[et_pb_section fb_built=”1″ admin_label=”Header” _builder_version=”3.25.3″ use_background_color_gradient=”on” background_color_gradient_start=”#00ffd8″ background_color_gradient_end=”#0029e2″ background_color_gradient_type=”radial” background_color_gradient_direction_radial=”top right” background_image=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-18.png” parallax=”on” custom_padding=”10vw||” locked=”off”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25.1″ z_index=”1″][et_pb_column type=”1_2″ _builder_version=”3.25.1″][et_pb_text _builder_version=”3.27.4″ text_font=”||||||||” header_font=”Overpass|900|||||||” header_font_size=”84px” background_layout=”dark” header_font_size_tablet=”54px” header_font_size_phone=”32px” header_font_size_last_edited=”on|desktop” locked=”off”]
Security Solutions
[/et_pb_text][et_pb_button button_url=”https://cyberdocs.co/contact-us/” button_text=”Talk With An Expert” _builder_version=”4.9.4″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#47d7ff” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(23,102,193,0.46)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25.1″][et_pb_image src=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-06-1.png” align=”right” _builder_version=”3.25.3″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”-10vw|0vw||” custom_margin_tablet=”-2vw|0vw||” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_6,1_6,1_6,1_6,1_6,1_6″ use_custom_gutter=”on” gutter_width=”2″ _builder_version=”3.25.1″][et_pb_column type=”1_6″ _builder_version=”3.25.1″][et_pb_button button_text=”VULENRABILITY ASSESSMENT & PT” button_alignment=”center” _builder_version=”4.9.4″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_bg_color_gradient_type=”radial” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”3.25.1″][et_pb_button button_text=”ISO 27001 consulting services” button_alignment=”center” _builder_version=”4.9.4″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_bg_color_gradient_type=”radial” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”3.25.1″][et_pb_button button_text=”INFORMATION SECURITY AUDITS” button_alignment=”center” _builder_version=”4.9.4″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_bg_color_gradient_type=”radial” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”3.25.1″][et_pb_button button_text=”Infomation Security Training” button_alignment=”center” _builder_version=”4.9.4″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_bg_color_gradient_type=”radial” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”3.25.1″][et_pb_button button_text=”Virtual CISO as a SERVICE” button_alignment=”center” _builder_version=”4.9.4″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_bg_color_gradient_type=”radial” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”3.25.1″][et_pb_button button_text=”GDPR & Privacy ASSESSMENTS” button_alignment=”center” _builder_version=”4.9.4″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_bg_color_gradient_type=”radial” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.25.1″ z_index=”0″ width=”100%” max_width=”none”][et_pb_column type=”4_4″ _builder_version=”3.25.1″][et_pb_image src=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-13.png” show_bottom_space=”off” force_fullwidth=”on” _builder_version=”3.25.3″ custom_margin=”0vw||-2px”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Contact Form” _builder_version=”3.25.3″ background_color=”#f1fafe” z_index=”10″ bottom_divider_height=”26vw” bottom_divider_flip=”horizontal” locked=”off”][et_pb_row column_structure=”1_3,1_3,1_3″ custom_padding_last_edited=”on|phone” _builder_version=”3.25.3″ background_color=”#ffffff” z_index=”1″ custom_margin=”-24vw|auto|-16vw|auto||” custom_padding=”60px|60px|60px|60px|true|true” custom_padding_tablet=”|40px||40px||true” custom_padding_phone=”|20px||20px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” locked=”off”][et_pb_column type=”1_3″ _builder_version=”3.25.1″][et_pb_blurb title=”ISO 27001″ image=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-icon-29.png” _builder_version=”3.25.3″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off”]
With our fast track programme get your organization ISO 27001 certified in less 30 days with limited budget and manpower don’t believe, ask our clients
[/et_pb_blurb][et_pb_blurb title=”ISO 27701 CERTIFICATION SUPPORT” image=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-icon-16.png” _builder_version=”3.25.3″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off”]
This is the world’s first International Standard on Privacy Information Management Systems (PIMS) and incorporates a mapping against the requirements of EU GDPR.
[/et_pb_blurb][et_pb_blurb title=”Molstie Lacinia” image=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-icon-28.png” _builder_version=”4.9.4″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” hover_enabled=”0″ locked=”off” disabled_on=”on|on|on” disabled=”on” sticky_enabled=”0″]
Donec sollicitudin molestie malesuada. Vivamus magna justo, lacinia eget consectetur sed, convallis at tellus. Proin eget tortor risus.
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.25.1″][et_pb_blurb title=”VIRTUAL CISO” image=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-icon-15.png” _builder_version=”3.25.3″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off”]
A vCISO is your security point-of-contact offering a direct line to respond to security-related incident, answer security-related questionnaires for your customer
[/et_pb_blurb][et_pb_blurb title=”VA PT ASSESSMENTS” image=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-icon-6.png” _builder_version=”3.25.3″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off”]
We offer a vast range of vulnerability assessment and penetration testing (VAPT) services from web application VAPT, network VAPT, mobile app VAPT
[/et_pb_blurb][et_pb_blurb title=”Amet Sit” image=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-icon-21.png” _builder_version=”4.9.4″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” hover_enabled=”0″ locked=”off” disabled_on=”on|on|on” disabled=”on” sticky_enabled=”0″]
Donec sollicitudin molestie malesuada. Vivamus magna justo, lacinia eget consectetur sed, convallis at tellus. Proin eget tortor risus.
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.25.1″][et_pb_blurb title=”GDPR READINESS” image=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-icon-14.png” _builder_version=”3.25.3″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off”]
Working with European clients and not sure of European laws. Do not worry we have your cover with our GDPR assessments to ensure you do not breach any of the regulations
[/et_pb_blurb][et_pb_blurb title=”IS AUDITS” image=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-icon-10.png” _builder_version=”3.25.3″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off”]
Engage us for any information security audits against any international standards like HIPAA | NIST CSF | NIST SP 800 | ISO 22301
[/et_pb_blurb][et_pb_blurb title=”Donec Sed At” image=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-icon-13.png” _builder_version=”4.9.4″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” hover_enabled=”0″ locked=”off” disabled_on=”on|on|on” disabled=”on” sticky_enabled=”0″]
Donec sollicitudin molestie malesuada. Vivamus magna justo, lacinia eget consectetur sed, convallis at tellus. Proin eget tortor risus.
[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ prev_background_color=”#f1fafe” next_background_color=”#ffffff” _builder_version=”3.25.3″ use_background_color_gradient=”on” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” background_color_gradient_type=”radial” custom_margin=”||22vw|||” custom_padding=”24vw||8vw||false|” top_divider_style=”slant” top_divider_height=”27vw” top_divider_flip=”horizontal” bottom_divider_style=”slant” bottom_divider_height=”27vw” bottom_divider_flip=”horizontal”][et_pb_row _builder_version=”3.25.3″ max_width=”800px”][et_pb_column type=”4_4″ _builder_version=”3.25.3″][et_pb_text _builder_version=”4.9.4″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” header_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Overpass|600|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” text_orientation=”center” background_layout=”dark” custom_margin=”||” custom_padding=”|||||” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off”]
Industries
We Serve a Variety of Businesses & Industries
CYBERDOCS serves a lot of different types of customers throughout the world. We cater and support every single customer as much as we can, and are proud of every one of them.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ _builder_version=”3.25.3″ locked=”off”][et_pb_column type=”1_4″ _builder_version=”3.25.3″ background_color=”#ffffff” transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|240px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|tablet” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|tablet” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)”][et_pb_blurb title=”Online Stores” image=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-icon-40.png” _builder_version=”3.25.3″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center”][/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.25.3″ background_color=”#ffffff” transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|160px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|tablet” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|tablet” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)”][et_pb_blurb title=”Health Care” image=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-icon-41.png” _builder_version=”3.25.3″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” body_link_font=”|600|||||||” body_link_text_color=”#00b4ff” text_orientation=”center” locked=”off”][/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.25.3″ background_color=”#ffffff” transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|80px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|tablet” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|tablet” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)”][et_pb_blurb title=”Government” image=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-icon-31.png” _builder_version=”3.25.3″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” body_link_font=”|600|||||||” body_link_text_color=”#00b4ff” text_orientation=”center” locked=”off”][/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.25.3″ background_color=”#ffffff” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)”][et_pb_blurb title=”Software” image=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-icon-13.png” _builder_version=”3.25.3″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off”][/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”3.25.3″ use_background_color_gradient=”on” background_color_gradient_start=”#3122b2″ background_color_gradient_end=”#00ffd8″ background_color_gradient_type=”radial” background_color_gradient_direction_radial=”top right” background_image=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-17.png” z_index=”10″ overflow-x=”visible” overflow-y=”visible” custom_padding=”||10vw|||” locked=”off”][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”3.25.3″ background_color=”#ffffff” custom_margin=”-146px|auto|-2px|auto||” custom_padding=”0px||0px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”40px” box_shadow_blur=”60px” box_shadow_spread=”-8px” box_shadow_color=”rgba(10,45,97,0.48)” locked=”off”][et_pb_column type=”2_5″ _builder_version=”3.25.3″ custom_padding=”60px|40px|60px|40px|true|true”][et_pb_text _builder_version=”3.27.4″ header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” locked=”off”]
Contact Us
[/et_pb_text][et_pb_blurb title=”+91 9986877136″ use_icon=”on” font_icon=”%%264%%” icon_color=”#006ac1″ icon_placement=”left” use_icon_font_size=”on” icon_font_size=”24px” _builder_version=”4.9.4″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off”][/et_pb_blurb][et_pb_blurb title=”BANGALORE INDIA” use_icon=”on” font_icon=”%%249%%” icon_color=”#006ac1″ icon_placement=”left” use_icon_font_size=”on” icon_font_size=”24px” _builder_version=”3.25.3″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off”]
Monday-Friday: 8am – 8pm
[/et_pb_blurb][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”3.25.3″ use_background_color_gradient=”on” background_color_gradient_start=”#00f6ff” background_color_gradient_end=”#00ffbf” background_color_gradient_type=”radial” background_color_gradient_direction_radial=”top right” background_image=”https://cyberdocs.co/wp-content/uploads/2021/05/cyber-security-010-1.png” background_size=”contain” background_position=”bottom_left” transform_translate_linked=”off” custom_padding=”60px|40px|60px|20%|true” custom_padding_tablet=”80px|||40px” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” background_last_edited=”on|desktop” background_image_tablet=”http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-11.png” background_enable_image_tablet=”on” background_position_tablet=”top_left”][et_pb_text _builder_version=”3.27.4″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” text_orientation=”center” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” text_text_align=”center” locked=”off”]
Get Started
[/et_pb_text][et_pb_text _builder_version=”4.9.4″ text_font=”Overpass|300|||||||” text_text_color=”#0a2d61″ text_font_size=”17px” text_line_height=”1.8em” text_orientation=”center” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off”]
Overcome the security challenges and opt for the future cybersecurity protection.
[/et_pb_text][et_pb_button button_url=”https://cyberdocs.co/contact-us/” button_text=”Book Appointment” button_alignment=”center” _builder_version=”4.9.4″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_bg_color_gradient_type=”radial” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]