{"id":25860,"date":"2024-11-19T05:47:22","date_gmt":"2024-11-19T05:47:22","guid":{"rendered":"http:\/\/dev.absindia.net\/?page_id=25860"},"modified":"2025-09-08T04:31:45","modified_gmt":"2025-09-08T04:31:45","slug":"managed-it-infra-services","status":"publish","type":"page","link":"https:\/\/absindia.net\/managed-it-infra-services\/","title":{"rendered":"Managed IT Infra Services"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"25860\" class=\"elementor elementor-25860\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-888b440 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"888b440\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-66e1d7e\" data-id=\"66e1d7e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a63ccc9 elementor-widget elementor-widget-infetech_elementor_text_marquee_3\" data-id=\"a63ccc9\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_text_marquee_3.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div class=\"ova-text-marquee-3 duration-slow direction-ltr\">\n\n\t\t\t\t\n\t\t\t\t\t<div class=\"content content-wrapper\">\n\n\t\t\t\t\t  \t\n\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-c0a36cf\">\n\t\t\t\t\t\t\t\tEnterprise Solutions \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-8921210\">\n\t\t\t\t\t\t\t\tDatabase Administration \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-868bfa5\">\n\t\t\t\t\t\t\t\tApplication Support \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-d18ca20\">\n\t\t\t\t\t\t\t\tTechnology Integration \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-fc8e09c\">\n\t\t\t\t\t\t\t\tEnterprise Solutions \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-ecb6f99\">\n\t\t\t\t\t\t\t\tDatabase Administration \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-d5fd024\">\n\t\t\t\t\t\t\t\tApplication Support \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-3d082af\">\n\t\t\t\t\t\t\t\tTechnology Integration \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-d8ae9f2\">\n\t\t\t\t\t\t\t\tEnterprise Solutions \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-1b0e921\">\n\t\t\t\t\t\t\t\tDatabase Administration \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-921528b\">\n\t\t\t\t\t\t\t\tApplication Support \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-65c59f9\">\n\t\t\t\t\t\t\t\tTechnology Integration \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"spacing\"><\/div>\n\n\t\t\t\t\t<div class=\"content content-wrapper-2\">\n\n\t\t\t\t\t  \t\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-c0a36cf\">\n\t\t\t\t\t\t\t\tEnterprise Solutions \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-8921210\">\n\t\t\t\t\t\t\t\tDatabase Administration \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-868bfa5\">\n\t\t\t\t\t\t\t\tApplication Support \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-d18ca20\">\n\t\t\t\t\t\t\t\tTechnology Integration \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-fc8e09c\">\n\t\t\t\t\t\t\t\tEnterprise Solutions \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-ecb6f99\">\n\t\t\t\t\t\t\t\tDatabase Administration \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-d5fd024\">\n\t\t\t\t\t\t\t\tApplication Support \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-3d082af\">\n\t\t\t\t\t\t\t\tTechnology Integration \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-d8ae9f2\">\n\t\t\t\t\t\t\t\tEnterprise Solutions \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-1b0e921\">\n\t\t\t\t\t\t\t\tDatabase Administration \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-921528b\">\n\t\t\t\t\t\t\t\tApplication Support \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t<span class=\"text elementor-repeater-item-65c59f9\">\n\t\t\t\t\t\t\t\tTechnology Integration \t\n\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4f669da elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4f669da\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6bc6162\" data-id=\"6bc6162\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7cad40b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7cad40b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5b56309\" data-id=\"5b56309\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c74921c elementor-widget elementor-widget-image\" data-id=\"c74921c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"612\" height=\"408\" src=\"https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/istockphoto-1172642339-612x612-1.jpg\" class=\"attachment-full size-full wp-image-25902\" alt=\"\" srcset=\"https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/istockphoto-1172642339-612x612-1.jpg 612w, https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/istockphoto-1172642339-612x612-1-300x200.jpg 300w, https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/istockphoto-1172642339-612x612-1-600x400.jpg 600w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0f00cd2\" data-id=\"0f00cd2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5065713 elementor-widget elementor-widget-infetech_elementor_heading\" data-id=\"5065713\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div class=\"ova-heading\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t<h3 class=\"title\">\t\t\t\t\t\t\t\t\t\t\t\t\tIT Services\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n                \n                \t\t\t\t\t<p class=\"description\">At ABS India, we provide a comprehensive suite of IT services designed to meet the diverse needs of businesses in today\u2019s digital landscape. Our expert team leverages cutting-edge technology and industry best practices to deliver tailored solutions that enhance operational efficiency, drive innovation and support your strategic objectives.\n\n<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6854422 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6854422\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4fd28c5\" data-id=\"4fd28c5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b2d7bb2 elementor-widget elementor-widget-infetech_elementor_heading\" data-id=\"b2d7bb2\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div class=\"ova-heading\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"sub-title\">\n\t\t\t\t\t\t<span class=\"underlined\"><\/span>\n\t\t\t\t\t\tUnified Secure Access\t\t\t\t\t<\/h2>\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t<h3 class=\"title\">\t\t\t\t\t\t\t\t\t\t\t\t\tSecure Access Service Edge\n\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n                \n                \n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3e73458 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"3e73458\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-f57006f\" data-id=\"f57006f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d82da62 elementor-widget elementor-widget-text-editor\" data-id=\"d82da62\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">SASE combines network security and WAN capabilities into a single cloud-based service model. It enables organizations to provide secure access to their applications, data and services from any location, without compromising on security. SASE leverages the power of cloud computing, AI and ML to deliver a comprehensive security solution that protects against cyber threats, while providing seamless connectivity for remote workers and branch offices.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-bbd42f2 elementor-invisible\" data-id=\"bbd42f2\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;ova-move-left&quot;,&quot;animation_tablet&quot;:&quot;none&quot;,&quot;animation_delay&quot;:50}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-168192e elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"168192e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1220\" height=\"667\" src=\"https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/Downloader-La-987833-e1732000964132.jpg\" class=\"attachment-full size-full wp-image-25906\" alt=\"\" srcset=\"https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/Downloader-La-987833-e1732000964132.jpg 1220w, https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/Downloader-La-987833-e1732000964132-300x164.jpg 300w, https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/Downloader-La-987833-e1732000964132-1024x560.jpg 1024w, https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/Downloader-La-987833-e1732000964132-768x420.jpg 768w, https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/Downloader-La-987833-e1732000964132-600x328.jpg 600w\" sizes=\"(max-width: 1220px) 100vw, 1220px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7486f95 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7486f95\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-71e1f35 infetech_stretch_column_left\" data-id=\"71e1f35\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ef59d7d elementor-widget elementor-widget-spacer\" data-id=\"ef59d7d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0885812\" data-id=\"0885812\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2591a58 elementor-widget elementor-widget-infetech_elementor_heading\" data-id=\"2591a58\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div class=\"ova-heading\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"sub-title\">\n\t\t\t\t\t\t<span class=\"underlined\"><\/span>\n\t\t\t\t\t\tEnhanced Cloud Protection\t\t\t\t\t<\/h2>\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t<h3 class=\"title\">\t\t\t\t\t\t\t\t\t\t\t\t\tCloud Access Security Broker\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n                \n                \n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38a3a62 elementor-widget elementor-widget-text-editor\" data-id=\"38a3a62\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">CASB acts as a gatekeeper between the cloud service provider and the organization\u2019s network, providing visibility and control over cloud usage. CASB offers a range of features, including user authentication, data encryption and threat detection, to ensure that cloud environments are secure and compliant. Its ability to provide real-time monitoring and granular control over cloud usage makes it an invaluable asset for any organization looking to secure their cloud infrastructure.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-788f986 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"788f986\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-81dd979\" data-id=\"81dd979\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dbf1b04 elementor-absolute elementor-widget__width-auto elementor-invisible elementor-widget elementor-widget-image\" data-id=\"dbf1b04\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_animation&quot;:&quot;rotateIn&quot;,&quot;_animation_tablet&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"400\" height=\"325\" src=\"https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/Untitled-design-2024-11-19T172522.519.png\" class=\"attachment-large size-large wp-image-25963\" alt=\"\" srcset=\"https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/Untitled-design-2024-11-19T172522.519.png 400w, https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/Untitled-design-2024-11-19T172522.519-300x244.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67f7a67 elementor-absolute elementor-hidden-mobile elementor-invisible elementor-widget elementor-widget-image\" data-id=\"67f7a67\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_animation&quot;:&quot;rotateInUpLeft&quot;,&quot;_animation_tablet&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"325\" src=\"https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/Untitled-design-2024-11-19T172211.041.png\" class=\"attachment-large size-large wp-image-25961\" alt=\"\" srcset=\"https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/Untitled-design-2024-11-19T172211.041.png 400w, https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/Untitled-design-2024-11-19T172211.041-300x244.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94a4da5 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"94a4da5\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;ova-helix&quot;,&quot;_animation_tablet&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/absindia.net\/wp-content\/uploads\/elementor\/thumbs\/circle-decor-quqdj5ljcih1fqoje9o58sb534o2d8ja35y90n2h8g.png\" title=\"circle-decor\" alt=\"circle-decor\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3326c98\" data-id=\"3326c98\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-90a0406 elementor-widget elementor-widget-infetech_elementor_heading\" data-id=\"90a0406\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div class=\"ova-heading\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"sub-title\">\n\t\t\t\t\t\t<span class=\"underlined\"><\/span>\n\t\t\t\t\t\tReliable Data Assurance\t\t\t\t\t<\/h2>\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t<h3 class=\"title\">\t\t\t\t\t\t\t\t\t\t\t\t\tData Backup & Recovery\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n                \n                \t\t\t\t\t<p class=\"description\">Our backup solutions enable the data infrastructure needed to efficiently capture, deliver, manage and protect data with superior performance and economics and span physical, virtual and cloud infrastructure, providing greater flexibility with reduced complexity and broad platform support. Our disaster recovery management\u2122 (DRM) suite comprises of business continuity, IT resilience and IT disaster recovery management software for physical, virtual and private cloud infrastructure in the datacenter. It combines monitoring, reporting, testing and workflow automation capabilities of complex IT infrastructure into a scalable and easy-to-use solution built on industry standards. Our enterprise-class data virtualization software platform enables businesses to deliver data as a service, leverage public, private or hybrid cloud infrastructure, accelerate testing for DevOps, and improve SLAs for backup and disaster recovery while reducing cost and complexity.<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e281bbb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e281bbb\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1b30078\" data-id=\"1b30078\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bff6488 elementor-widget elementor-widget-infetech_elementor_heading\" data-id=\"bff6488\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div class=\"ova-heading\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"sub-title\">\n\t\t\t\t\t\t<span class=\"underlined\"><\/span>\n\t\t\t\t\t\tProtecting Digital Assets\t\t\t\t\t<\/h2>\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t<h3 class=\"title\">\t\t\t\t\t\t\t\t\t\t\t\t\tInformation Security\n\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n                \n                \t\t\t\t\t<p class=\"description\">As the technology required to run your business evolves, so does the volume and complexity of threats against it. Our robust portfolio of comprehensive and industry leading products and solutions deliver unparalleled protection with reduced complexity and lower maintenance costs from the endpoint to the data center to the cloud. Some of our security solutions include network, data, mobile and end point, firewall, web, email, application and cyber security.\n<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-cca240d ova-element-column-margin-left-50px\" data-id=\"cca240d\" data-element_type=\"column\" id=\"ind-ter\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c9dcdd7 elementor-widget__width-initial elementor-widget elementor-widget-infetech_elementor_video\" data-id=\"c9dcdd7\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t         \n         <div class=\"ova-video video-template2\">\n\n         \t         \t\t<div class=\"image\">\n         \t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/Downloader-La-348660.jpg\" alt=\"\" style=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"icon-content-view video_active\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t\t<div class=\"modal-container\">\n\t\t\t\t<div class=\"modal\">\n\t\t\t\t\t<i class=\"ovaicon-cancel\"><\/i>\n\t\t\t\t\t<iframe class=\"modal-video\" allow=\"autoplay\" allowFullScreen=\"allowFullScreen\" frameBorder=\"0\"><\/iframe>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t \t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c20cfbb ova-geometry1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c20cfbb\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-f7a7d0c\" data-id=\"f7a7d0c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee6911b elementor-widget elementor-widget-infetech_elementor_heading\" data-id=\"ee6911b\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div class=\"ova-heading\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"sub-title\">\n\t\t\t\t\t\t<span class=\"underlined\"><\/span>\n\t\t\t\t\t\tProactive Risk Defense\t\t\t\t\t<\/h2>\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t<h3 class=\"title\">\t\t\t\t\t\t\t\t\t\t\t\t\tThreat Exposure Management\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n                \n                \n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f64ac5d elementor-widget elementor-widget-text-editor\" data-id=\"f64ac5d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Threat Exposure Management (TEM) is a comprehensive cybersecurity strategy that involves identifying, assessing, and managing risks across an organization\u2019s digital ecosystem. TEM provides actionable visibility into security posture, helping organizations prevent attacks, prioritize vulnerabilities and respond quickly to potential threats. This proactive approach ensures that businesses can stay ahead of cybercriminals while optimizing their security investments based on real-time threat intelligence.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-d2ae799\" data-id=\"d2ae799\" data-element_type=\"column\" id=\"thread-point\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f1f6cba elementor-view-default elementor-shape-circle elementor-position-left elementor-overflow-auto elementor-vertical-align-middle elementor-widget elementor-widget-icon-box\" data-id=\"f1f6cba\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span class=\"elementor-icon elementor-animation-\" >\n\t\t\t\t<i aria-hidden=\"true\" class=\"flaticoninfetech- flaticon-infetech-process\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tProactive Risk Reduction\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<p style=\" text-align:left; color:#fff;\">Continuous TEM helps identify and mitigate the most significant cyber threats before they impact the organization.\n<\/p>\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-979fd56 elementor-view-default elementor-shape-circle elementor-position-left elementor-overflow-auto elementor-vertical-align-middle elementor-widget elementor-widget-icon-box\" data-id=\"979fd56\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span class=\"elementor-icon elementor-animation-\" >\n\t\t\t\t<i aria-hidden=\"true\" class=\"flaticon flaticon-technology\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tFaster Recovery & Incident Response\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<p style=\" text-align:left; color:#fff; \">A well-implemented TEM strategy enables rapid response to cyber incidents, minimizing business disruption and reputational damage.\n<\/p>\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-32d030a\" data-id=\"32d030a\" data-element_type=\"column\" id=\"thread-point\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b6e6c02 elementor-view-default elementor-shape-circle elementor-position-left elementor-overflow-auto elementor-vertical-align-middle elementor-widget elementor-widget-icon-box\" data-id=\"b6e6c02\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span class=\"elementor-icon elementor-animation-\" >\n\t\t\t\t<i aria-hidden=\"true\" class=\"flaticoninfetech- flaticon-infetech-infrastructure\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tEnhanced Security Posture\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<p style=\" text-align:left; color:#fff; \"> Regular monitoring and remediation ensure that vulnerabilities are addressed promptly, reducing the risk of successful cyberattacks.\n<\/p>\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d990eeb elementor-widget__width-initial elementor-view-default elementor-shape-circle elementor-position-left elementor-overflow-auto elementor-vertical-align-middle elementor-widget elementor-widget-icon-box\" data-id=\"d990eeb\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span class=\"elementor-icon elementor-animation-\" >\n\t\t\t\t<i aria-hidden=\"true\" class=\"flaticon flaticon-server\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tCompliance & Trust \t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<p style=\" text-align:left; color:#fff;\">Ensure regulatory compliance and build trust with customers, partners and stakeholders by maintaining a robust security posture.\n<\/p>\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-8503abd\" data-id=\"8503abd\" data-element_type=\"column\" id=\"thread-point\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eb2ab16 elementor-view-default elementor-shape-circle elementor-position-left elementor-overflow-auto elementor-vertical-align-middle elementor-widget elementor-widget-icon-box\" data-id=\"eb2ab16\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span class=\"elementor-icon elementor-animation-\" >\n\t\t\t\t<i aria-hidden=\"true\" class=\"flaticon flaticon-cloud-computing-1\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tImproved Resource Allocation\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<p style=\" text-align:left; color:#fff; \">By prioritizing vulnerabilities based on risk, organizations can allocate resources effectively to maximize ROI.\n<\/p>\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf2c305 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf2c305\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-665c5bc\" data-id=\"665c5bc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6132f19 elementor-widget__width-auto elementor-absolute elementor-widget elementor-widget-image\" data-id=\"6132f19\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"86\" height=\"87\" src=\"https:\/\/absindia.net\/wp-content\/uploads\/2024\/01\/Fingerprint.png\" class=\"attachment-large size-large wp-image-13323\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6814b4d elementor-widget__width-auto elementor-widget elementor-widget-image\" data-id=\"6814b4d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"625\" height=\"500\" src=\"https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/Untitled-design-2024-11-19T174347.203.png\" class=\"attachment-full size-full wp-image-25967\" alt=\"\" srcset=\"https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/Untitled-design-2024-11-19T174347.203.png 625w, https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/Untitled-design-2024-11-19T174347.203-300x240.png 300w, https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/Untitled-design-2024-11-19T174347.203-600x480.png 600w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f83b50 elementor-widget__width-auto elementor-absolute elementor-widget elementor-widget-image\" data-id=\"8f83b50\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"50\" height=\"24\" src=\"https:\/\/absindia.net\/wp-content\/uploads\/2024\/01\/Group-cloud.png\" class=\"attachment-large size-large wp-image-13577\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-26bea38\" data-id=\"26bea38\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-261bf51 elementor-widget elementor-widget-infetech_elementor_heading\" data-id=\"261bf51\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div class=\"ova-heading\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t<h3 class=\"title\">\t\t\t\t\t\t\t\t\t\t\t\t\tKey Components Of Threat Exposure Management\n\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n                \n                \n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b457f1 ova-vertical-scroll elementor-widget elementor-widget-accordion\" data-id=\"8b457f1\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1461\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1461\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-angle-down\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Continuous Monitoring <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1461\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1461\"><p><span style=\"font-weight: 400;\">Regularly scans the organization&#8217;s digital attack surface to detect vulnerabilities and assess risks, ensuring real-time visibility and rapid threat detection.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1462\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1462\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-angle-down\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Vulnerability Prioritization <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1462\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1462\"><p><span style=\"font-weight: 400;\">Not all vulnerabilities are equal. TEM prioritizes vulnerabilities based on their potential impact, exploitability and relevance to the organization\u2019s security posture.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1463\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1463\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-angle-down\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Risk Management & Remediation<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1463\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1463\"><p><span style=\"font-weight: 400;\">Develops targeted remediation strategies and leverages automation to efficiently address high-priority vulnerabilities, reducing overall risk exposure.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1464\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1464\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-angle-down\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Threat Intelligence Integration <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1464\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1464\"><p><span style=\"font-weight: 400;\">Incorporates up-to-date threat intelligence to anticipate potential threats, refine risk prioritization and enhance security controls.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1465\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1465\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-angle-down\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Communication & Collaboration<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1465\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1465\"><p><span style=\"font-weight: 400;\">Ensures effective communication with stakeholders across the organization, fostering a culture of cybersecurity awareness and collaboration.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1466\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1466\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-angle-down\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Advanced Threat Detection & Response<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1466\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1466\"><p><span style=\"font-weight: 400;\">Utilizes advanced tools like Security Information and Event Management (SIEM) and Threat Intelligence Platforms (TIP) to detect and respond to sophisticated threats, ensuring a swift and effective incident response.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f32b8cb elementor-widget__width-auto elementor-absolute elementor-widget elementor-widget-image\" data-id=\"f32b8cb\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"37\" height=\"58\" src=\"https:\/\/absindia.net\/wp-content\/uploads\/2024\/01\/lock.png\" class=\"attachment-large size-large wp-image-13328\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-2a292f6 e-flex e-con-boxed e-con e-parent\" data-id=\"2a292f6\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b690d98 elementor-widget__width-initial elementor-widget elementor-widget-infetech_elementor_heading\" data-id=\"b690d98\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div class=\"ova-heading\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"sub-title\">\n\t\t\t\t\t\t<span class=\"underlined\"><\/span>\n\t\t\t\t\t\tSeamless Operations\t\t\t\t\t<\/h2>\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t<h3 class=\"title\">\t\t\t\t\t\t\t\t\t\t\t\t\tOur Approach To Managed IT Services\n\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n                \n                \n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-599faa3 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"599faa3\" data-element_type=\"section\" id=\"approach-point\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-89cadc0 animated-fast elementor-invisible\" data-id=\"89cadc0\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;ova-move-up&quot;,&quot;animation_tablet&quot;:&quot;none&quot;,&quot;animation_delay&quot;:100}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d338f00 elementor-widget elementor-widget-infetech_elementor_ova_icon_box\" data-id=\"d338f00\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_ova_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            \n            \n\t\t \t    <div class=\"ova-icon-box ova-icon-box-template2 version1 \">\n\n                    <div class=\"mask\"\n\t                     \n\t\t\t \t    \t \tstyle=\"background-image: url(https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/istockphoto-1363751735-612x612-1-e1732018790301.jpg)\"\n\t\t\t \t    \t                    >\t\n                    <\/div>\n\n                                        \n                    <div class=\"box-info\">\n                    \t\t\t\t\t            \t\t\t\t\t\t\t\t<h4 class=\"title\">\n\t\t\t\t\t\t\t\t\t Proactive Monitoring\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"description\">\n\t\t\t\t\t\t\t\tWe monitor your IT environment 24\/7, detecting and addressing issues before they disrupt your operations.\n\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t                    <\/div>\n                    \n                    \t\t\t\t\t\t\t\t\t            \t<div class=\"icon\">\n\t\t\t            \t\t<i aria-hidden=\"true\" class=\"flaticon flaticon-developer\"><\/i>\t\t\t            \t<\/div>\n\t\t\t            \t\t\t        \t\t\t    <\/div>\n\n\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-1eb5948 animated-fast elementor-invisible\" data-id=\"1eb5948\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;ova-move-up&quot;,&quot;animation_tablet&quot;:&quot;none&quot;,&quot;animation_delay&quot;:150}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b0b918f elementor-widget elementor-widget-infetech_elementor_ova_icon_box\" data-id=\"b0b918f\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_ova_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            \n            \n\t\t \t    <div class=\"ova-icon-box ova-icon-box-template2 version1 \">\n\n                    <div class=\"mask\"\n\t                     \n\t\t\t \t    \t \tstyle=\"background-image: url(https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/istockphoto-1141543183-612x612-1.jpg)\"\n\t\t\t \t    \t                    >\t\n                    <\/div>\n\n                                        \n                    <div class=\"box-info\">\n                    \t\t\t\t\t            \t\t\t\t\t\t\t\t<h4 class=\"title\">\n\t\t\t\t\t\t\t\t\tTechnical Expertise\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"description\">\n\t\t\t\t\t\t\t\tOur team of certified IT professionals brings a wealth of expertise to manage and support your technology.\n\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t                    <\/div>\n                    \n                    \t\t\t\t\t\t\t\t\t            \t<div class=\"icon\">\n\t\t\t            \t\t<i aria-hidden=\"true\" class=\"icomoon icomoon-software-development\"><\/i>\t\t\t            \t<\/div>\n\t\t\t            \t\t\t        \t\t\t    <\/div>\n\n\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-2268e11 animated-fast elementor-invisible\" data-id=\"2268e11\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;ova-move-up&quot;,&quot;animation_tablet&quot;:&quot;none&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e4d52ce elementor-widget elementor-widget-infetech_elementor_ova_icon_box\" data-id=\"e4d52ce\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_ova_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            \n            \n\t\t \t    <div class=\"ova-icon-box ova-icon-box-template2 version1 \">\n\n                    <div class=\"mask\"\n\t                     \n\t\t\t \t    \t \tstyle=\"background-image: url(https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/istockphoto-1892804692-612x612-1-e1732019076744.jpg)\"\n\t\t\t \t    \t                    >\t\n                    <\/div>\n\n                                        \n                    <div class=\"box-info\">\n                    \t\t\t\t\t            \t\t\t\t\t\t\t\t<h4 class=\"title\">\n\t\t\t\t\t\t\t\t\tScalable Solutions\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"description\">\n\t\t\t\t\t\t\t\tWhether you&#039;re a small business or a large enterprise, our services can scale to accommodate your growth.\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t                    <\/div>\n                    \n                    \t\t\t\t\t\t\t\t\t            \t<div class=\"icon\">\n\t\t\t            \t\t<i aria-hidden=\"true\" class=\"flaticoninfetech- flaticon-infetech-process-1\"><\/i>\t\t\t            \t<\/div>\n\t\t\t            \t\t\t        \t\t\t    <\/div>\n\n\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-32c689e animated-fast elementor-invisible\" data-id=\"32c689e\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;ova-move-up&quot;,&quot;animation_tablet&quot;:&quot;none&quot;,&quot;animation_delay&quot;:250}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f7ede44 elementor-widget elementor-widget-infetech_elementor_ova_icon_box\" data-id=\"f7ede44\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_ova_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            \n            \n\t\t \t    <div class=\"ova-icon-box ova-icon-box-template2 version1 \">\n\n                    <div class=\"mask\"\n\t                     \n\t\t\t \t    \t \tstyle=\"background-image: url(https:\/\/absindia.net\/wp-content\/uploads\/2024\/11\/istockphoto-1695598546-612x612-1.jpg)\"\n\t\t\t \t    \t                    >\t\n                    <\/div>\n\n                                        \n                    <div class=\"box-info\">\n                    \t\t\t\t\t            \t\t\t\t\t\t\t\t<h4 class=\"title\">\n\t\t\t\t\t\t\t\t\tData Security\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"description\">\n\t\t\t\t\t\t\t\tWe implement robust security measures to protect your sensitive data and ensure compliance with industry regulations.\n\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t                    <\/div>\n                    \n                    \t\t\t\t\t\t\t\t\t            \t<div class=\"icon\">\n\t\t\t            \t\t<i aria-hidden=\"true\" class=\"flaticon flaticon-database\"><\/i>\t\t\t            \t<\/div>\n\t\t\t            \t\t\t        \t\t\t    <\/div>\n\n\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Enterprise Solutions Database Administration Application Support Technology Integration Enterprise Solutions Database Administration Application Support Technology Integration Enterprise Solutions Database Administration Application Support Technology Integration Enterprise Solutions Database Administration Application Support Technology Integration Enterprise Solutions Database Administration Application Support Technology Integration Enterprise Solutions Database Administration Application Support Technology Integration IT Services At ABS India, we provide [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-25860","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/absindia.net\/wp-json\/wp\/v2\/pages\/25860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/absindia.net\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/absindia.net\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/absindia.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/absindia.net\/wp-json\/wp\/v2\/comments?post=25860"}],"version-history":[{"count":10,"href":"https:\/\/absindia.net\/wp-json\/wp\/v2\/pages\/25860\/revisions"}],"predecessor-version":[{"id":31177,"href":"https:\/\/absindia.net\/wp-json\/wp\/v2\/pages\/25860\/revisions\/31177"}],"wp:attachment":[{"href":"https:\/\/absindia.net\/wp-json\/wp\/v2\/media?parent=25860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}