{"id":1199,"date":"2024-03-20T21:00:30","date_gmt":"2024-03-20T21:00:30","guid":{"rendered":"https:\/\/nexacybersecurity.com\/?page_id=1199"},"modified":"2024-03-20T21:18:33","modified_gmt":"2024-03-20T21:18:33","slug":"socaas","status":"publish","type":"page","link":"https:\/\/nexacybersecurity.com\/index.php\/socaas\/","title":{"rendered":"SOCaaS"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1199\" class=\"elementor elementor-1199\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c4cd32a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c4cd32a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-29e39ee\" data-id=\"29e39ee\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9db5c06 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9db5c06\" data-element_type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2628a5a\" data-id=\"2628a5a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-029d557 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"029d557\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">SOCaaS<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a71ccb elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"7a71ccb\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">We provide innovative solutions for your security needs.\n<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4feb540 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4feb540\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1a0015c elementor-invisible\" data-id=\"1a0015c\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-db8e391 elementor-widget elementor-widget-heading\" data-id=\"db8e391\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Our Services<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ed7873 elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"5ed7873\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">What is <span><span>SOCaaS<\/span><\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider\"><div class=\"elementskit-border-divider\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>SOCaaS, or Security Operations Center as a Service, is a comprehensive cybersecurity solution that outsources the management of security operations to a dedicated team of experts. With SOCaaS, organizations can benefit from continuous monitoring, threat detection, and incident response without the need to maintain an in-house security operations center.<\/p>\n<p>At Nexa Cyber Security, we recognize the critical importance of proactively identifying and mitigating potential compromises to your organization's digital assets. Our Compromise Assessment Service is meticulously designed to provide comprehensive evaluations of your systems and networks, ensuring early detection and remediation of security breaches.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0653b30\" data-id=\"0653b30\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-717bb45 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"717bb45\" data-element_type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-32599e8 elementor-invisible\" data-id=\"32599e8\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;zoomIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7f4a7c elementor-widget elementor-widget-image\" data-id=\"a7f4a7c\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1920\" height=\"1200\" src=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/03\/9649048_6863-min.jpg\" class=\"attachment-full size-full wp-image-1201\" alt=\"\" srcset=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/03\/9649048_6863-min.jpg 1920w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/03\/9649048_6863-min-300x188.jpg 300w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/03\/9649048_6863-min-1024x640.jpg 1024w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/03\/9649048_6863-min-768x480.jpg 768w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/03\/9649048_6863-min-1536x960.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-eead932 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eead932\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1fecda5 elementor-invisible\" data-id=\"1fecda5\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cbf1c67 elementor-widget elementor-widget-heading\" data-id=\"cbf1c67\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Nexa Cyber Security Operations Centers as a Service\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-58042b1 elementor-invisible\" data-id=\"58042b1\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-013dab2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"013dab2\" data-element_type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-cc17232\" data-id=\"cc17232\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b18208 elementor-view-stacked elementor-shape-square elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"8b18208\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/nexacybersecurity.com\/wp-content\/plugins\/elementor\/assets\/css\/widget-icon-box.min.css\">\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" height=\"512\" viewBox=\"0 0 512 512\" width=\"512\"><g><g><path d=\"m371.5 472.6c-2.5 3.8-6.6 6.1-11.1 6.1h-208.8c-4.5 0-8.7-2.3-11.1-6.1-2.4-3.7-2.7-8.3-1-12.3 5.1-11.4 16.5-18.7 29-18.7h25v-22h125.1v22h25c12.5 0 23.8 7.4 29 18.7 1.7 4 1.3 8.7-1.1 12.3z\"><\/path><\/g><g><g><path d=\"m166.7 157.4c-6.9 25.7-30.5 44.7-58.3 44.7-33.3-.1-60.4-27.1-60.4-60.4 0-27.9 19-51.4 44.7-58.3-.7 2.7-.3.9-.4 58.3 0 8.8 7.2 16 16 16 57.1-.1 55.6.2 58.4-.3z\"><\/path><\/g><g><path d=\"m168.7 141.7c0 2.9-2.4 5.3-5.3 5.3h-55c-2.9 0-5.3-2.4-5.3-5.3v-55c0-3 2.4-5.3 5.3-5.3 33.3 0 60.3 27 60.3 60.3z\"><\/path><\/g><g><path d=\"m163.4 234.4h-110.1c-2.9 0-5.3-2.4-5.3-5.3s2.4-5.3 5.3-5.3h110.1c2.9 0 5.3 2.4 5.3 5.3s-2.4 5.3-5.3 5.3z\"><\/path><\/g><g><path d=\"m163.4 265.8h-110.1c-2.9 0-5.3-2.4-5.3-5.3s2.4-5.3 5.3-5.3h110.1c2.9 0 5.3 2.4 5.3 5.3 0 3-2.4 5.3-5.3 5.3z\"><\/path><\/g><g><path d=\"m163.4 297.3h-110.1c-2.9 0-5.3-2.4-5.3-5.3s2.4-5.3 5.3-5.3h110.1c2.9 0 5.3 2.4 5.3 5.3s-2.4 5.3-5.3 5.3z\"><\/path><\/g><g><path d=\"m266.4 208.5v78.1c0 5.9-4.8 10.7-10.7 10.7h-22.2c-5.9 0-10.7-4.8-10.7-10.7v-78.1c0-5.9 4.7-10.7 10.7-10.7h22.2c5.9 0 10.7 4.8 10.7 10.7z\"><\/path><\/g><g><path d=\"m332.3 153.5v133.1c0 5.9-4.8 10.7-10.7 10.7h-22.2c-5.9 0-10.7-4.8-10.7-10.7v-133.1c0-5.9 4.7-10.7 10.7-10.7h22.2c5.9 0 10.7 4.8 10.7 10.7z\"><\/path><\/g><g><path d=\"m398.1 208.5v78.1c0 5.9-4.8 10.7-10.7 10.7h-22.3c-5.9 0-10.7-4.8-10.7-10.7v-78.1c0-5.9 4.8-10.7 10.7-10.7h22.3c5.9 0 10.7 4.8 10.7 10.7z\"><\/path><\/g><g><path d=\"m464 175.9v110.7c0 5.9-4.8 10.7-10.7 10.7h-22.3c-5.9 0-10.7-4.8-10.7-10.7v-110.7c0-5.9 4.8-10.7 10.7-10.7h22.3c5.9 0 10.7 4.8 10.7 10.7z\"><\/path><\/g><g><path d=\"m376.3 170.3c-1.5 0-3-.7-4.1-1.9l-62.2-74-61.7 59.6c-2.1 2-5.5 2-7.5-.1s-2-5.5.1-7.5l65.9-63.6c1.1-1 2.5-1.6 4-1.5s2.9.8 3.8 1.9l62.7 74.6 61.9-43.7c2.4-1.7 5.7-1.1 7.4 1.3s1.1 5.7-1.3 7.4l-65.9 46.6c-.9.6-2 .9-3.1.9z\"><\/path><\/g><\/g><g><path d=\"m256 359.2c-4 0-7.3 3.3-7.3 7.3s3.3 7.3 7.3 7.3 7.3-3.3 7.3-7.3-3.3-7.3-7.3-7.3z\"><\/path><path d=\"m485.3 33.3h-458.6c-14.8 0-26.7 11.9-26.7 26.6 0 8.5 0 342.8 0 322.4 0 14.7 11.9 26.7 26.7 26.7h458.7c14.7 0 26.7-12 26.7-26.7 0-40.7 0-281.9 0-322.4-.1-14.7-12.1-26.6-26.8-26.6zm-229.3 351.2c-9.9 0-18-8.1-18-18s8.1-18 18-18 18 8.1 18 18-8.1 18-18 18zm234.7-60.6h-469.4v-264c0-2.9 2.4-5.3 5.3-5.3h458.7c2.9 0 5.3 2.4 5.3 5.3v264z\"><\/path><\/g><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tExpert Analysis\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tBenefit from the expertise of our seasoned cybersecurity analysts who leverage advanced technologies to analyze threats and mitigate risks.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f4f1256\" data-id=\"f4f1256\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-df371d4 elementor-view-stacked elementor-shape-square elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"df371d4\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" data-name=\"Layer 1\" id=\"Layer_1\" viewBox=\"0 0 64 64\"><title><\/title><path d=\"M23,13.364a1,1,0,0,0-1,1v3.272a1,1,0,0,0,1,1h1.067a8.239,8.239,0,0,0,.46,1.108l-.755.756a1,1,0,0,0,0,1.414l2.314,2.314a1,1,0,0,0,1.414,0l.756-.755a8.239,8.239,0,0,0,1.108.46V25a1,1,0,0,0,1,1h3.272a1,1,0,0,0,1-1V23.933a8.239,8.239,0,0,0,1.108-.46l.756.755a1,1,0,0,0,1.414,0l2.314-2.314a1,1,0,0,0,0-1.414l-.755-.756a8.239,8.239,0,0,0,.46-1.108H41a1,1,0,0,0,1-1V14.364a1,1,0,0,0-1-1H39.933a8.239,8.239,0,0,0-.46-1.108l.755-.756a1,1,0,0,0,0-1.414L37.914,7.772a1,1,0,0,0-1.414,0l-.756.755a8.239,8.239,0,0,0-1.108-.46V7a1,1,0,0,0-1-1H30.364a1,1,0,0,0-1,1V8.067a8.239,8.239,0,0,0-1.108.46L27.5,7.772a1,1,0,0,0-1.414,0l-2.314,2.314a1,1,0,0,0,0,1.414l.755.756a8.239,8.239,0,0,0-.46,1.108Zm1.825,2a1,1,0,0,0,.975-.779,6.312,6.312,0,0,1,.817-1.967,1,1,0,0,0-.139-1.24l-.585-.585.9-.9.585.585a1,1,0,0,0,1.24.139A6.312,6.312,0,0,1,30.585,9.8a1,1,0,0,0,.779-.975V8h1.272v.825a1,1,0,0,0,.779.975,6.312,6.312,0,0,1,1.967.817,1,1,0,0,0,1.24-.139l.585-.585.9.9-.585.585a1,1,0,0,0-.139,1.24,6.312,6.312,0,0,1,.817,1.967,1,1,0,0,0,.975.779H40v1.272h-.825a1,1,0,0,0-.975.779,6.312,6.312,0,0,1-.817,1.967,1,1,0,0,0,.139,1.24l.585.585-.9.9-.585-.585a1,1,0,0,0-1.24-.139,6.312,6.312,0,0,1-1.967.817,1,1,0,0,0-.779.975V24H31.364v-.825a1,1,0,0,0-.779-.975,6.312,6.312,0,0,1-1.967-.817,1,1,0,0,0-1.24.139l-.585.585-.9-.9.585-.585a1,1,0,0,0,.139-1.24,6.312,6.312,0,0,1-.817-1.967,1,1,0,0,0-.975-.779H24V15.364Z\"><\/path><path d=\"M51,42V33.548a4.535,4.535,0,0,0-2.463-4.018A5.015,5.015,0,1,0,41.026,29h-.9l-7.88-1.97c-.006,0-.012,0-.018,0a1.021,1.021,0,0,0-.241,0,1.088,1.088,0,0,0-.206,0c-.007,0-.014,0-.021,0L23.877,29h-.9A4.948,4.948,0,0,0,24,26a5,5,0,1,0-8.537,3.53A4.535,4.535,0,0,0,13,33.548V42a1,1,0,0,0,.553.9L15,43.618V50a1,1,0,0,0,1,1h6a1,1,0,0,0,1-1V43.618l1.447-.723A1,1,0,0,0,25,42V36.554l7-4.375,7,4.375V42a1,1,0,0,0,.553.9L41,43.618V50a1,1,0,0,0,1,1h6a1,1,0,0,0,1-1V43.618l1.447-.723A1,1,0,0,0,51,42ZM19,23a3,3,0,1,1-3,3A3,3,0,0,1,19,23Zm12,7.446-7.53,4.706A1,1,0,0,0,23,36v5.382l-1.447.723A1,1,0,0,0,21,43v6H17V43a1,1,0,0,0-.553-.9L15,41.382V33.548A2.551,2.551,0,0,1,17.548,31H24a1,1,0,0,0,.243-.03L31,29.281ZM45,23a3,3,0,1,1-3,3A3,3,0,0,1,45,23Zm4,18.382-1.447.723A1,1,0,0,0,47,43v6H43V43a1,1,0,0,0-.553-.9L41,41.382V36a1,1,0,0,0-.47-.848L33,30.446V29.281l6.757,1.689A1,1,0,0,0,40,31h6.452A2.551,2.551,0,0,1,49,33.548Z\"><\/path><path d=\"M26.076,47.617a1,1,0,0,0,.217,1.09l2,2,1.414-1.414L29.414,49H37V47H27A1,1,0,0,0,26.076,47.617Z\"><\/path><path d=\"M27,45H37a1,1,0,0,0,.707-1.707l-2-2-1.414,1.414.293.293H27Z\"><\/path><path d=\"M32,20a4,4,0,1,0-4-4A4,4,0,0,0,32,20Zm0-6a2,2,0,1,1-2,2A2,2,0,0,1,32,14Z\"><\/path><path d=\"M5.141,40.128A28.279,28.279,0,0,1,4,32.206l-2,0A30.285,30.285,0,0,0,3.223,40.7Z\"><\/path><path d=\"M12.3,9.414l1.314,1.515A28,28,0,0,1,20.3,6.578L19.46,4.752A30.031,30.031,0,0,0,12.3,9.414Z\"><\/path><path d=\"M44.375,4.677l-.826,1.83a28,28,0,0,1,6.713,4.312l1.3-1.524A29.961,29.961,0,0,0,44.375,4.677Z\"><\/path><path d=\"M55.565,47.354a28.219,28.219,0,0,1-5.217,6.052l1.311,1.517a30.246,30.246,0,0,0,5.588-6.481Z\"><\/path><path d=\"M12.387,54.963l1.308-1.52A28.216,28.216,0,0,1,8.466,47.4l-1.68,1.09A30.2,30.2,0,0,0,12.387,54.963Z\"><\/path><path d=\"M5.109,24.28a28.091,28.091,0,0,1,3.3-7.287L6.721,15.909a30.062,30.062,0,0,0-3.533,7.809Z\"><\/path><path d=\"M57.181,15.755,55.5,16.849a28.068,28.068,0,0,1,3.34,7.267l1.917-.573A30.1,30.1,0,0,0,57.181,15.755Z\"><\/path><path d=\"M60,32.149a28.285,28.285,0,0,1-1.125,7.924l1.919.565A30.321,30.321,0,0,0,62,32.149v-.117H60Z\"><\/path><path d=\"M43.652,57.744A27.763,27.763,0,0,1,36.012,60l.284,1.989a29.712,29.712,0,0,0,8.189-2.42Z\"><\/path><path d=\"M32,4.01a28.364,28.364,0,0,1,3.9.27l.275-1.99A30.3,30.3,0,0,0,32,2h-.01a30.14,30.14,0,0,0-4.346.315L27.932,4.3a28.15,28.15,0,0,1,4.059-.294Z\"><\/path><path d=\"M19.569,59.6a29.707,29.707,0,0,0,8.2,2.4l.28-1.99A27.7,27.7,0,0,1,20.4,57.767Z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCost-Effective\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tBy outsourcing your security operations to Nexa Cyber Security, you can reduce the overhead costs associated with maintaining an in-house security team and infrastructure.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-567410f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"567410f\" data-element_type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e88ed2c\" data-id=\"e88ed2c\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bd003e0 elementor-view-stacked elementor-shape-square elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"bd003e0\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" height=\"512\" viewBox=\"0 0 512 512\" width=\"512\"><path d=\"m504 471.187h-24.113v-308.26c0-4.418-3.582-8-8-8h-65.715c-4.418 0-8 3.582-8 8v308.26h-40.303v-246.214c0-4.418-3.582-8-8-8h-65.714c-4.418 0-8 3.582-8 8v246.214h-40.306v-177.242c0-4.418-3.582-8-8-8h-65.715c-4.418 0-8 3.582-8 8v177.242h-40.307v-111.19c0-4.418-3.582-8-8-8h-65.714c-4.418 0-8 3.582-8 8v111.19h-24.113c-4.418 0-8 3.582-8 8v24.813c0 4.418 3.582 8 8 8h496c4.418 0 8-3.582 8-8v-24.813c0-4.419-3.582-8-8-8zm-89.828-300.26h49.715v300.26h-49.715zm-122.017 62.046h49.714v238.214h-49.714zm-122.021 68.972h49.715v169.242h-49.715zm-122.021 66.052h49.714v103.19h-49.714zm447.887 128.003h-480v-8.813h480zm-365.085-226.663c.5.096 1.007.145 1.514.145s1.014-.048 1.514-.145c65.381-12.603 112.836-70.068 112.836-136.64v-88.893c0-3.435-2.192-6.486-5.448-7.582l-106.349-35.804c-1.656-.557-3.449-.557-5.105 0l-106.35 35.804c-3.255 1.096-5.448 4.147-5.448 7.582v88.894c0 66.571 47.455 124.036 112.836 136.639zm-96.836-219.785 98.35-33.111 98.35 33.111v83.146c0 58.403-41.266 108.886-98.35 120.627-57.083-11.741-98.35-62.224-98.35-120.627zm59.111 149.331 13.117-9.497c1.94.929 3.927 1.753 5.954 2.469l2.559 15.986c.621 3.881 3.969 6.735 7.899 6.735h19.42c3.93 0 7.278-2.855 7.899-6.736l2.559-15.987c2.026-.716 4.013-1.54 5.953-2.468l13.117 9.497c3.183 2.304 7.569 1.956 10.348-.823l13.732-13.732c2.779-2.779 3.128-7.165.823-10.348l-9.497-13.117c.929-1.94 1.753-3.927 2.469-5.953l15.986-2.559c3.881-.621 6.736-3.969 6.736-7.899v-19.42c0-3.93-2.855-7.278-6.736-7.899l-15.987-2.559c-.716-2.026-1.54-4.013-2.469-5.953l9.497-13.117c2.305-3.183 1.956-7.569-.823-10.348l-13.732-13.732c-2.779-2.779-7.165-3.128-10.348-.823l-13.117 9.497c-1.94-.929-3.927-1.753-5.953-2.469l-2.559-15.986c-.621-3.881-3.969-6.736-7.899-6.736h-19.42c-3.93 0-7.278 2.854-7.899 6.735l-2.559 15.986c-2.027.716-4.014 1.54-5.954 2.469l-13.116-9.497c-3.184-2.305-7.57-1.957-10.348.823l-13.732 13.732c-2.779 2.779-3.128 7.165-.823 10.349l9.498 13.117c-.929 1.94-1.753 3.927-2.468 5.953l-15.988 2.559c-3.88.621-6.735 3.969-6.735 7.899v19.42c0 3.93 2.855 7.278 6.735 7.899l15.988 2.56c.716 2.026 1.54 4.012 2.468 5.952l-9.498 13.117c-2.305 3.183-1.956 7.569.823 10.348l13.732 13.732c2.78 2.78 7.165 3.128 10.348.824zm-24.598-61.253v-5.778l14.181-2.27c3.148-.504 5.696-2.829 6.486-5.917 1.042-4.074 2.662-7.98 4.815-11.611 1.626-2.743 1.468-6.189-.401-8.772l-8.426-11.637 4.086-4.086 11.636 8.425c2.583 1.871 6.031 2.027 8.773.4 3.63-2.153 7.536-3.773 11.611-4.815 3.089-.79 5.414-3.338 5.918-6.486l2.27-14.179h5.778l2.27 14.179c.504 3.148 2.829 5.696 5.918 6.486 4.072 1.041 7.979 2.661 11.61 4.815 2.742 1.628 6.189 1.469 8.772-.4l11.637-8.426 4.085 4.086-8.425 11.637c-1.87 2.583-2.027 6.029-.401 8.772 2.153 3.63 3.773 7.538 4.815 11.612.79 3.088 3.338 5.413 6.486 5.917l14.18 2.27v5.778l-14.179 2.27c-3.148.504-5.696 2.829-6.486 5.918-1.042 4.073-2.662 7.979-4.815 11.611-1.627 2.743-1.47 6.189.4 8.772l8.425 11.637-4.085 4.086-11.637-8.426c-2.583-1.871-6.031-2.027-8.772-.4-3.628 2.152-7.535 3.772-11.611 4.814-3.088.79-5.413 3.338-5.917 6.486l-2.27 14.18h-5.778l-2.27-14.179c-.504-3.148-2.829-5.696-5.918-6.486-4.072-1.042-7.979-2.662-11.611-4.816-2.743-1.626-6.189-1.469-8.772.401l-11.637 8.425-4.086-4.086 8.426-11.636c1.87-2.583 2.027-6.03.401-8.772-2.152-3.629-3.772-7.537-4.816-11.613-.79-3.088-3.338-5.412-6.485-5.916zm63.837 33.806c20.233 0 36.695-16.461 36.695-36.695 0-20.233-16.461-36.694-36.695-36.694s-36.695 16.461-36.695 36.694c0 20.234 16.462 36.695 36.695 36.695zm0-57.39c11.411 0 20.695 9.283 20.695 20.694 0 11.412-9.284 20.695-20.695 20.695s-20.695-9.284-20.695-20.695c0-11.41 9.284-20.694 20.695-20.694z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tScalable Solutions\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tOur SOCaaS offerings are scalable to accommodate the evolving needs of your organization, whether you're a small business or a large enterprise.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-70f4f24\" data-id=\"70f4f24\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5ea8892 elementor-view-stacked elementor-shape-square elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"5ea8892\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-handshake\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCompliance Assurance\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tRest assured that your security operations are aligned with industry regulations and best practices, ensuring compliance with data protection standards.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bb425f7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bb425f7\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a997c1\" data-id=\"6a997c1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d4d1df3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d4d1df3\" data-element_type=\"section\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6ae1f14 elementor-invisible\" data-id=\"6ae1f14\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8dbf626 elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"8dbf626\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">Why is <span><span>SOCaaS<\/span><\/span> Required?<\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider\"><div class=\"elementskit-border-divider\"><\/div><\/div>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>SOCaaS\u00a0 is essential for several reasons:<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f73e4e2 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"f73e4e2\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-9982ebc\" data-id=\"9982ebc\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a3bbc2 elementor-view-stacked elementor-shape-square elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"7a3bbc2\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewBox=\"0 0 510 510\"><g id=\"Artboard201\"><path d=\"m258.152 94.567 137.184 58.803c2.941 1.261 4.848 4.153 4.848 7.353v110.929c0 81.063-58.996 151.113-138.807 165.027l-4.999.874c-.912.159-1.844.159-2.756 0l-4.995-.874c-79.815-13.914-138.811-83.964-138.811-165.027v-110.929c0-3.2 1.907-6.092 4.848-7.353l137.184-58.803c2.013-.863 4.291-.863 6.304 0zm-3.152 16.056-129.184 55.375v105.654c0 73.322 53.366 136.68 125.559 149.265l3.625.634 3.625-.634c72.193-12.585 125.559-75.943 125.559-149.265v-105.654zm63.013 122.666h4.347c9.962 0 18.04 8.12 18.04 18.04v107.068c0 9.962-8.078 18.04-18.04 18.04h-134.697c-9.957 0-18.063-8.083-18.063-18.04v-107.068c0-9.915 8.106-18.04 18.063-18.04h4.324v-15.11c0-34.661 28.364-63.025 63.025-63.025 34.662 0 63.001 28.363 63.001 63.025zm-110.026 0h9.206v-15.11c0-20.769 17.079-37.842 37.819-37.842 20.739 0 37.818 17.073 37.818 37.842v15.11h9.183v-15.11c0-25.86-21.141-47.025-47.001-47.025-25.862 0-47.025 21.164-47.025 47.025zm25.206 0h43.637v-15.11c0-11.985-9.85-21.842-21.818-21.842s-21.819 9.857-21.819 21.842zm-45.53 16c-1.132 0-2.063.913-2.063 2.04v107.068c0 1.132.931 2.04 2.063 2.04h134.697c1.127 0 2.04-.913 2.04-2.04v-107.068c0-1.122-.913-2.04-2.04-2.04zm67.349 9.369c15.225 0 27.568 12.366 27.568 27.592 0 8.238-3.586 15.618-9.295 20.668v25.877c0 10.069-8.246 18.273-18.273 18.273-10.069 0-18.274-8.204-18.274-18.273 0 0 0-25.876.001-25.875-5.716-5.051-9.319-12.433-9.319-20.67 0-15.223 12.369-27.592 27.592-27.592zm0 16c-6.396 0-11.592 5.196-11.592 11.592 0 4.177 2.208 7.83 5.517 9.87 2.363 1.457 3.801 4.034 3.801 6.809v29.866c0 1.252 1.021 2.273 2.274 2.273 1.247 0 2.273-1.021 2.273-2.273v-29.866c0-2.775 1.439-5.352 3.801-6.809 3.308-2.04 5.494-5.694 5.494-9.87 0-6.393-5.176-11.592-11.568-11.592zm-175.237-267.658c36.5 0 66.132 29.633 66.132 66.132s-29.632 66.132-66.132 66.132c-36.499 0-66.131-29.633-66.131-66.132s29.632-66.132 66.131-66.132zm0 16c-27.668 0-50.131 22.463-50.131 50.132 0 27.668 22.463 50.132 50.131 50.132 27.669 0 50.132-22.464 50.132-50.132 0-27.669-22.463-50.132-50.132-50.132zm-31.509 57.35c-3.125-3.12-3.129-8.189-.01-11.314 3.12-3.125 8.189-3.129 11.314-.01 0 0 9.691 9.676 9.691 9.676l30.998-28.106c3.271-2.966 8.335-2.718 11.301.553 2.965 3.271 2.718 8.335-.553 11.3l-36.637 33.219c-3.159 2.863-8.009 2.747-11.026-.265zm381.959-73.35c36.499 0 66.131 29.633 66.131 66.132s-29.632 66.132-66.131 66.132c-36.5 0-66.132-29.633-66.132-66.132s29.632-66.132 66.132-66.132zm0 16c-27.669 0-50.132 22.463-50.132 50.132 0 27.668 22.463 50.132 50.132 50.132 27.668 0 50.131-22.464 50.131-50.132 0-27.669-22.463-50.132-50.131-50.132zm-31.51 57.35c-3.125-3.12-3.129-8.189-.01-11.314 3.12-3.125 8.189-3.129 11.314-.01 0 0 9.692 9.676 9.692 9.676l30.998-28.106c3.271-2.966 8.334-2.718 11.3.553s2.718 8.335-.553 11.3l-36.637 33.219c-3.159 2.863-8.008 2.747-11.026-.265zm31.51 290.386c36.499 0 66.131 29.633 66.131 66.132s-29.632 66.132-66.131 66.132c-36.5 0-66.132-29.633-66.132-66.132s29.632-66.132 66.132-66.132zm0 16c-27.669 0-50.132 22.464-50.132 50.132 0 27.669 22.463 50.132 50.132 50.132 27.668 0 50.131-22.463 50.131-50.132 0-27.668-22.463-50.132-50.131-50.132zm-31.51 57.35c-3.125-3.119-3.129-8.189-.01-11.314 3.12-3.124 8.189-3.129 11.314-.009 0 0 9.692 9.675 9.692 9.675l30.998-28.106c3.271-2.965 8.334-2.717 11.3.553 2.966 3.271 2.718 8.335-.553 11.301l-36.637 33.218c-3.159 2.864-8.008 2.747-11.026-.265zm-318.94-73.35c36.5 0 66.132 29.633 66.132 66.132s-29.632 66.132-66.132 66.132c-36.499 0-66.131-29.633-66.131-66.132s29.632-66.132 66.131-66.132zm0 16c-27.668 0-50.131 22.464-50.131 50.132 0 27.669 22.463 50.132 50.131 50.132 27.669 0 50.132-22.463 50.132-50.132 0-27.668-22.463-50.132-50.132-50.132zm-31.509 57.35c-3.125-3.119-3.129-8.189-.01-11.314 3.12-3.124 8.189-3.129 11.314-.009 0 0 9.691 9.675 9.691 9.675l30.998-28.106c3.271-2.965 8.335-2.717 11.301.553 2.965 3.271 2.718 8.335-.553 11.301l-36.637 33.218c-3.159 2.864-8.009 2.747-11.026-.265zm12.013-96.781c1.709 4.071-.21 8.764-4.282 10.472-4.071 1.708-8.763-.21-10.472-4.282-11.323-26.988-17.584-56.618-17.584-87.699 0-38.854 9.782-75.441 27.011-107.433 2.094-3.887 6.95-5.344 10.837-3.25 3.888 2.093 5.344 6.949 3.25 10.837-16.012 29.732-25.098 63.737-25.098 99.846 0 28.887 5.814 56.426 16.338 81.509zm276.528 113.087c4.068-1.715 8.764.196 10.478 4.265 1.715 4.069-.196 8.764-4.265 10.479-27.074 11.409-56.816 17.719-88.02 17.719-32.703 0-63.8-6.931-91.903-19.399-4.036-1.79-5.859-6.52-4.069-10.556 1.791-4.036 6.521-5.859 10.557-4.069 26.119 11.587 55.021 18.024 85.415 18.024 29.001 0 56.644-5.86 81.807-16.463zm103.914-294.886c-2.103-3.883-.658-8.742 3.224-10.845 3.883-2.103 8.742-.658 10.845 3.224 17.389 32.106 27.269 68.864 27.269 107.911 0 31.083-6.261 60.715-17.586 87.704-1.709 4.072-6.401 5.99-10.473 4.282-4.071-1.708-5.99-6.401-4.281-10.472 10.525-25.085 16.34-52.626 16.34-81.514 0-36.289-9.177-70.452-25.338-100.29zm-265.554-95.125c-4.086 1.673-8.762-.287-10.435-4.373s.286-8.761 4.372-10.434c26.503-10.852 55.506-16.837 85.896-16.837 31.025 0 60.604 6.238 87.553 17.523 4.073 1.705 5.995 6.396 4.289 10.469-1.705 4.073-6.396 5.995-10.469 4.289-25.046-10.488-52.539-16.281-81.373-16.281-28.245 0-55.201 5.558-79.833 15.644z\"><\/path><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAdvanced Threat Detection\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tSOCaaS employs advanced technologies such as machine learning, behavioral analytics, and threat intelligence to identify suspicious activities and potential security breaches. This proactive approach enables organizations to stay one step ahead of cyber adversaries.\n\n\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-b0968ea\" data-id=\"b0968ea\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f98bd6 elementor-view-stacked elementor-shape-square elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"7f98bd6\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_5\" height=\"512\" viewBox=\"0 0 64 64\" width=\"512\"><path d=\"m41.011 45h1.989v2h-1.989z\"><\/path><path d=\"m37.011 45h2v2h-2z\"><\/path><path d=\"m60.657 5c-2.736 0-5.309-1.065-7.243-3-1.289-1.289-3.539-1.289-4.828 0-1.935 1.935-4.507 3-7.243 3-1.292 0-2.343 1.051-2.343 2.343v4.952c0 .237.018.47.028.705h-21.028c-2.757 0-5 2.243-5 5v20c0 2.099.511 4.076 1.398 5.833l-11.969 11.402c-.908.845-1.429 2.041-1.429 3.282 0 2.471 2.012 4.483 4.483 4.483 1.24 0 2.437-.521 3.273-1.421l11.41-11.977c1.758.887 3.735 1.398 5.834 1.398h7v2h-9.5l-3.5 4.667v5.333h36v-5.333l-3.5-4.667h-9.5v-2h15c2.757 0 5-2.243 5-5v-33.705-.295-4.657c0-1.292-1.051-2.343-2.343-2.343zm-9.999 23.939.342.125.342-.125c2.122-.771 4.028-1.932 5.658-3.376v7.437h-8v8h-10.363c.229-.965.363-1.966.363-3 0-7.168-5.832-13-13-13-2.578 0-4.977.764-7 2.063v-8.063h21.33c1.861 4.526 5.559 8.205 10.328 9.939zm6.342 6.061v6h-6v-6zm-42-17c0-1.654 1.346-3 3-3h21.211c.106.679.262 1.344.444 2h-20.655c-1.103 0-2 .897-2 2v9.641c-.764.735-1.433 1.562-2 2.463zm-7.698 42.208c-.469.503-1.132.792-1.819.792-1.369 0-2.483-1.114-2.483-2.483 0-.687.289-1.35.8-1.826l11.661-11.109c.821 1.138 1.819 2.137 2.958 2.958zm7.698-22.208c0-6.065 4.935-11 11-11s11 4.935 11 11-4.935 11-11 11-11-4.935-11-11zm9.5 17h8.5v2h-10zm-2.5 6v-2h32v2zm29.5-6 1.5 2h-10v-2zm-10.5 2h-6v-6h6zm20-11c0 1.654-1.346 3-3 3h-25.104c2.26-1.422 4.06-3.511 5.101-6h19.003c1.103 0 2-.897 2-2v-17.514c.771-.946 1.437-1.973 2-3.057zm0-33.705c0 6.093-3.564 11.628-9 14.201v-11.496h-2v11.496c-5.436-2.574-9-8.108-9-14.201v-4.952c0-.19.153-.343.343-.343 3.27 0 6.345-1.273 8.657-3.586v5.586h2v-5.586c2.312 2.313 5.387 3.586 8.657 3.586.19 0 .343.153.343.343v4.657z\"><\/path><path d=\"m50 11h2v2h-2z\"><\/path><path d=\"m26 29c-4.963 0-9 4.037-9 9s4.037 9 9 9 9-4.037 9-9-4.037-9-9-9zm0 16c-3.859 0-7-3.141-7-7 0-1.902.765-3.626 2-4.889v2.889c0 1.654 1.346 3 3 3h3v-2h-3c-.552 0-1-.448-1-1v-4.315c.911-.434 1.926-.685 3-.685 3.859 0 7 3.141 7 7s-3.141 7-7 7z\"><\/path><path d=\"m21 21h2v2h-2z\"><\/path><path d=\"m39 24c0-1.654-1.346-3-3-3h-11v2h11c.552 0 1 .448 1 1v3h2z\"><\/path><path d=\"m28 33h-3v2h3c.552 0 1 .448 1 1v3h2v-3c0-1.654-1.346-3-3-3z\"><\/path><path d=\"m53 37h2v2h-2z\"><\/path><path d=\"m45 36c0 .552-.448 1-1 1h-3v2h3c1.654 0 3-1.346 3-3v-3h-2z\"><\/path><path d=\"m43 35v-2h-1c-.552 0-1-.448-1-1v-3h-2v3c0 1.654 1.346 3 3 3z\"><\/path><path d=\"m43 29h4v2h-4z\"><\/path><path d=\"m23 41h6v2h-6z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tExpertise and Experience\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tExpertise and Building an in-house security operations center requires significant investments in hiring and training cybersecurity professionals, as well as acquiring and maintaining the necessary technologies and infrastructure. SOCaaS providers offer access to a team of seasoned cybersecurity experts with specialized skills and experience in threat detection and response.\n\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-a6bb54d\" data-id=\"a6bb54d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3500c5d elementor-view-stacked elementor-shape-square elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"3500c5d\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_3\" data-name=\"Layer 3\" viewBox=\"0 0 64 64\" width=\"512\" height=\"512\"><path d=\"M31,31a1,1,0,0,0,.641-.232l4.318-3.6A22.288,22.288,0,0,0,44,10a1,1,0,0,0-1-1h-.6A17.314,17.314,0,0,1,31.625,5.219a1,1,0,0,0-1.25,0A17.314,17.314,0,0,1,19.6,9H19a1,1,0,0,0-1,1,22.285,22.285,0,0,0,8.041,17.168l4.318,3.6A1,1,0,0,0,31,31ZM20.024,11A19.329,19.329,0,0,0,31,7.26,19.334,19.334,0,0,0,41.976,11a20.284,20.284,0,0,1-7.3,14.637L31,28.7l-3.679-3.065A20.283,20.283,0,0,1,20.024,11Z\"><\/path><path d=\"M31.65,25.759l3.129-2.681a15.838,15.838,0,0,0,5.2-8.882A1,1,0,0,0,39,13a11.069,11.069,0,0,1-6.6-2.2l-.8-.6a1,1,0,0,0-1.2,0l-.8.6A11.074,11.074,0,0,1,23,13a1,1,0,0,0-.98,1.2,15.838,15.838,0,0,0,5.2,8.882l3.129,2.681a1,1,0,0,0,1.3,0Zm-3.129-4.2a13.839,13.839,0,0,1-4.262-6.621A13.106,13.106,0,0,0,30.8,12.4l.2-.15.2.15a13.1,13.1,0,0,0,6.541,2.538,13.839,13.839,0,0,1-4.262,6.621L31,23.683Z\"><\/path><path d=\"M62,35H53V2a1,1,0,0,0-1-1H10A1,1,0,0,0,9,2V27H2a1,1,0,0,0-1,1V58a5.006,5.006,0,0,0,5,5H48a5.006,5.006,0,0,0,5-5V55h9a1,1,0,0,0,1-1V36A1,1,0,0,0,62,35ZM3,58V29H9V58a3,3,0,0,1-6,0Zm48,0a3,3,0,0,1-3,3H9.974A4.948,4.948,0,0,0,11,58V3H51V35H50a1,1,0,0,0-1,1v1H46.414L43,33.586V28a1,1,0,0,0-1-1H41a4,4,0,0,0-4,4v6H30a3,3,0,0,0-3,3V52a3,3,0,0,0,3,3H42a1,1,0,0,0,.447-.1L46.236,53H49v1a1,1,0,0,0,1,1h1Zm-2-7H46a1,1,0,0,0-.447.1L41.764,53H30a1,1,0,0,1-1-1V51h8V49H29V47h8V45H29V43h8V41H29V40a1,1,0,0,1,1-1h8a1,1,0,0,0,1-1V31a2,2,0,0,1,2-2v5a1,1,0,0,0,.293.707l4,4A1,1,0,0,0,46,39h3Zm12,2H51V37H61Z\"><\/path><path d=\"M22.46,31.126A.974.974,0,0,0,22,31H14a1,1,0,0,0-1,1v8a1,1,0,0,0,1,1h8a1,1,0,0,0,1-1V33.414l2.707-2.707-1.414-1.414ZM21,39H15V33h5.586L18,35.586l-1.293-1.293-1.414,1.414,2,2a1,1,0,0,0,1.414,0L21,35.414Z\"><\/path><path d=\"M24.293,41.293,22.46,43.126A.971.971,0,0,0,22,43H14a1,1,0,0,0-1,1v8a1,1,0,0,0,1,1h8a1,1,0,0,0,1-1V45.414l2.707-2.707ZM21,51H15V45h5.586L18,47.586l-1.293-1.293-1.414,1.414,2,2a1,1,0,0,0,1.414,0L21,47.414Z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tContinuous Monitoring\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tCyber threats evolve rapidly, and traditional security measures are often insufficient to detect and respond to sophisticated attacks. SOCaaS provides round-the-clock monitoring of your systems and networks, ensuring timely detection of potential threats.\n\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-fcb8b6d\" data-id=\"fcb8b6d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-940c56b elementor-view-stacked elementor-shape-square elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"940c56b\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" data-name=\"Layer 1\" viewBox=\"0 0 64 64\" width=\"512\" height=\"512\"><path d=\"M41,28a2,2,0,0,0-2-2H38V24H36v2H34V24H32v2H31a2,2,0,0,0-2,2v1H27v2h2v2H27v2h2v1a2,2,0,0,0,2,2h1v2h2V38h2v2h2V38h1a2,2,0,0,0,2-2V35h2V33H41V31h2V29H41ZM31,36V28h8v8Z\"><\/path><path d=\"M35,19A13,13,0,1,0,48,32,13.015,13.015,0,0,0,35,19Zm0,24A11,11,0,1,1,46,32,11.013,11.013,0,0,1,35,43Z\"><\/path><path d=\"M4.5,8A3.5,3.5,0,1,0,1,4.5,3.5,3.5,0,0,0,4.5,8Zm0-5A1.5,1.5,0,1,1,3,4.5,1.5,1.5,0,0,1,4.5,3Z\"><\/path><path d=\"M4.5,35.5A3.5,3.5,0,1,0,1,32,3.5,3.5,0,0,0,4.5,35.5Zm0-5A1.5,1.5,0,1,1,3,32,1.5,1.5,0,0,1,4.5,30.5Z\"><\/path><path d=\"M4.5,63A3.5,3.5,0,1,0,1,59.5,3.5,3.5,0,0,0,4.5,63Zm0-5A1.5,1.5,0,1,1,3,59.5,1.5,1.5,0,0,1,4.5,58Z\"><\/path><path d=\"M4.5,49A3.5,3.5,0,1,0,1,45.5,3.5,3.5,0,0,0,4.5,49Zm0-5A1.5,1.5,0,1,1,3,45.5,1.5,1.5,0,0,1,4.5,44Z\"><\/path><path d=\"M4.5,22A3.5,3.5,0,1,0,1,18.5,3.5,3.5,0,0,0,4.5,22Zm0-5A1.5,1.5,0,1,1,3,18.5,1.5,1.5,0,0,1,4.5,17Z\"><\/path><path d=\"M62.515,31.143l-5-3A1,1,0,0,0,56,29v2H50v2h6v2a1,1,0,0,0,1.515.857l5-3a1,1,0,0,0,0-1.714ZM58,33.234V30.766L60.056,32Z\"><\/path><rect x=\"10\" y=\"31\" width=\"10\" height=\"2\"><\/rect><path d=\"M10,19.5h2.267l2.779,8.8A1,1,0,0,0,16,29h4V27H16.733l-2.779-8.8A1,1,0,0,0,13,17.5H10Z\"><\/path><path d=\"M19,25h3V23H19.739L13.956,4.206A1,1,0,0,0,13,3.5H10v2h2.261l5.783,18.794A1,1,0,0,0,19,25Z\"><\/path><path d=\"M10,46.5h3a1,1,0,0,0,.954-.7L16.733,37H20V35H16a1,1,0,0,0-.954.7l-2.779,8.8H10Z\"><\/path><path d=\"M10,60.5h3a1,1,0,0,0,.956-.706L19.739,41H22V39H19a1,1,0,0,0-.956.706L12.261,58.5H10Z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tRegulatory Compliance\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tMany industries are subject to regulatory requirements regarding incident response, breach notification, and data protection. Compromise assessment helps organizations demonstrate compliance with regulations such as GDPR, HIPAA, PCI DSS, and others by identifying and responding to security breaches in a timely and effective manner.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-807c507 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"807c507\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2765bd1 elementor-invisible\" data-id=\"2765bd1\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c63ef7 elementor-widget elementor-widget-heading\" data-id=\"1c63ef7\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect Your Digital Assets with Nexa Cyber Security's SOCaaS Solution\n\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aeed7d2 elementor-widget elementor-widget-text-editor\" data-id=\"aeed7d2\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<div class=\"w-full text-token-text-primary\" data-testid=\"conversation-turn-7\"><div class=\"px-4 py-2 justify-center text-base md:gap-6 m-auto\"><div class=\"flex flex-1 text-base mx-auto gap-3 md:px-5 lg:px-1 xl:px-5 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem] group final-completion\"><div class=\"relative flex w-full flex-col agent-turn\"><div class=\"flex-col gap-1 md:gap-3\"><div class=\"flex flex-grow flex-col max-w-full\"><div class=\"min-h-[20px] text-message flex flex-col items-start gap-3 whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 overflow-x-auto\" data-message-author-role=\"assistant\" data-message-id=\"ea4f37b8-e76b-4e51-9128-78f91cc98093\"><div class=\"markdown prose w-full break-words dark:prose-invert light\"><p>Don&#8217;t wait until it&#8217;s too late. Protect your digital assets and mitigate cyber risks with Nexa Cyber Security&#8217;s SOCaaS solution. Partner with us today and gain the confidence of knowing that your organization is fortified against the ever-present threat of cyber attacks. Contact us now to learn more.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6effcbb elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6effcbb\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/nexacybersecurity.com\/index.php\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-532f623 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"532f623\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-09c350f\" data-id=\"09c350f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1443de9 elementor-widget elementor-widget-heading\" data-id=\"1443de9\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQ - Compromise Assessment Service by Nexa Cyber Security\n\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd69e7a elementor-widget elementor-widget-accordion\" data-id=\"cd69e7a\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-accordion{text-align:start}.elementor-accordion .elementor-accordion-item{border:1px solid #d5d8dc}.elementor-accordion .elementor-accordion-item+.elementor-accordion-item{border-top:none}.elementor-accordion .elementor-tab-title{margin:0;padding:15px 20px;font-weight:700;line-height:1;cursor:pointer;outline:none}.elementor-accordion .elementor-tab-title .elementor-accordion-icon{display:inline-block;width:1.5em}.elementor-accordion .elementor-tab-title .elementor-accordion-icon svg{width:1em;height:1em}.elementor-accordion .elementor-tab-title .elementor-accordion-icon.elementor-accordion-icon-right{float:right;text-align:right}.elementor-accordion .elementor-tab-title .elementor-accordion-icon.elementor-accordion-icon-left{float:left;text-align:left}.elementor-accordion .elementor-tab-title .elementor-accordion-icon .elementor-accordion-icon-closed{display:block}.elementor-accordion .elementor-tab-title .elementor-accordion-icon .elementor-accordion-icon-opened,.elementor-accordion .elementor-tab-title.elementor-active .elementor-accordion-icon-closed{display:none}.elementor-accordion .elementor-tab-title.elementor-active .elementor-accordion-icon-opened{display:block}.elementor-accordion .elementor-tab-content{display:none;padding:15px 20px;border-top:1px solid #d5d8dc}@media (max-width:767px){.elementor-accordion .elementor-tab-title{padding:12px 15px}.elementor-accordion .elementor-tab-title .elementor-accordion-icon{width:1.2em}.elementor-accordion .elementor-tab-content{padding:7px 15px}}.e-con-inner>.elementor-widget-accordion,.e-con>.elementor-widget-accordion{width:var(--container-widget-width);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2151\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2151\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-caret-square-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is SOCaaS, and how does it work?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2151\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2151\"><p>SOCaaS stands for Security Operations Center as a Service. It&#8217;s a comprehensive cybersecurity solution where a dedicated team of experts monitors your systems and networks 24\/7 for potential security threats. This team employs advanced technologies and methodologies to detect, analyze, and respond to security incidents in real-time, helping to protect your organization from cyber attacks.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2152\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2152\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-caret-square-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Why should I choose Nexa Cyber Security's SOCaaS over other cybersecurity solutions?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2152\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2152\"><p>Nexa Cyber Security&#8217;s SOCaaS offers a unique blend of expertise, advanced technology, and cost-effectiveness. Our team comprises seasoned cybersecurity professionals with years of experience in threat detection and incident response. We leverage cutting-edge technologies to provide proactive cybersecurity protection, and our SOCaaS solution is scalable and adaptable to meet the evolving needs of your organization.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2153\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2153\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-caret-square-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What types of cyber threats does SOCaaS protect against?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2153\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2153\"><p>Our SOCaaS solution is designed to protect against a wide range of cyber threats, including malware, ransomware, phishing attacks, insider threats, and more. By continuously monitoring your systems and networks, we can detect and mitigate both known and emerging threats, helping to safeguard your digital assets from cyber attacks.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2154\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-2154\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-caret-square-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How does Nexa Cyber Security ensure the security and privacy of my data?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2154\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-2154\"><p>At Nexa Cyber Security, we take the security and privacy of your data seriously. We adhere to industry best practices and compliance standards to ensure the confidentiality, integrity, and availability of your data. Additionally, our SOCaaS solution is equipped with robust security measures, such as encryption, access controls, and regular security audits, to protect your sensitive information from unauthorized access or disclosure.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2155\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-2155\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-caret-square-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Is SOCaaS suitable for organizations of all sizes?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2155\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-2155\"><p>Yes, SOCaaS is suitable for organizations of all sizes, from small businesses to large enterprises. Our SOCaaS solution is scalable and customizable to accommodate the unique needs and budget constraints of your organization. Whether you&#8217;re a startup looking to establish a strong cybersecurity foundation or a multinational corporation seeking to enhance your existing security posture, Nexa Cyber Security&#8217;s SOCaaS can provide the tailored protection you need.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-24bca9f\" data-id=\"24bca9f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b5679ab elementor-widget elementor-widget-image\" data-id=\"b5679ab\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"727\" src=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/26763974_2112.i301.022.S.m004.c13.Support-faq-concepts-isometric-composition-min-1024x931.jpg\" class=\"attachment-large size-large wp-image-568\" alt=\"\" srcset=\"https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/26763974_2112.i301.022.S.m004.c13.Support-faq-concepts-isometric-composition-min-1024x931.jpg 1024w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/26763974_2112.i301.022.S.m004.c13.Support-faq-concepts-isometric-composition-min-300x273.jpg 300w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/26763974_2112.i301.022.S.m004.c13.Support-faq-concepts-isometric-composition-min-768x698.jpg 768w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/26763974_2112.i301.022.S.m004.c13.Support-faq-concepts-isometric-composition-min-1536x1396.jpg 1536w, https:\/\/nexacybersecurity.com\/wp-content\/uploads\/2024\/02\/26763974_2112.i301.022.S.m004.c13.Support-faq-concepts-isometric-composition-min.jpg 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>We provide innovative solutions for your security needs. Our Services What is SOCaaS SOCaaS, or Security Operations Center as a Service, is a comprehensive cybersecurity solution that outsources the management of security operations to a dedicated team of experts. With SOCaaS, organizations can benefit from continuous monitoring, threat detection, and incident response without the need [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1199","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/1199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/comments?post=1199"}],"version-history":[{"count":34,"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/1199\/revisions"}],"predecessor-version":[{"id":1237,"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/1199\/revisions\/1237"}],"wp:attachment":[{"href":"https:\/\/nexacybersecurity.com\/index.php\/wp-json\/wp\/v2\/media?parent=1199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}