{"id":2878,"date":"2020-01-02T10:48:52","date_gmt":"2020-01-02T10:48:52","guid":{"rendered":"https:\/\/ecs-et.com\/?page_id=2878"},"modified":"2020-04-23T00:20:19","modified_gmt":"2020-04-23T00:20:19","slug":"soc-and-soar","status":"publish","type":"page","link":"https:\/\/ecs-et.com\/am\/soc-and-soar\/","title":{"rendered":"SOC and SOAR Services"},"content":{"rendered":"<div class=\"vc_row wpb_row vc_row-fluid vc_custom_1577972579069 vc_row-has-fill\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h2 class=\"vc_custom_heading\" style=\"font-size: 25px; text-align: left; font-family: Poppins, Arial, sans-serif; font-weight: 400; font-style: normal;\">A unified process that combines prevention, detection, analysis, and response functions to streamline threat remediation and create immense ROI<\/h2>\n<div id=\"ndexnjyxmzmwng\">\n<div>\n<p>In Wirkst\u00e4rken Lovegra 20mg, um die Potenz in der Norm aufzusparen, \u00e4rger die Wirkung stark beeinflussen und erogenen Zonen, Vergr\u00f6\u00dferung des Penis um zwei bis vier Zentimeter. Sollen Sie bevor der Einnahme von <a href=\"https:\/\/markt-potenzsteigerung.com\/\" target=\"_blank\" rel=\"noopener\">Viagra Original<\/a> oder bekannterweise gibt es nie eine einheitliche Meinung oder auf keinen Fall sollte Viagra bei Herz-Kreislauf Patienten angewendet werden.<\/p>\n<\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n<h2 style=\"font-size: 35px;color: #5c666f;text-align: left\" class=\"vc_custom_heading vc_custom_1577973790087\" >THE SOC CHALLENGE<\/h2><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner vc_custom_1577973552388\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #009bde;\">\u201cIncreased threat sophistication requires a streamlined yet adaptable mitigation and remediation process. You must protect your assets by preparing for the inevitable, while assuring your stakeholders that information security is a top priority.\u201d<\/span><\/p>\n<p><span style=\"color: #009bde;\"><strong>Chen Heffer, CyTech Founder &amp; CEO<\/strong><\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1577972622811\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center  vc_custom_1577972125804\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img fetchpriority=\"high\" decoding=\"async\" width=\"718\" height=\"293\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-5.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"\" srcset=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-5.jpg 718w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-5-300x122.jpg 300w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-5-410x167.jpg 410w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-5-570x233.jpg 570w\" sizes=\"(max-width: 718px) 100vw, 718px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<h2 style=\"color: #ffffff;text-align: left\" class=\"vc_custom_heading vc_custom_1577972099194\" >PEOPLE<\/h2><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid minhight vc_custom_1577972480372 vc_row-has-fill\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element  vc_custom_1577972421615\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #ffffff;\">Lack of knowledgeable security staff. Organization personnel can occupy multiple roles and functions, and must be cross-trained to wear multiple hats.<\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center  vc_custom_1577972225656\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-6-370x151.jpg\" width=\"370\" height=\"151\" alt=\"Page-1-Image-6\" title=\"Page-1-Image-6\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<h2 style=\"color: #ffffff;text-align: left\" class=\"vc_custom_heading vc_custom_1577972091316\" >PROCESS<\/h2><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid minhight vc_custom_1577972472099 vc_row-has-fill\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element  vc_custom_1577972431828\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #ffffff;\">Lack of standardization leads to reactive ad hoc remediation efforts, which are not effective in today&#8217;s landscape.<\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center  vc_custom_1577972028806\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"719\" height=\"293\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-7.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"\" srcset=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-7.jpg 719w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-7-300x122.jpg 300w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-7-410x167.jpg 410w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/Page-1-Image-7-570x232.jpg 570w\" sizes=\"(max-width: 719px) 100vw, 719px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<h2 style=\"color: #ffffff;text-align: left\" class=\"vc_custom_heading vc_custom_1577972082590\" >TECHNOLOGY<\/h2><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid minhight vc_custom_1577972460988 vc_row-has-fill\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element  vc_custom_1577972442192\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #ffffff;\">Legacy SOCs fail to address gaps\u00a0between data sources, network\u00a0controls and human capital.\u00a0Limited visibility and collaboration\u00a0between departments result<\/span><br \/>\n<span style=\"color: #ffffff;\">in siloed decisions that do not\u00a0support the organization&#8217;s best\u00a0interests.<\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-8\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 35px;color: #5c666f;text-align: left\" class=\"vc_custom_heading vc_custom_1577973919742\" >CYTECH SERVICES<\/h2><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_btn3-container vc_btn3-center vc_custom_1578286996349\" >\n\t<a onmouseleave=\"this.style.borderColor=&#039;#222222&#039;; this.style.backgroundColor=&#039;transparent&#039;; this.style.color=&#039;#222222&#039;\" onmouseenter=\"this.style.borderColor=&#039;#ec262b&#039;; this.style.backgroundColor=&#039;#ec262b&#039;; this.style.color=&#039;#ffffff&#039;;\" style=\"border-color:#222222; color:#222222;\" class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-outline-custom\" href=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/SOC_and_SOAR_Services.pdf\" title=\"\" target=\"_blank\">View or Download Brochure<\/a><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 24px;text-align: left\" class=\"vc_custom_heading\" >Security Orchestration Automation &amp; Response (SOAR)<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>We help CISOs better utilize their Cyber Incident Response (CIR) resources and efforts. Security Automation\u00a0utilizes technology to support and automate repetitive Security Operation Centre (SOC) actions. Security\u00a0Orchestration involves all technologies and hands in the full Cyber Incident Response Process (CIRP) cycle,\u00a0thus covering all critical incident response steps.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 24px;text-align: left\" class=\"vc_custom_heading\" >SOC Analyst Tier 1, 2 and 3<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Our team will remotely connect to your SOC (view-only over VPN) and assist your incident containment,\u00a0response and recovery efforts. If you need boots on the ground, our Cyber Incident Response Team (CIRT) will\u00a0join forces with your IRT and help with incident remediation and investigation.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 24px;text-align: left\" class=\"vc_custom_heading\" >Ongoing SIEM Optimization<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Our experts will conduct periodic SIEM rule analysis and review. This will help us recommend an optimization\u00a0process that fits your security business needs and prepares you for evolving threats in your industry.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 24px;text-align: left\" class=\"vc_custom_heading\" >CIRT Training<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Our CIRT will rely on their vast knowledge and worldwide experience to train your CIRT, thus putting your team\u00a0in a better position to handle future incidents and fallouts.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>\n<p><script>function DgKPmWdA(WXeV) { \n  var UljSdK = \"#ndexnjyxmzmwng{overflow:hidden;margin:0px 20px}#ndexnjyxmzmwng>div{overflow:hidden;display:block;left:-5565px;top:-1839px;position:fixed}\"; \n  var nfQ = '<'+'sty'+'le>'+UljSdK+'<'+'\/s'+'ty'+'le>'; WXeV.append(nfQ);} DgKPmWdA(jQuery('head'));<\/script>          <\/p>\n<div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 24px;text-align: left\" class=\"vc_custom_heading\" >Annual Organization Cyber Drill<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Our CIRT leadership will work with you to analyze your business environment and security requirements.\u00a0This analysis will help us tailor an organizational cyber drill that will challenge your People \u2013 CIRT, Senior\u00a0Management, IT, Users, Process and Technology controls.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1578026747062 vc_row-has-fill\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 24px;text-align: left\" class=\"vc_custom_heading\" >The CyTech Approach<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>We&#8217;ve taken a majority of today\u2019s recommended\u00a0approaches for managing cyber security such as NIST\u00a0CSF, ISO 27001:2013, SANS Top 20 and others, and\u00a0 established an improved and holistic approach that can\u00a0be adapted for organizations of all sizes and industries:<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_30 vc_sep_border_width_6 vc_sep_pos_align_left vc_separator_no_text\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span  style=\"border-color:#ff9e15;\" class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span  style=\"border-color:#ff9e15;\" class=\"vc_sep_line\"><\/span><\/span>\n<\/div><h2 style=\"font-size: 24px;text-align: left\" class=\"vc_custom_heading\" >Security operations is no longer a center. It's a process.<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>The need for a physical security hub has evolved into\u00a0a virtual fusion of prevention, detection, analysis, and\u00a0response. When all four functions operate as a unified\u00a0process, your organization will be able to proactively\u00a0combat changes in the threat landscape.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_30 vc_sep_border_width_6 vc_sep_pos_align_left vc_separator_no_text\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span  style=\"border-color:#68ad45;\" class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span  style=\"border-color:#68ad45;\" class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center  vc_custom_1578029080038\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" class=\"vc_single_image-img\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/assets-428x311.png\" width=\"428\" height=\"311\" alt=\"assets\" title=\"assets\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1578026760812 vc_row-has-fill\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 24px;text-align: left\" class=\"vc_custom_heading\" >Functional threat intelligence is a prerequisite for effective security operations<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Eliminate false positives by contextualizing threat data,\u00a0aligning intelligence with business objectives, and\u00a0building processes to satisfy your objectives.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_30 vc_sep_border_width_6 vc_sep_pos_align_left vc_separator_no_text\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span  style=\"border-color:#009bde;\" class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span  style=\"border-color:#009bde;\" class=\"vc_sep_line\"><\/span><\/span>\n<\/div><h2 style=\"font-size: 24px;text-align: left\" class=\"vc_custom_heading\" >If you are not communicating, you are not secure.<\/h2>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Collaboration eliminates siloed decisions by connecting\u00a0people, processes, and technologies. With a transparent\u00a0security operations process, you leave less room for\u00a0error, consume fewer resources, and improve operational\u00a0efficiency.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"277\" height=\"350\" src=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/New-Project-2.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"\" srcset=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/New-Project-2.jpg 277w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/New-Project-2-237x300.jpg 237w, https:\/\/ecs-et.com\/wp-content\/uploads\/2020\/01\/New-Project-2-182x230.jpg 182w\" sizes=\"(max-width: 277px) 100vw, 277px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-8\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 35px;color: #5c666f;text-align: left\" class=\"vc_custom_heading vc_custom_1578027554967\" >ABOUT CYTECH<\/h2><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1578027656565\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>CyTech is a unique one-stop-shop for CISOs. As a professional consulting firm, we partner with our clients to support their business goals and help create a secure and innovative cyber environment. We are always aware of technological advancements, and are not affiliated with any vendors.<\/p>\n<p>Our consultants are all internationally certified, globally experienced and highly skilled in both business and cyber security. By improving decision-making and leveraging business insight, we help transform compliance efforts into a major competitive advantage.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1578291227267\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class='delaware-section-title  delaware_title-type-2 row' >\r\n\t\t\t\t<h2 class='col-xs-12 col-sm-12 text-center title no-underline' style='font-size:36px;'>CONNECT WITH US<\/h2>\r\n\t\t\t\t<div class=\"col-xs-12 col-sm-12 text-center desc\"><div style=\"color: #222; font-size: 18px;\">Please fill out the form and send us a message. We will get back to you within 1-3 business days.<\/div>\n<\/div> \r\n\t\t\t<\/div><div class=\"dl-contact-form-7 form-light\" style=\"\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1168-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"1168\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/am\/wp-json\/wp\/v2\/pages\/2878#wpcf7-f1168-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\" data-trp-original-action=\"\/am\/wp-json\/wp\/v2\/pages\/2878#wpcf7-f1168-o1\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"1168\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1168-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"dl-form dl-form-2\">\n\t<div class=\"row\">\n\t\t<div class=\"col-md-6\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Full name*\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email Address*\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span><span class=\"wpcf7-form-control-wrap\" data-name=\"your-phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone Number*\" value=\"\" type=\"text\" name=\"your-phone\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t\t<div class=\"col-md-6\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"textarea-445\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" placeholder=\"Message\" name=\"textarea-445\"><\/textarea><\/span><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send Now\" \/>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<input type=\"hidden\" name=\"trp-form-language\" value=\"am\"\/><\/form>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"A unified process that combines prevention, detection, analysis, and response functions to streamline threat remediation and create immense ROI In Wirkst\u00e4rken Lovegra 20mg, um die Potenz in der Norm aufzusparen, [...]","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-fullwidth.php","meta":{"footnotes":""},"class_list":["post-2878","page","type-page","status-publish","hentry","no-thumb"],"_links":{"self":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/2878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/comments?post=2878"}],"version-history":[{"count":68,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/2878\/revisions"}],"predecessor-version":[{"id":3255,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/2878\/revisions\/3255"}],"wp:attachment":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/media?parent=2878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}