{"id":2847,"date":"2020-01-02T06:50:26","date_gmt":"2020-01-02T06:50:26","guid":{"rendered":"https:\/\/ecs-et.com\/?page_id=2847"},"modified":"2020-05-11T18:19:57","modified_gmt":"2020-05-11T18:19:57","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/ecs-et.com\/am\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"ba-empty-space \" style=\"\"><div class=\"ba_empty_space_lg\"  style=\"height: 40px\"><\/div><div class=\"ba_empty_space_md\"  style=\"height: 40px\"><\/div><div class=\"ba_empty_space_xs\"  style=\"height: 40px\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class='delaware-section-title  delaware_title-type-1 row' >\r\n\t\t\t\t<h2 class='col-xs-12 col-sm-5 title no-underline' style=''>ECS ETHIOPIA CYBER SERVICES &amp; SOLUTIONS<\/h2>\r\n\t\t\t\t<div class=\"col-xs-12 col-sm-7 desc\"><p><span style=\"font-weight: 400; color: #000000;\">ECS Ethiopia provides Ethiopia\u2019s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.<\/span><\/p>\n<p><span style=\"font-weight: 400; color: #000000;\">ECS Ethiopia, together with experienced Israeli and European companies and experts, offers customized cyber services and solutions based on specific needs of its customers. The services include a detailed Cyber Risk Assessment, consulting on various areas, professional training, and integration of specific solutions\/products.<\/span><\/p>\n<\/div> \r\n\t\t\t<\/div><div class=\"ba-empty-space \" style=\"\"><div class=\"ba_empty_space_lg\"  style=\"height: 40px\"><\/div><div class=\"ba_empty_space_md\"  style=\"height: 40px\"><\/div><div class=\"ba_empty_space_xs\"  style=\"height: 40px\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1577967733168 vc_row-has-fill\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 36px;color: #ffffff;line-height: 36px;text-align: center\" class=\"vc_custom_heading vc_custom_1577962739974\" ><a href=\"\">CONSULTING<\/a><\/h2><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 25px;color: #ffffff;line-height: 30px;text-align: center\" class=\"vc_custom_heading\" ><a href=\"https:\/\/ecs-et.com\/soc-and-soar\/\">SOC and SOAR Services<\/a><\/h2>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">A unified process that combines prevention, detection, analysis, and response functions to streamline threat remediation and create immense ROI<\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container vc_btn3-center vc_custom_1578225801257\" >\n\t<a onmouseleave=\"this.style.borderColor='#ffffff'; this.style.backgroundColor='transparent'; this.style.color='#ffffff'\" onmouseenter=\"this.style.borderColor='#ec262b'; this.style.backgroundColor='#ec262b'; this.style.color='#ffffff';\" style=\"border-color:#ffffff; color:#ffffff;\" class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-round vc_btn3-style-outline-custom vc_btn3-block\" href=\"https:\/\/ecs-et.com\/soc-and-soar\/\" title=\"\">Learn More<\/a><\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 25px;color: #ffffff;line-height: 30px;text-align: center\" class=\"vc_custom_heading\" ><a href=\"https:\/\/ecs-et.com\/pci-dss-compliance-services\/\">PCI DSS Compliance Services<\/a><\/h2>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">On-site PCI DSS assessments that validate compliance, streamline ongoing compliance maintenance, mitigate risk and improve business performance<\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container vc_btn3-center vc_custom_1578225849446\" >\n\t<a onmouseleave=\"this.style.borderColor='#ffffff'; this.style.backgroundColor='transparent'; this.style.color='#ffffff'\" onmouseenter=\"this.style.borderColor='#ec262b'; this.style.backgroundColor='#ec262b'; this.style.color='#ffffff';\" style=\"border-color:#ffffff; color:#ffffff;\" class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-round vc_btn3-style-outline-custom vc_btn3-block\" href=\"https:\/\/ecs-et.com\/pci-dss-compliance-services\/\" title=\"\">Learn More<\/a><\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 25px;color: #ffffff;line-height: 30px;text-align: center\" class=\"vc_custom_heading\" ><a href=\"https:\/\/ecs-et.com\/security-awareness-services\/\">Security Awareness Services<\/a><\/h2>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">&nbsp;<span style=\"color: #ffffff;\">We provide tailor-made security awareness and training programs for leading organizations, complemented by effective training delivery methods<\/span><\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container vc_btn3-center vc_custom_1578225864924\" >\n\t<a onmouseleave=\"this.style.borderColor='#ffffff'; this.style.backgroundColor='transparent'; this.style.color='#ffffff'\" onmouseenter=\"this.style.borderColor='#ec262b'; this.style.backgroundColor='#ec262b'; this.style.color='#ffffff';\" style=\"border-color:#ffffff; color:#ffffff;\" class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-round vc_btn3-style-outline-custom vc_btn3-block\" href=\"https:\/\/ecs-et.com\/security-awareness-services\/\" title=\"\">Learn More<\/a><\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 25px;color: #ffffff;line-height: 30px;text-align: center\" class=\"vc_custom_heading\" ><a href=\"https:\/\/ecs-et.com\/other-services\/\">Other Services<\/a><\/h2>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">&nbsp;<span style=\"color: #ffffff;\">Security Risk Assessment and Management, compliance and governance, threat modeling, vulnerability management, information security audit, social engineering.<\/span><\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container vc_btn3-center vc_custom_1578225877387\" >\n\t<a onmouseleave=\"this.style.borderColor='#ffffff'; this.style.backgroundColor='transparent'; this.style.color='#ffffff'\" onmouseenter=\"this.style.borderColor='#ec262b'; this.style.backgroundColor='#ec262b'; this.style.color='#ffffff';\" style=\"border-color:#ffffff; color:#ffffff;\" class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-round vc_btn3-style-outline-custom vc_btn3-block\" href=\"https:\/\/ecs-et.com\/other-services\/\" title=\"\">Learn More<\/a><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1577962443962\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid centr\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 36px;color: #222222;line-height: 36px;text-align: center\" class=\"vc_custom_heading vc_custom_1577963370343\" ><a href=\"\">TRAINING<\/a><\/h2><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_gallery wpb_content_element vc_clearfix\" ><div class=\"wpb_wrapper\"><div class=\"wpb_gallery_slides wpb_flexslider flexslider_fade flexslider\" data-interval=\"3\" data-flex_fx=\"fade\"><ul class=\"slides\"><li><a class=\"prettyphoto\" href=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/IMG_20191214_162826-1024x768.jpg\" data-rel=\"prettyPhoto[rel-2847-871626728]\"><img fetchpriority=\"high\" decoding=\"async\" class=\"\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/IMG_20191214_162826-500x500.jpg\" width=\"500\" height=\"500\" alt=\"IMG_20191214_162826\" title=\"IMG_20191214_162826\" \/><\/a><\/li><li><a class=\"prettyphoto\" href=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2019\/10\/WhatsApp-Image-2019-12-20-at-15.05.14-1024x768.jpeg\" data-rel=\"prettyPhoto[rel-2847-871626728]\"><img decoding=\"async\" class=\"\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2019\/10\/WhatsApp-Image-2019-12-20-at-15.05.14-500x500.jpeg\" width=\"500\" height=\"500\" alt=\"WhatsApp Image 2019-12-20 at 15.05.14\" title=\"WhatsApp Image 2019-12-20 at 15.05.14\" \/><\/a><\/li><li><a class=\"prettyphoto\" href=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2019\/10\/IMG_20191217_085632-1024x768.jpg\" data-rel=\"prettyPhoto[rel-2847-871626728]\"><img decoding=\"async\" class=\"\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2019\/10\/IMG_20191217_085632-500x500.jpg\" width=\"500\" height=\"500\" alt=\"IMG_20191217_085632\" title=\"IMG_20191217_085632\" \/><\/a><\/li><li><a class=\"prettyphoto\" href=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2019\/03\/d312e1d2-40ee-427f-8988-3cafc575b9af-1024x680.jpg\" data-rel=\"prettyPhoto[rel-2847-871626728]\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2019\/03\/d312e1d2-40ee-427f-8988-3cafc575b9af-500x500.jpg\" width=\"500\" height=\"500\" alt=\"d312e1d2-40ee-427f-8988-3cafc575b9af\" title=\"d312e1d2-40ee-427f-8988-3cafc575b9af\" \/><\/a><\/li><li><a class=\"prettyphoto\" href=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2019\/03\/d2640b97-6c1a-486f-bc09-c407748dd25d-1024x768.jpg\" data-rel=\"prettyPhoto[rel-2847-871626728]\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2019\/03\/d2640b97-6c1a-486f-bc09-c407748dd25d-500x500.jpg\" width=\"500\" height=\"500\" alt=\"d2640b97-6c1a-486f-bc09-c407748dd25d\" title=\"d2640b97-6c1a-486f-bc09-c407748dd25d\" \/><\/a><\/li><li><a class=\"prettyphoto\" href=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2019\/03\/IMG_20190225_082630-e1553670503787-768x1024.jpg\" data-rel=\"prettyPhoto[rel-2847-871626728]\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2019\/03\/IMG_20190225_082630-e1553670503787-500x500.jpg\" width=\"500\" height=\"500\" alt=\"IMG_20190225_082630\" title=\"IMG_20190225_082630\" \/><\/a><\/li><li><a class=\"prettyphoto\" href=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2019\/03\/IMG_20190225_112412-1024x768.jpg\" data-rel=\"prettyPhoto[rel-2847-871626728]\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2019\/03\/IMG_20190225_112412-500x500.jpg\" width=\"500\" height=\"500\" alt=\"IMG_20190225_112412\" title=\"IMG_20190225_112412\" \/><\/a><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\" id=\"training\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 25px;color: #222222;line-height: 30px;text-align: center\" class=\"vc_custom_heading\" ><a href=\"\">(ISC)2 and ISACA Certification<\/a><\/h2>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: center;\">Preparation for a range of international certification exams; CISSP of (ISC)2 and ISACA\u2019s CISM, CRISC, CISA.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container vc_btn3-center vc_custom_1578291067889\" >\n\t<a onmouseleave=\"this.style.borderColor='#111d59'; this.style.backgroundColor='transparent'; this.style.color='#111d59'\" onmouseenter=\"this.style.borderColor='#ec262b'; this.style.backgroundColor='#ec262b'; this.style.color='#ffffff';\" style=\"border-color:#111d59; color:#111d59;\" class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-round vc_btn3-style-outline-custom\" href=\"https:\/\/ecs-et.com\/isc2-and-isaca-certification\/\" title=\"\">Learn More<\/a><\/div>\n<h2 style=\"font-size: 25px;color: #222222;line-height: 30px;text-align: center\" class=\"vc_custom_heading\" ><a href=\"https:\/\/ecs-et.com\/checkmarx-appsec-awareness-solution-cxcodebashing\/\">The Leading Secure Code Training Program<\/a><\/h2>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: center;\">AppSec Awareness Solution (CxCodebashing) by CheckMarx, an online comprehensive tool allowing continuous learning with proven results.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container vc_btn3-center vc_custom_1589217987150\" >\n\t<a onmouseleave=\"this.style.borderColor='#111d59'; this.style.backgroundColor='transparent'; this.style.color='#111d59'\" onmouseenter=\"this.style.borderColor='#ec262b'; this.style.backgroundColor='#ec262b'; this.style.color='#ffffff';\" style=\"border-color:#111d59; color:#111d59;\" class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-round vc_btn3-style-outline-custom\" href=\"https:\/\/ecs-et.com\/checkmarx-appsec-awareness-solution-cxcodebashing\/\" title=\"\">Learn More<\/a><\/div>\n<h2 style=\"font-size: 25px;color: #222222;line-height: 30px;text-align: center\" class=\"vc_custom_heading\" ><a href=\"https:\/\/ecs-et.com\/check-point-certification\/\">Checkpoint Certification CCSA\/CCSE R80.30<\/a><\/h2>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: center;\">Prepare IT and security professionals for the international CCSA\/CCSE exams of cyber market leader Check Point software solutions.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container vc_btn3-center vc_custom_1578229790714\" >\n\t<a onmouseleave=\"this.style.borderColor='#111d59'; this.style.backgroundColor='transparent'; this.style.color='#111d59'\" onmouseenter=\"this.style.borderColor='#ec262b'; this.style.backgroundColor='#ec262b'; this.style.color='#ffffff';\" style=\"border-color:#111d59; color:#111d59;\" class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-round vc_btn3-style-outline-custom\" href=\"https:\/\/ecs-et.com\/check-point-certification\/\" title=\"\">Learn More<\/a><\/div>\n<h2 style=\"font-size: 25px;color: #222222;line-height: 30px;text-align: center\" class=\"vc_custom_heading\" ><a href=\"https:\/\/ecs-et.com\/ciso-certification-program\/\">CISO Certification Program<\/a><\/h2>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: center;\">The most comprehensive training program available for senior information security executives.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container vc_btn3-center vc_custom_1578229783853\" >\n\t<a onmouseleave=\"this.style.borderColor='#111d59'; this.style.backgroundColor='transparent'; this.style.color='#111d59'\" onmouseenter=\"this.style.borderColor='#ec262b'; this.style.backgroundColor='#ec262b'; this.style.color='#ffffff';\" style=\"border-color:#111d59; color:#111d59;\" class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-round vc_btn3-style-outline-custom\" href=\"https:\/\/ecs-et.com\/ciso-certification-program\/\" title=\"\">Learn More<\/a><\/div>\n<h2 style=\"font-size: 25px;color: #222222;line-height: 30px;text-align: center\" class=\"vc_custom_heading\" ><a href=\"\">Tailor Made Trainings<\/a><\/h2>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Tailored training could be provided regarding any specific needs and specialized subjects.<\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1577964485242 vc_row-has-fill\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 36px;color: #222222;line-height: 36px;text-align: center\" class=\"vc_custom_heading vc_custom_1577964498351\" ><a href=\"\">TECHNOLOGY INTEGRATION<\/a><\/h2>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>By utilizing our comprehensive and top-rated cyber-security company portfolio, ECS Ethiopia works with banks and other institutions to integrate advanced technologies and tools within their core business operations. Amongst the solutions:<\/p>\n<ul>\n<li>Application Security Testing<\/li>\n<li>Mobile forensics<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_custom_1578225239407\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cellebrite.com\/en\/home\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" width=\"534\" height=\"100\" class=\"size-full wp-image-2647\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2019\/06\/Cellebrite_logo_2color_pos_rgb-e1561214086595.png\" alt=\"\"><\/a><\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Cellebrite enables investigators to capture insights in today\u2019s complex, digital world. Our digital intelligence platform provides a complete and objective picture of evidence, empowering agencies and investigators to solve and close cases faster than ever<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cellebrite.com\/en\/home\/\" target=\"_blank\" rel=\"noopener noreferrer\">Visit Site<\/a><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element  vc_custom_1577966737443\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.checkmarx.com\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"399\" height=\"100\" class=\"size-full wp-image-2648\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2019\/06\/kisspng-application-security-checkmarx-computer-security-s-checkmarx-5b2094af72b944.5888999015288618714699-e1561214170513.png\" alt=\"\"><\/a><\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Checkmarx is the global leader in software security solutions for modern enterprise software development. Checkmarx delivers the industry\u2019s most comprehensive Software Security Platform that unifies with DevOps and provides static and interactive application security testing, software composition analysis, and developer AppSec awareness and training programs to reduce and remediate risk from software vulnerabilities.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.checkmarx.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Visit Site<\/a><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"ba-empty-space \" style=\"\"><div class=\"ba_empty_space_lg\"  style=\"height: 95px\"><\/div><div class=\"ba_empty_space_md\"  style=\"height: 50px\"><\/div><div class=\"ba_empty_space_xs\"  style=\"height: 50px\"><\/div><\/div><div class='delaware-section-title  delaware_title-type-2 row' >\r\n\t\t\t\t<h2 class='col-xs-12 col-sm-12 text-center title no-underline' style='font-size:36px;'>CONNECT WITH US<\/h2>\r\n\t\t\t\t<div class=\"col-xs-12 col-sm-12 text-center desc\"><div style=\"color: #222; font-size: 18px;\">Please fill out the form and send us a message. We will get back to you within 1-3 business days.<\/div>\n<\/div> \r\n\t\t\t<\/div><div class=\"dl-contact-form-7 form-light \" style=\"\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1168-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"1168\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/am\/wp-json\/wp\/v2\/pages\/2847#wpcf7-f1168-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"1168\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1168-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"dl-form dl-form-2\">\n\t<div class=\"row\">\n\t\t<div class=\"col-md-6\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Full name*\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email Address*\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span><span class=\"wpcf7-form-control-wrap\" data-name=\"your-phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone Number*\" value=\"\" type=\"text\" name=\"your-phone\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t\t<div class=\"col-md-6\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"textarea-445\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" placeholder=\"Message\" name=\"textarea-445\"><\/textarea><\/span><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send Now\" \/>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div><div class=\"ba-empty-space \" style=\"\"><div class=\"ba_empty_space_lg\"  style=\"height: 30px\"><\/div><div class=\"ba_empty_space_md\"  style=\"height: 30px\"><\/div><div class=\"ba_empty_space_xs\"  style=\"height: 30px\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"ECS ETHIOPIA CYBER SERVICES &amp; SOLUTIONS ECS Ethiopia provides Ethiopia\u2019s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to [...]","protected":false},"author":1,"featured_media":2364,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-fullwidth.php","meta":{"footnotes":""},"class_list":["post-2847","page","type-page","status-publish","has-post-thumbnail","hentry",""],"_links":{"self":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/2847","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/comments?post=2847"}],"version-history":[{"count":93,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/2847\/revisions"}],"predecessor-version":[{"id":3720,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/2847\/revisions\/3720"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/media\/2364"}],"wp:attachment":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/media?parent=2847"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}