- [et_pb_line_break_holder] -->        }<!-- [et_pb_line_break_holder] -->      }<!-- [et_pb_line_break_holder] -->    ]<!-- [et_pb_line_break_holder] -->  }); <!-- [et_pb_line_break_holder] -->});<!-- [et_pb_line_break_holder] --><\/script>[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#EDF2FA&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2 style=\"text-align: center;\">Key Sectors and Applications<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;10%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;90%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; custom_css_main_element=&#8221;display: flex;||align-items: center;&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_phone=&#8221;flex-direction: column;&#8221; custom_css_main_element_tablet=&#8221;display: flex;||align-items: center;&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;24px|||48px|false|false&#8221; custom_padding_tablet=&#8221;24px|||48px|false|false&#8221; custom_padding_phone=&#8221;24px|24px||24px|false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#151C4B&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h3 style=\"text-align: left;\">Our cybersecurity solutions are used in:<\/h3>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text module_class=&#8221;cf_bullet&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#485060&#8243; text_font_size=&#8221;1.2em&#8221; text_line_height=&#8221;1.2em&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<ul>\n<li>Public healthcare<\/li>\n<li>Insurance and financial institutions<\/li>\n<li>Energy and utilities<\/li>\n<li>Transportation and logistics<\/li>\n<li>Telecommunications providers<\/li>\n<li>Law enforcement and defense ministries<\/li>\n<li>Central and government institutions<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/cf_team.webp&#8221; title_text=&#8221;cf_team&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Nunito Sans|700|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;1.2em&#8221; header_2_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; header_3_text_color=&#8221;#151C4B&#8221; header_4_text_color=&#8221;#151C4B&#8221; header_4_font_size=&#8221;1em&#8221; header_4_line_height=&#8221;1.2em&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;45deg&#8221; background_color_gradient_stops=&#8221;#b01e30 0%|#151c4b 100%&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;12px|24px|12px|24px|true|true&#8221; hover_enabled=&#8221;0&#8243; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: center;\">We have delivered and implemented cybersecurity solutions across applications, IT systems, endpoints, and critical infrastructure environments such as <strong>SCADA<\/strong> and <strong>IoT<\/strong>.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=&#8221;on|on|on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;20px||||false|false&#8221; disabled=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2 style=\"text-align: center;\">Industry Partnerships<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#151C4B&#8221; header_3_text_align=&#8221;center&#8221; header_4_font=&#8221;|||on|||||&#8221; header_4_text_color=&#8221;#485060&#8243; custom_margin=&#8221;||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h4 style=\"text-align: center;\">We work closely with leading technology partners, including:<\/h4>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#B01E30&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;10%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][ba_image_carousel content_alignment=&#8221;center&#8221; slide_count=&#8221;5&#8243; carousel_spacing_top=&#8221;20px&#8221; carousel_spacing_bottom=&#8221;20px&#8221; nav_height=&#8221;48px&#8221; nav_width=&#8221;48px&#8221; nav_color=&#8221;#151C4B&#8221; nav_bg=&#8221;#FFFFFF&#8221; nav_border_color=&#8221;RGBA(255,255,255,0)&#8221; icon_left=&#8221;&#xf104;||fa||900&#8243; icon_right=&#8221;&#xf105;||fa||900&#8243; pagi_bg=&#8221;#151C4B&#8221; slide_count_tablet=&#8221;5&#8243; slide_count_phone=&#8221;1&#8243; slide_count_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; title_font_size=&#8221;1.5em&#8221; subtitle_line_height=&#8221;1.2em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][ba_image_carousel_child photo=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/partners_1.webp&#8221; title=&#8221;Check Point Software Technologies &#8221; sub_title=&#8221;leader in firewall and network protection&#8221; _builder_version=&#8221;4.27.4&#8243; title_level=&#8221;h3&#8243; title_text_color=&#8221;#151C4B&#8221; subtitle_level=&#8221;h5&#8243; subtitle_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; subtitle_text_color=&#8221;#485060&#8243; subtitle_font_size=&#8221;1em&#8221; hover_enabled=&#8221;0&#8243; title_text_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][\/ba_image_carousel_child][ba_image_carousel_child photo=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/partners_2.webp&#8221; title=&#8221;Cisco Systems&#8221; sub_title=&#8221;advanced network and IT infrastructure solutions&#8221; _builder_version=&#8221;4.27.4&#8243; title_level=&#8221;h3&#8243; title_text_color=&#8221;#151C4B&#8221; subtitle_level=&#8221;h5&#8243; subtitle_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; subtitle_text_color=&#8221;#485060&#8243; subtitle_font_size=&#8221;1em&#8221; hover_enabled=&#8221;0&#8243; title_text_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][\/ba_image_carousel_child][ba_image_carousel_child photo=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/partners_3.webp&#8221; title=&#8221;Palo Alto Networks&#8221; sub_title=&#8221;advanced cyber threat protection systems&#8221; _builder_version=&#8221;4.27.4&#8243; title_level=&#8221;h3&#8243; title_text_color=&#8221;#151C4B&#8221; subtitle_level=&#8221;h5&#8243; subtitle_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; subtitle_text_color=&#8221;#485060&#8243; subtitle_font_size=&#8221;1em&#8221; hover_enabled=&#8221;0&#8243; title_text_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][\/ba_image_carousel_child][ba_image_carousel_child photo=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/partners_4.webp&#8221; title=&#8221;F5 Networks&#8221; sub_title=&#8221;enterprise application security&#8221; _builder_version=&#8221;4.27.4&#8243; title_level=&#8221;h3&#8243; title_text_color=&#8221;#151C4B&#8221; subtitle_level=&#8221;h5&#8243; subtitle_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; subtitle_text_color=&#8221;#485060&#8243; subtitle_font_size=&#8221;1em&#8221; hover_enabled=&#8221;0&#8243; title_text_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][\/ba_image_carousel_child][ba_image_carousel_child photo=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/partners_5.webp&#8221; title=&#8221;Fidelis Cybersecurity&#8221; sub_title=&#8221;threat detection and threat hunting solutions&#8221; _builder_version=&#8221;4.27.4&#8243; title_level=&#8221;h3&#8243; title_text_color=&#8221;#151C4B&#8221; subtitle_level=&#8221;h5&#8243; subtitle_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; subtitle_text_color=&#8221;#485060&#8243; subtitle_font_size=&#8221;1em&#8221; hover_enabled=&#8221;0&#8243; title_text_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][\/ba_image_carousel_child][ba_image_carousel_child photo=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/partners_6.webp&#8221; title=&#8221;Forcepoint&#8221; sub_title=&#8221;data loss prevention and data protection systems&#8221; _builder_version=&#8221;4.27.4&#8243; title_level=&#8221;h3&#8243; title_text_color=&#8221;#151C4B&#8221; subtitle_level=&#8221;h5&#8243; subtitle_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; subtitle_text_color=&#8221;#485060&#8243; subtitle_font_size=&#8221;1em&#8221; hover_enabled=&#8221;0&#8243; title_text_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][\/ba_image_carousel_child][ba_image_carousel_child photo=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/partners_7.webp&#8221; title=&#8221;Fortinet&#8221; sub_title=&#8221;comprehensive cybersecurity platforms&#8221; _builder_version=&#8221;4.27.4&#8243; title_level=&#8221;h3&#8243; title_text_color=&#8221;#151C4B&#8221; subtitle_level=&#8221;h5&#8243; subtitle_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; subtitle_text_color=&#8221;#485060&#8243; subtitle_font_size=&#8221;1em&#8221; hover_enabled=&#8221;0&#8243; title_text_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][\/ba_image_carousel_child][ba_image_carousel_child photo=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/partners_8.webp&#8221; title=&#8221;Splunk&#8221; sub_title=&#8221;big data analytics and security monitoring&#8221; _builder_version=&#8221;4.27.4&#8243; title_level=&#8221;h3&#8243; title_text_color=&#8221;#151C4B&#8221; subtitle_level=&#8221;h5&#8243; subtitle_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; subtitle_text_color=&#8221;#485060&#8243; subtitle_font_size=&#8221;1em&#8221; hover_enabled=&#8221;0&#8243; title_text_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][\/ba_image_carousel_child][ba_image_carousel_child photo=&#8221;https:\/\/cyberforces.com\/wp-content\/uploads\/partners_9.webp&#8221; title=&#8221;Wallix&#8221; sub_title=&#8221;privileged access management (PAM) solutions&#8221; _builder_version=&#8221;4.27.4&#8243; title_level=&#8221;h3&#8243; title_text_color=&#8221;#151C4B&#8221; subtitle_level=&#8221;h5&#8243; subtitle_font=&#8221;|&#8211;et_global_heading_font_weight|||||||&#8221; subtitle_text_color=&#8221;#485060&#8243; subtitle_font_size=&#8221;1em&#8221; hover_enabled=&#8221;0&#8243; title_text_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][\/ba_image_carousel_child][\/ba_image_carousel][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>System and network cybersecurityWe specialize in system and network cybersecurity, combining advanced technical expertise with years of experience in protecting digital assets. We cooperate with leading cybersecurity vendors and provide strategic support to organizations in the financial, governmental, telecommunications, and industrial sectors.Scope of ServicesNetwork Infrastructure Protection: Next Generation Firewall (advanced hardware-based firewall) Load Balancer (network [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.27.4\" _module_preset=\"default\" use_background_color_gradient=\"on\" background_color_gradient_direction=\"45deg\" background_color_gradient_stops=\"#b01e30 0%|#151c4b 100%\" da_disable_devices=\"off|off|off\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row column_structure=\"1_2,1_2\" custom_padding_last_edited=\"on|phone\" module_class=\"cf_hero_section_mobile\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" width=\"100%\" width_tablet=\"90%\" width_phone=\"90%\" width_last_edited=\"on|tablet\" custom_padding=\"48px||48px|48px|true|false\" custom_padding_tablet=\"48px||48px|48px|true|false\" custom_padding_phone=\"|24px||24px|true|false\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_text_color=\"#151C4B\" header_font_size=\"3em\" header_line_height=\"1.2em\" header_2_font=\"|700|||||||\" header_2_text_color=\"#151C4B\" header_3_text_align=\"center\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h1 class=\"n-heading-primary u-mb-small\">Cyberbezpiecze\u0144stwo systemowe i\u00a0sieciowe<\/h1><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_4_font=\"Raleway|500|||||||\" header_4_text_color=\"#485060\" header_4_font_size=\"1.2em\" header_4_line_height=\"1.4em\" global_colors_info=\"{}\"]<\/p><h4>Specjalizujemy si\u0119 w\u00a0cyberbezpiecze\u0144stwie systemowym i\u00a0sieciowym, wykorzystuj\u0105c zaawansowan\u0105 wiedz\u0119 oraz\u00a0wieloletnie do\u015bwiadczenie w\u00a0ochronie zasob\u00f3w cyfrowych. Wsp\u00f3\u0142pracujemy z\u00a0liderami rynku cybersecurity i\u00a0zapewniamy wsparcie organizacjom z\u00a0sektora finansowego, rz\u0105dowego, telekomunikacyjnego oraz\u00a0przemys\u0142owego.<\/h4><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/security.webp\" title_text=\"security\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"80%\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#EDF2FA\" custom_padding=\"20px||||false|false\" da_disable_devices=\"off|off|off\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|700|||||||\" header_2_text_color=\"#151C4B\" header_3_text_align=\"center\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h2 style=\"text-align: center;\">Zakres oferowanych us\u0142ug<\/h2><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"10%\" module_alignment=\"center\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" custom_css_main_element_last_edited=\"on|phone\"][et_pb_column type=\"1_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"12px|24px|12px|24px|true|false\" custom_css_main_element=\"||||||\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/web_infrastructure.webp\" title_text=\"web_infrastructure\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"70%\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" header_4_text_align=\"left\" header_4_text_color=\"#151C4B\" header_4_line_height=\"1.2em\" custom_margin=\"||5px||false|false\" global_colors_info=\"{}\"]<\/p><h4 class=\"n-heading-secondary u-mb-small\" style=\"text-align: left;\">Ochrona infrastruktury sieciowej:<\/h4><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text module_class=\"cf_bullet\" _builder_version=\"4.27.4\" _module_preset=\"default\" text_line_height=\"1.2em\" locked=\"off\" global_colors_info=\"{}\"]<\/p><ul><li>Next Generation Firewall (zaawansowana sprz\u0119towa zapora sieciowa)<\/li><li>Load Balancer (zarz\u0105dzanie i\u00a0optymalizacja ruchu sieciowego)<\/li><li>Web Application Firewall (ochrona aplikacji webowych)<\/li><li>Anty DDoS (ochrona przed\u00a0atakami DDoS)<\/li><\/ul><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"12px|24px|12px|24px|true|false\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/pentest_network_infrastructure.webp\" title_text=\"pentest_network_infrastructure\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"70%\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" header_4_text_align=\"left\" header_4_text_color=\"#151C4B\" custom_margin=\"||5px||false|false\" global_colors_info=\"{}\"]<\/p><h4 class=\"n-heading-secondary u-mb-small\" style=\"text-align: left;\">Ochrona infrastruktury IT:<\/h4><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" locked=\"off\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text module_class=\"cf_bullet\" _builder_version=\"4.27.4\" _module_preset=\"default\" locked=\"off\" global_colors_info=\"{}\"]<\/p><ul><li>Data Loss Prevention (ochrona przed\u00a0wyciekiem danych poufnych, wra\u017cliwych, RODO)<\/li><li>Ochrona przed\u00a0targetowanymi atakami (EDR, XDR, wspierane machine learning i\u00a0AI)<\/li><li>Ochrona poczty elektronicznej (phishing, malware, spam)<\/li><\/ul><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"12px|24px|12px|24px|true|false\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/critical_infrastructure.webp\" title_text=\"critical_infrastructure\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"70%\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" header_4_text_align=\"left\" header_4_text_color=\"#151C4B\" header_4_line_height=\"1.2em\" custom_margin=\"||5px||false|false\" global_colors_info=\"{}\"]<\/p><h4 class=\"n-heading-secondary u-mb-small\" style=\"text-align: left;\">Ochrona przemys\u0142owej infrastruktury krytycznej:<\/h4><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" locked=\"off\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text module_class=\"cf_bullet\" _builder_version=\"4.27.4\" _module_preset=\"default\" locked=\"off\" global_colors_info=\"{}\"]<\/p><ul><li>Monitoring anomalii w\u00a0informacjach przesy\u0142anych do\u00a0sterownik\u00f3w poprzez protoko\u0142y przemys\u0142owe<\/li><li>Galwaniczna separacja sieci IT\/OT<\/li><\/ul><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||||false|false\" custom_padding=\"10px||||false|false\" global_colors_info=\"{}\" custom_css_main_element_last_edited=\"on|phone\"][et_pb_column type=\"1_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"12px|24px|12px|24px|true|false\" custom_css_main_element=\"||||||\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/pentest_iot.webp\" title_text=\"pentest_iot\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"70%\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" header_4_text_align=\"left\" header_4_text_color=\"#151C4B\" header_4_line_height=\"1.2em\" custom_margin=\"||5px||false|false\" global_colors_info=\"{}\"]<\/p><h4 class=\"n-heading-secondary u-mb-small\" style=\"text-align: left;\">Ochrona urz\u0105dze\u0144 ko\u0144cowych i\u00a0mobilnych:<\/h4><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text module_class=\"cf_bullet\" _builder_version=\"4.27.4\" _module_preset=\"default\" locked=\"off\" global_colors_info=\"{}\"]<\/p><ul><li>Wykrywanie urz\u0105dze\u0144 pod\u0142\u0105czonych do\u00a0sieci (smartfony, tablety)<\/li><li>Wymuszanie procedur i\u00a0norm bezpiecze\u0144stwa dla sieci korporacyjnych<\/li><li>BYOD (konteneryzacja)<\/li><\/ul><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"12px|24px|12px|24px|true|false\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/scan.webp\" title_text=\"scan\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"70%\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" header_4_text_align=\"left\" header_4_text_color=\"#151C4B\" custom_margin=\"||5px||false|false\" global_colors_info=\"{}\"]<\/p><h4 class=\"n-heading-secondary u-mb-small\" style=\"text-align: left;\">Skaner podatno\u015bci:<\/h4><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" locked=\"off\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text module_class=\"cf_bullet\" _builder_version=\"4.27.4\" _module_preset=\"default\" locked=\"off\" global_colors_info=\"{}\"]<\/p><ul><li>Sieci i\u00a0infrastruktury<\/li><li>Aplikacji<\/li><li>Internet of Things (IoT)<\/li><\/ul><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" custom_padding=\"12px|24px|12px|24px|true|false\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/test_vulnerability.webp\" title_text=\"test_vulnerability\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"70%\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" header_4_text_align=\"left\" header_4_text_color=\"#151C4B\" header_4_line_height=\"1.2em\" custom_margin=\"||5px||false|false\" global_colors_info=\"{}\"]<\/p><h4 class=\"n-heading-secondary u-mb-small\" style=\"text-align: left;\">Systemy monitorowania i\u00a0analizy:<\/h4><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" locked=\"off\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text module_class=\"cf_bullet\" _builder_version=\"4.27.4\" _module_preset=\"default\" locked=\"off\" global_colors_info=\"{}\"]<\/p><ul><li>SIEM\/Log Manager\/Analiza Big Data<\/li><li>SOAR (automatyzacja i\u00a0organizacja SOC - Security Operation Center)<\/li><li>Symulator do\u00a0szkolenia pracownik\u00f3w dzia\u0142\u00f3w cyberbezpiecze\u0144stwa<\/li><\/ul><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" disabled_on=\"off|off|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#151C4B\" overflow-x=\"hidden\" overflow-y=\"hidden\" custom_margin=\"||0px||false|false\" custom_padding=\"||0px||false|false\" da_disable_devices=\"off|off|off\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row _builder_version=\"4.16\" custom_padding=\"|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" admin_label=\"Column\" _builder_version=\"4.16\" custom_padding=\"|||\" global_colors_info=\"{}\" custom_padding__hover=\"|||\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|700|||||||\" header_2_text_color=\"#FFFFFF\" header_3_text_align=\"center\" header_3_text_color=\"#151C4B\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h2 style=\"text-align: center;\">Dodatkowe us\u0142ugi konsultingowe<\/h2><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"10%\" module_alignment=\"center\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row make_equal=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"90%\" max_width=\"1220px\" custom_padding=\"||||false|false\" animation_style=\"fade\" custom_css_free_form=\".divilife-3-col-feature-blurb-slider .slick-prev:before { || content: '%9234'; ||}||.divilife-3-col-feature-blurb-slider .slick-next:before { || content: '%9235'; ||} \" global_colors_info=\"{}\" custom_css_main_element_last_edited=\"on|phone\"][et_pb_column type=\"4_4\" module_class=\"divilife-3-col-feature-blurb-slider\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_css_main_element=\"display: flex;||flex-direction: column;\" global_colors_info=\"{}\"][et_pb_blurb title=\"Konsultacje:\" image=\"https:\/\/cyberforces.com\/wp-content\/uploads\/consulting.webp\" image_icon_width=\"150px\" content_max_width=\"100%\" _builder_version=\"4.27.4\" _module_preset=\"default\" header_text_align=\"center\" header_text_color=\"#151C4B\" header_font_size=\"1em\" body_text_align=\"center\" body_text_color=\"#485060\" body_font_size=\"1.2em\" background_color=\"#FFFFFF\" width=\"90%\" max_width=\"350px\" module_alignment=\"center\" custom_margin=\"||||true|true\" custom_padding=\"25px|25px|25px|25px|true|true\" hover_enabled=\"0\" custom_css_main_element=\" flex: 1;\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" min_height=\"440px\" sticky_enabled=\"0\"]<\/p><div class=\"cf_scroll_card\"><ul><li>Analiza wst\u0119pna i\u00a0okre\u015blenie zakresu wsp\u00f3\u0142pracy<\/li><\/ul><\/div><p>[\/et_pb_blurb][et_pb_blurb title=\"Przegl\u0105d system\u00f3w bezpiecze\u0144stwa:\" image=\"https:\/\/cyberforces.com\/wp-content\/uploads\/osint_2.webp\" image_icon_width=\"150px\" content_max_width=\"100%\" _builder_version=\"4.27.4\" _module_preset=\"default\" header_text_align=\"center\" header_text_color=\"#151C4B\" header_font_size=\"1em\" header_line_height=\"1.2em\" body_text_align=\"center\" body_text_color=\"#485060\" body_font_size=\"1.2em\" background_color=\"#FFFFFF\" width=\"90%\" max_width=\"350px\" module_alignment=\"center\" custom_margin=\"||||true|true\" custom_padding=\"25px|25px|25px|25px|true|true\" hover_enabled=\"0\" custom_css_main_element=\" flex: 1;\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" min_height=\"440px\" sticky_enabled=\"0\"]<\/p><div class=\"cf_scroll_card\"><ul><li style=\"text-align: center;\">Analiza poprawno\u015bci konfiguracji system\u00f3w i\u00a0urz\u0105dze\u0144<\/li><li style=\"text-align: center;\">Testy penetracyjne (zewn\u0119trzne i\u00a0wewn\u0119trzne) w\u00a0celu wykrycia podatno\u015bci<\/li><\/ul><\/div><p>[\/et_pb_blurb][et_pb_blurb title=\"Projektowanie architektury bezpiecze\u0144stwa:\" image=\"https:\/\/cyberforces.com\/wp-content\/uploads\/process.webp\" image_icon_width=\"150px\" content_max_width=\"100%\" _builder_version=\"4.27.4\" _module_preset=\"default\" header_text_align=\"center\" header_text_color=\"#151C4B\" header_font_size=\"1em\" header_line_height=\"1.2em\" body_text_align=\"center\" body_text_color=\"#485060\" body_font_size=\"1.2em\" background_color=\"#FFFFFF\" width=\"90%\" max_width=\"350px\" module_alignment=\"center\" custom_margin=\"||||true|true\" custom_padding=\"25px|25px|25px|25px|true|true\" hover_enabled=\"0\" custom_css_main_element=\" flex: 1;\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" min_height=\"440px\" sticky_enabled=\"0\"]<\/p><div class=\"cf_scroll_card\"><ul><li>Rekomendacje strategii i\u00a0priorytet\u00f3w dzia\u0142a\u0144 krytycznych<\/li><\/ul><\/div><p>[\/et_pb_blurb][et_pb_blurb title=\"Wdro\u017cenia:\" image=\"https:\/\/cyberforces.com\/wp-content\/uploads\/network_communication.webp\" image_icon_width=\"150px\" content_max_width=\"100%\" _builder_version=\"4.27.4\" _module_preset=\"default\" header_text_align=\"center\" header_text_color=\"#151C4B\" header_font_size=\"1em\" body_text_align=\"center\" body_text_color=\"#485060\" body_font_size=\"1.2em\" background_color=\"#FFFFFF\" width=\"90%\" max_width=\"350px\" module_alignment=\"center\" custom_margin=\"||||true|true\" custom_padding=\"25px|25px|25px|25px|true|true\" hover_enabled=\"0\" custom_css_main_element=\" flex: 1;\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" min_height=\"440px\" sticky_enabled=\"0\"]<\/p><div class=\"cf_scroll_card\"><ul><li>Implementacja narz\u0119dzi i\u00a0usprawnie\u0144 zgodnie z\u00a0ustalonym harmonogramem<\/li><\/ul><\/div><p>[\/et_pb_blurb][et_pb_blurb title=\"Wsparcie i\u00a0szkolenia:\" image=\"https:\/\/cyberforces.com\/wp-content\/uploads\/quality.webp\" image_icon_width=\"150px\" content_max_width=\"100%\" _builder_version=\"4.27.4\" _module_preset=\"default\" header_text_align=\"center\" header_text_color=\"#151C4B\" header_font_size=\"1em\" body_text_align=\"center\" body_text_color=\"#485060\" body_font_size=\"1.2em\" background_color=\"#FFFFFF\" width=\"90%\" max_width=\"350px\" module_alignment=\"center\" custom_margin=\"||||true|true\" custom_padding=\"25px|25px|25px|25px|true|true\" hover_enabled=\"0\" custom_css_free_form=\"||\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" min_height=\"440px\" sticky_enabled=\"0\"]<\/p><div class=\"cf_scroll_card\"><ul><li>Bie\u017c\u0105ce wsparcie na\u00a0podstawie um\u00f3w<\/li><li>Szkolenia specjalistyczne dla IT i\u00a0cyberbezpiecze\u0144stwa<\/li><li>Podnoszenie \u015bwiadomo\u015bci pracownik\u00f3w<\/li><\/ul><\/div><p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_code admin_label=\"Custom CSS & JS\" _builder_version=\"4.27.4\" _module_preset=\"default\" min_height=\"40px\" global_colors_info=\"{}\"]<\/p><p><style><!-- [et_pb_line_break_holder] -->.slick-slider {<!-- [et_pb_line_break_holder] -->  -webkit-user-select: none;<!-- [et_pb_line_break_holder] -->  -moz-user-select: none;<!-- [et_pb_line_break_holder] -->  -ms-user-select: none;<!-- [et_pb_line_break_holder] -->  user-select: none;<!-- [et_pb_line_break_holder] -->  -webkit-touch-callout: none;<!-- [et_pb_line_break_holder] -->  -khtml-user-select: none;<!-- [et_pb_line_break_holder] -->  ms-touch-action: pan-y;<!-- [et_pb_line_break_holder] -->  touch-action: pan-y;<!-- [et_pb_line_break_holder] -->  -webkit-tap-highlight-color: transparent;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.slick-list {<!-- [et_pb_line_break_holder] -->  position: relative;<!-- [et_pb_line_break_holder] -->  display: block;<!-- [et_pb_line_break_holder] -->  overflow-x: hidden;<!-- [et_pb_line_break_holder] -->  margin: 0 0 50px 0;<!-- [et_pb_line_break_holder] -->  padding: 0 0 0px;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->.slick-track:before, .slick-track:after {<!-- [et_pb_line_break_holder] -->  display: table;<!-- [et_pb_line_break_holder] -->  content: '';<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->.slick-slide {<!-- [et_pb_line_break_holder] -->  position: relative;<!-- [et_pb_line_break_holder] -->  float: left;<!-- [et_pb_line_break_holder] -->  height: 100%;<!-- [et_pb_line_break_holder] -->  display: flex;<!-- [et_pb_line_break_holder] -->  align-items: stretch;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-arrow, .divilife-3-col-feature-blurb-slider .slick-arrow:hover, .divilife-3-col-feature-blurb-slider .slick-arrow:focus {<!-- [et_pb_line_break_holder] -->position: absolute;<!-- [et_pb_line_break_holder] -->font-size: 0;<!-- [et_pb_line_break_holder] -->line-height: 0;<!-- [et_pb_line_break_holder] -->padding: 0;<!-- [et_pb_line_break_holder] -->color: transparent;<!-- [et_pb_line_break_holder] -->outline: none;<!-- [et_pb_line_break_holder] -->background: #DADBE2;<!-- [et_pb_line_break_holder] -->border: none;<!-- [et_pb_line_break_holder] -->cursor: pointer;<!-- [et_pb_line_break_holder] -->top: 50%;<!-- [et_pb_line_break_holder] -->transform: translateY(-50%);<!-- [et_pb_line_break_holder] -->z-index: 100;<!-- [et_pb_line_break_holder] -->height: 50px;<!-- [et_pb_line_break_holder] -->vertical-align: middle;<!-- [et_pb_line_break_holder] -->border-radius: 50%;<!-- [et_pb_line_break_holder] -->width: 50px;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-prev { left: -60px; }<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-next { right: -60px; }<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-arrow:before {<!-- [et_pb_line_break_holder] -->font-family: ETmodules;<!-- [et_pb_line_break_holder] -->background: transparent;<!-- [et_pb_line_break_holder] -->opacity: 1;<!-- [et_pb_line_break_holder] -->font-size: 46px;<!-- [et_pb_line_break_holder] -->vertical-align: middle;<!-- [et_pb_line_break_holder] -->color: #151c4b;<!-- [et_pb_line_break_holder] -->text-align: center;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-arrow:hover:before { opacity: 0.8; }<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-prev:before { content: '\\34'; }<!-- [et_pb_line_break_holder] -->.divilife-3-col-feature-blurb-slider .slick-next:before { content: '\\35'; } <!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->.entry-content ul.slick-dots {<!-- [et_pb_line_break_holder] -->  position: absolute;<!-- [et_pb_line_break_holder] -->  bottom: 0;<!-- [et_pb_line_break_holder] -->  \/*display: block;*\/<!-- [et_pb_line_break_holder] -->\tdisplay: none;<!-- [et_pb_line_break_holder] -->  width: 100%;<!-- [et_pb_line_break_holder] -->  padding: 0;<!-- [et_pb_line_break_holder] -->  margin: 0;<!-- [et_pb_line_break_holder] -->  list-style: none;<!-- [et_pb_line_break_holder] -->  text-align: center;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.slick-dots li {<!-- [et_pb_line_break_holder] -->  position: relative;<!-- [et_pb_line_break_holder] -->  \/*display: inline-block;*\/<!-- [et_pb_line_break_holder] -->\tdisplay: none !important;<!-- [et_pb_line_break_holder] -->  margin: 0 5px;<!-- [et_pb_line_break_holder] -->  padding: 0;<!-- [et_pb_line_break_holder] -->  cursor: pointer;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.slick-dots li button {<!-- [et_pb_line_break_holder] -->\tfont-size: 0;<!-- [et_pb_line_break_holder] -->\tline-height: 0;<!-- [et_pb_line_break_holder] -->\t\/*display: block;*\/<!-- [et_pb_line_break_holder] -->  display: none !important;<!-- [et_pb_line_break_holder] -->\twidth: 10px;<!-- [et_pb_line_break_holder] -->\theight: 10px;<!-- [et_pb_line_break_holder] -->\tpadding: 0;<!-- [et_pb_line_break_holder] -->\tcursor: pointer;<!-- [et_pb_line_break_holder] -->\tcolor: transparent;<!-- [et_pb_line_break_holder] -->\tborder: 0;<!-- [et_pb_line_break_holder] -->\toutline: none;<!-- [et_pb_line_break_holder] -->\tbackground-color: #DADBE2;<!-- [et_pb_line_break_holder] -->  border-radius: 10px;<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->.slick-dots li.slick-active button { <!-- [et_pb_line_break_holder] -->  display: none !important;<!-- [et_pb_line_break_holder] -->  background-color: #B01E30; <!-- [et_pb_line_break_holder] -->  }<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] -->@media(max-width: 981px) {<!-- [et_pb_line_break_holder] -->\t.divilife-3-col-feature-blurb-slider .slick-prev { left: -32px; }<!-- [et_pb_line_break_holder] -->\t.divilife-3-col-feature-blurb-slider .slick-next { right: -30px; }<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->@media(max-width: 499px) {<!-- [et_pb_line_break_holder] -->\t.divilife-3-col-feature-blurb-slider .slick-prev { left: -26px; }<!-- [et_pb_line_break_holder] -->\t.divilife-3-col-feature-blurb-slider .slick-next { right: -24px; }<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->  <!-- [et_pb_line_break_holder] --><\/style><\/p><p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/slick-carousel\/1.6.0\/slick.js\"><\/script><!-- [et_pb_line_break_holder] --><script><!-- [et_pb_line_break_holder] -->jQuery(document).ready(function() {<!-- [et_pb_line_break_holder] -->\tjQuery('.divilife-3-col-feature-blurb-slider').slick({<!-- [et_pb_line_break_holder] -->    dots: true,<!-- [et_pb_line_break_holder] -->    slidesToShow: 3,<!-- [et_pb_line_break_holder] -->    slidesToScroll: 1,<!-- [et_pb_line_break_holder] -->    responsive: [<!-- [et_pb_line_break_holder] -->      {<!-- [et_pb_line_break_holder] -->        breakpoint: 1100,<!-- [et_pb_line_break_holder] -->        settings: {<!-- [et_pb_line_break_holder] -->          slidesToShow: 2<!-- [et_pb_line_break_holder] -->        }<!-- [et_pb_line_break_holder] -->      },<!-- [et_pb_line_break_holder] -->      {<!-- [et_pb_line_break_holder] -->        breakpoint: 767,<!-- [et_pb_line_break_holder] -->        settings: {<!-- [et_pb_line_break_holder] -->          slidesToShow: 1<!-- [et_pb_line_break_holder] -->        }<!-- [et_pb_line_break_holder] -->      }<!-- [et_pb_line_break_holder] -->    ]<!-- [et_pb_line_break_holder] -->  }); <!-- [et_pb_line_break_holder] -->});<!-- [et_pb_line_break_holder] --><\/script>[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#EDF2FA\" da_disable_devices=\"off|off|off\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|700|||||||\" header_2_text_color=\"#151C4B\" header_3_text_align=\"center\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h2 style=\"text-align: center;\">Kluczowe sektory i\u00a0zastosowania<\/h2><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"10%\" module_alignment=\"center\" custom_margin=\"||||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"1\" make_equal=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"#FFFFFF\" width=\"100%\" width_tablet=\"90%\" width_phone=\"90%\" width_last_edited=\"on|tablet\" custom_margin=\"||||false|false\" custom_padding=\"0px||0px||false|false\" custom_css_main_element=\"display: flex;||align-items: center;\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\" custom_css_main_element_last_edited=\"on|phone\" custom_css_main_element_phone=\"flex-direction: column;\" custom_css_main_element_tablet=\"display: flex;||align-items: center;\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"24px|||48px|false|false\" custom_padding_tablet=\"24px|||48px|false|false\" custom_padding_phone=\"24px|24px||24px|false|false\" custom_padding_last_edited=\"on|phone\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|700|||||||\" header_2_text_color=\"#151C4B\" header_3_text_align=\"center\" header_3_text_color=\"#151C4B\" custom_margin=\"||||false|false\" custom_padding=\"||||false|false\" locked=\"off\" global_colors_info=\"{}\"]<\/p><h3 style=\"text-align: left;\">Nasze rozwi\u0105zania znajduj\u0105 zastosowanie w:<\/h3><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"25%\" module_alignment=\"left\" custom_margin=\"||||false|false\" locked=\"off\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text module_class=\"cf_bullet\" _builder_version=\"4.27.4\" _module_preset=\"default\" text_text_color=\"#485060\" text_font_size=\"1.2em\" text_line_height=\"1.2em\" locked=\"off\" global_colors_info=\"{}\"]<\/p><ul><li>Zdrowiu publicznym<\/li><li>Instytucjach ubezpieczeniowych i\u00a0finansowych<\/li><li>Energetyce<\/li><li>Transporcie<\/li><li>Operatorach telekomunikacyjnych<\/li><li>Resortach si\u0142owych<\/li><li>Instytucjach centralnych oraz\u00a0rz\u0105dowych<\/li><\/ul><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/cf_team.webp\" title_text=\"cf_team\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_font=\"Nunito Sans|700|||||||\" text_text_color=\"#FFFFFF\" text_font_size=\"1.2em\" header_2_font=\"|--et_global_heading_font_weight|||||||\" header_2_text_color=\"#151C4B\" header_3_font=\"|--et_global_heading_font_weight|||||||\" header_3_text_color=\"#151C4B\" header_4_text_color=\"#151C4B\" header_4_font_size=\"1em\" header_4_line_height=\"1.2em\" use_background_color_gradient=\"on\" background_color_gradient_direction=\"45deg\" background_color_gradient_stops=\"#b01e30 0%|#151c4b 100%\" custom_margin=\"||5px||false|false\" custom_padding=\"12px|24px|12px|24px|true|true\" border_radii=\"on|10px|10px|10px|10px\" box_shadow_style=\"preset1\" box_shadow_blur=\"10px\" global_colors_info=\"{}\"]<\/p><p style=\"text-align: center;\">U\u00a0naszych klient\u00f3w wdro\u017cyli\u015bmy rozwi\u0105zania z\u00a0zakresu cyberbezpiecze\u0144stwa aplikacji, system\u00f3w, endpoint\u00f3w oraz\u00a0ochrony infrastruktury krytycznej (SCADA, IoT).<\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"on|on|on\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"20px||||false|false\" disabled=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|700|||||||\" header_2_text_color=\"#151C4B\" header_3_text_align=\"center\" header_4_font=\"|||on|||||\" header_4_text_color=\"#485060\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h4 style=\"text-align: center;\">Wsp\u00f3\u0142praca z\u00a0liderami bran\u017cy<\/h4><p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" header_2_font=\"|700|||||||\" header_2_text_color=\"#151C4B\" header_3_text_align=\"center\" custom_margin=\"||10px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"]<\/p><h2 style=\"text-align: center;\">Partnerzy technologiczni:<\/h2><p>[\/et_pb_text][et_pb_divider color=\"#B01E30\" divider_weight=\"5px\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"10%\" module_alignment=\"center\" custom_margin=\"||0px||false|false\" custom_padding=\"||||false|false\" global_colors_info=\"{}\"][\/et_pb_divider][ba_image_carousel content_alignment=\"center\" slide_count=\"5\" carousel_spacing_top=\"20px\" carousel_spacing_bottom=\"20px\" nav_height=\"48px\" nav_width=\"48px\" nav_color=\"#151C4B\" nav_bg=\"#FFFFFF\" nav_border_color=\"RGBA(255,255,255,0)\" icon_left=\"\uf104||fa||900\" icon_right=\"\uf105||fa||900\" pagi_bg=\"#151C4B\" slide_count_tablet=\"5\" slide_count_phone=\"1\" slide_count_last_edited=\"on|phone\" _builder_version=\"4.27.4\" _module_preset=\"default\" title_font_size=\"1.5em\" subtitle_line_height=\"1.2em\" global_colors_info=\"{}\"][ba_image_carousel_child photo=\"https:\/\/cyberforces.com\/wp-content\/uploads\/partners_1.webp\" title=\"Check Point Software Technologies \" sub_title=\"lider w\u00a0obszarze firewalli i\u00a0ochrony sieci\" _builder_version=\"4.27.4\" title_level=\"h3\" title_text_color=\"#151C4B\" subtitle_level=\"h5\" subtitle_font=\"|--et_global_heading_font_weight|||||||\" subtitle_text_color=\"#485060\" subtitle_font_size=\"1em\" title_text_shadow_color=\"RGBA(255,255,255,0)\" global_colors_info=\"{}\"][\/ba_image_carousel_child][ba_image_carousel_child photo=\"https:\/\/cyberforces.com\/wp-content\/uploads\/partners_2.webp\" title=\"Cisco Systems\" sub_title=\"rozwi\u0105zania sieciowe i\u00a0teleinformatyczne\" _builder_version=\"4.27.4\" title_level=\"h3\" title_text_color=\"#151C4B\" subtitle_level=\"h5\" subtitle_font=\"|--et_global_heading_font_weight|||||||\" subtitle_text_color=\"#485060\" subtitle_font_size=\"1em\" title_text_shadow_color=\"RGBA(255,255,255,0)\" global_colors_info=\"{}\"][\/ba_image_carousel_child][ba_image_carousel_child photo=\"https:\/\/cyberforces.com\/wp-content\/uploads\/partners_3.webp\" title=\"Palo Alto Networks\" sub_title=\"zaawansowane systemy ochrony przed\u00a0cyberzagro\u017ceniami\" _builder_version=\"4.27.4\" title_level=\"h3\" title_text_color=\"#151C4B\" subtitle_level=\"h5\" subtitle_font=\"|--et_global_heading_font_weight|||||||\" subtitle_text_color=\"#485060\" subtitle_font_size=\"1em\" title_text_shadow_color=\"RGBA(255,255,255,0)\" global_colors_info=\"{}\"][\/ba_image_carousel_child][ba_image_carousel_child photo=\"https:\/\/cyberforces.com\/wp-content\/uploads\/partners_4.webp\" title=\"F5 Networks\" sub_title=\"zabezpieczenia aplikacji korporacyjnych\" _builder_version=\"4.27.4\" title_level=\"h3\" title_text_color=\"#151C4B\" subtitle_level=\"h5\" subtitle_font=\"|--et_global_heading_font_weight|||||||\" subtitle_text_color=\"#485060\" subtitle_font_size=\"1em\" title_text_shadow_color=\"RGBA(255,255,255,0)\" global_colors_info=\"{}\"][\/ba_image_carousel_child][ba_image_carousel_child photo=\"https:\/\/cyberforces.com\/wp-content\/uploads\/partners_5.webp\" title=\"Fidelis Cybersecurity\" sub_title=\"wykrywanie zagro\u017ce\u0144 i\u00a0threat hunting\" _builder_version=\"4.27.4\" title_level=\"h3\" title_text_color=\"#151C4B\" subtitle_level=\"h5\" subtitle_font=\"|--et_global_heading_font_weight|||||||\" subtitle_text_color=\"#485060\" subtitle_font_size=\"1em\" title_text_shadow_color=\"RGBA(255,255,255,0)\" global_colors_info=\"{}\"][\/ba_image_carousel_child][ba_image_carousel_child photo=\"https:\/\/cyberforces.com\/wp-content\/uploads\/partners_6.webp\" title=\"Forcepoint\" sub_title=\"systemy DLP i\u00a0ochrona danych\" _builder_version=\"4.27.4\" title_level=\"h3\" title_text_color=\"#151C4B\" subtitle_level=\"h5\" subtitle_font=\"|--et_global_heading_font_weight|||||||\" subtitle_text_color=\"#485060\" subtitle_font_size=\"1em\" title_text_shadow_color=\"RGBA(255,255,255,0)\" global_colors_info=\"{}\"][\/ba_image_carousel_child][ba_image_carousel_child photo=\"https:\/\/cyberforces.com\/wp-content\/uploads\/partners_7.webp\" title=\"Fortinet\" sub_title=\"kompleksowe rozwi\u0105zania cybersecurity\" _builder_version=\"4.27.4\" title_level=\"h3\" title_text_color=\"#151C4B\" subtitle_level=\"h5\" subtitle_font=\"|--et_global_heading_font_weight|||||||\" subtitle_text_color=\"#485060\" subtitle_font_size=\"1em\" title_text_shadow_color=\"RGBA(255,255,255,0)\" global_colors_info=\"{}\"][\/ba_image_carousel_child][ba_image_carousel_child photo=\"https:\/\/cyberforces.com\/wp-content\/uploads\/partners_8.webp\" title=\"Splunk\" sub_title=\"analiza du\u017cych zbior\u00f3w danych\" _builder_version=\"4.27.4\" title_level=\"h3\" title_text_color=\"#151C4B\" subtitle_level=\"h5\" subtitle_font=\"|--et_global_heading_font_weight|||||||\" subtitle_text_color=\"#485060\" subtitle_font_size=\"1em\" title_text_shadow_color=\"RGBA(255,255,255,0)\" global_colors_info=\"{}\"][\/ba_image_carousel_child][ba_image_carousel_child photo=\"https:\/\/cyberforces.com\/wp-content\/uploads\/partners_9.webp\" title=\"Wallix\" sub_title=\"zarz\u0105dzanie kontami uprzywilejowanymi (PAM)\" _builder_version=\"4.27.4\" title_level=\"h3\" title_text_color=\"#151C4B\" subtitle_level=\"h5\" subtitle_font=\"|--et_global_heading_font_weight|||||||\" subtitle_text_color=\"#485060\" subtitle_font_size=\"1em\" title_text_shadow_color=\"RGBA(255,255,255,0)\" global_colors_info=\"{}\"][\/ba_image_carousel_child][\/ba_image_carousel][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-252787","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Products - CyberForces<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforces.com\/en\/products\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Products - CyberForces\" \/>\n<meta property=\"og:description\" content=\"System and network cybersecurityWe specialize in system and network cybersecurity, combining advanced technical expertise with years of experience in protecting digital assets. We cooperate with leading cybersecurity vendors and provide strategic support to organizations in the financial, governmental, telecommunications, and industrial sectors.Scope of ServicesNetwork Infrastructure Protection: Next Generation Firewall (advanced hardware-based firewall) Load Balancer (network [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforces.com\/en\/products\" \/>\n<meta property=\"og:site_name\" content=\"CyberForces\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-25T14:24:51+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberforces.com\/en\/products\",\"url\":\"https:\/\/cyberforces.com\/en\/products\",\"name\":\"Products - CyberForces\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/#website\"},\"datePublished\":\"2025-05-25T14:24:44+00:00\",\"dateModified\":\"2025-05-25T14:24:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberforces.com\/en\/products#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberforces.com\/en\/products\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberforces.com\/en\/products#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/cyberforces.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberforces.com\/#website\",\"url\":\"https:\/\/cyberforces.com\/\",\"name\":\"CyberForces\",\"description\":\"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!\",\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberforces.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberforces.com\/#organization\",\"name\":\"TestArmy Group S. A.\",\"url\":\"https:\/\/cyberforces.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"width\":1210,\"height\":173,\"caption\":\"TestArmy Group S. A.\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\",\"https:\/\/www.linkedin.com\/company\/cyberforcescom\/\",\"https:\/\/www.instagram.com\/cyberforces__\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Products - CyberForces","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforces.com\/en\/products","og_locale":"en_US","og_type":"article","og_title":"Products - CyberForces","og_description":"System and network cybersecurityWe specialize in system and network cybersecurity, combining advanced technical expertise with years of experience in protecting digital assets. We cooperate with leading cybersecurity vendors and provide strategic support to organizations in the financial, governmental, telecommunications, and industrial sectors.Scope of ServicesNetwork Infrastructure Protection: Next Generation Firewall (advanced hardware-based firewall) Load Balancer (network [&hellip;]","og_url":"https:\/\/cyberforces.com\/en\/products","og_site_name":"CyberForces","article_publisher":"https:\/\/www.facebook.com\/TestArmyCyberForces\/","article_modified_time":"2025-05-25T14:24:51+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberforces.com\/en\/products","url":"https:\/\/cyberforces.com\/en\/products","name":"Products - CyberForces","isPartOf":{"@id":"https:\/\/cyberforces.com\/#website"},"datePublished":"2025-05-25T14:24:44+00:00","dateModified":"2025-05-25T14:24:51+00:00","breadcrumb":{"@id":"https:\/\/cyberforces.com\/en\/products#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforces.com\/en\/products"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforces.com\/en\/products#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/cyberforces.com\/"},{"@type":"ListItem","position":2,"name":"Products"}]},{"@type":"WebSite","@id":"https:\/\/cyberforces.com\/#website","url":"https:\/\/cyberforces.com\/","name":"CyberForces","description":"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!","publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforces.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberforces.com\/#organization","name":"TestArmy Group S. A.","url":"https:\/\/cyberforces.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","width":1210,"height":173,"caption":"TestArmy Group S. A."},"image":{"@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TestArmyCyberForces\/","https:\/\/www.linkedin.com\/company\/cyberforcescom\/","https:\/\/www.instagram.com\/cyberforces__"]}]}},"_links":{"self":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/pages\/252787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/comments?post=252787"}],"version-history":[{"count":5,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/pages\/252787\/revisions"}],"predecessor-version":[{"id":252794,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/pages\/252787\/revisions\/252794"}],"wp:attachment":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media?parent=252787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}