{"id":1311,"date":"2023-08-13T09:37:44","date_gmt":"2023-08-13T09:37:44","guid":{"rendered":"https:\/\/validthemes.net\/themeforest\/wp\/consua\/?post_type=consua_tab&#038;p=1311"},"modified":"2024-04-17T14:19:35","modified_gmt":"2024-04-17T08:49:35","slug":"banking-services","status":"publish","type":"consua_tab","link":"https:\/\/esotas.com\/index.php\/all-tabs\/banking-services\/","title":{"rendered":"Banking services"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1311\" class=\"elementor elementor-1311\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-097c7ff elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"097c7ff\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-54a498c\" data-id=\"54a498c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-906db99 elementor-widget elementor-widget-consua_service\" data-id=\"906db99\" data-element_type=\"widget\" data-widget_type=\"consua_service.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t<div class=\"row\">\r\n\r\n\t\t\t        <!-- Single Item -->\r\n\t        <div class=\"col-lg-6 col-md-6 mt-60 mt-md-30 mt-xs-30\">\r\n\t            <div class=\"services-style-one\">\r\n\t                                        <i class=\"flaticon-budget\"><\/i>\r\n\t                                                            \t                <h4><a href=\"https:\/\/esotas.com\/DT\">Clear Objective<\/a><\/h4>\r\n\t                <p>\r\n\t                    Cybersecurity must leverage the full potential of latest technology innovations and services in automation, Gen AI, machine learning, analytics, and cloud-based solutions \t                <\/p>\r\n\t            <\/div>\r\n\t        <\/div>\r\n\t        <!-- End Single Item -->\r\n       \t\t        <!-- Single Item -->\r\n\t        <div class=\"col-lg-6 col-md-6 mt-60 mt-md-30 mt-xs-30\">\r\n\t            <div class=\"services-style-one\">\r\n\t                                        <i class=\"flaticon-world-globe\"><\/i>\r\n\t                                                            \t                <h4><a href=\"https:\/\/esotas.com\/DT\">Advice on your Security Strategy<\/a><\/h4>\r\n\t                <p>\r\n\t                    We advice by reviewing your existing software stack across including the cybersecurity strategy, best cyber security practices, implementations, managed security services, and solutions so that you can know the weaknesses or gaps in the security infrastructure and functioning \t                <\/p>\r\n\t            <\/div>\r\n\t        <\/div>\r\n\t        <!-- End Single Item -->\r\n       \t\t        <!-- Single Item -->\r\n\t        <div class=\"col-lg-6 col-md-6 mt-60 mt-md-30 mt-xs-30\">\r\n\t            <div class=\"services-style-one\">\r\n\t                                        <i class=\"flaticon-funds\"><\/i>\r\n\t                                                            \t                <h4><a href=\"https:\/\/esotas.com\/DT\">What we review <\/a><\/h4>\r\n\t                <p>\r\n\t                    In the ever evolving landscape of cybersecurity, staying ahead of potential threats is crucial. Regular assessments, updates, and continuous monitoring are key to maintaining a secure digital environment. Zero trust, Governance, risk and compliance, digital identity management, digital workplace security, physical assets devices security, enterprise security-as-a-service, incident response and rapid recovery privacy and data protection, secure cloud transformation, threat detection and response vulnerability management, etc., \t                <\/p>\r\n\t            <\/div>\r\n\t        <\/div>\r\n\t        <!-- End Single Item -->\r\n       \t\t        <!-- Single Item -->\r\n\t        <div class=\"col-lg-6 col-md-6 mt-60 mt-md-30 mt-xs-30\">\r\n\t            <div class=\"services-style-one\">\r\n\t                                        <i class=\"flaticon-career\"><\/i>\r\n\t                                                            \t                <h4><a href=\"https:\/\/esotas.com\/DT\">Cyber resilience<\/a><\/h4>\r\n\t                <p>\r\n\t                    Every organization is unique with different security requirements. Thus A one-size-fits-all approach to Cyber resilience is not practical and does not serve the purpose \t                <\/p>\r\n\t            <\/div>\r\n\t        <\/div>\r\n\t        <!-- End Single Item -->\r\n       \t \r\n    <\/div>\t\r\n\r\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Clear Objective Cybersecurity must leverage the full potential of latest technology innovations and services in automation, Gen AI, machine learning, analytics, and cloud-based solutions Advice on your Security Strategy We advice by reviewing your existing software stack across including the cybersecurity strategy, best cyber security practices, implementations, managed security services, and solutions so that you&#8230;<\/p>\n","protected":false},"featured_media":0,"template":"elementor_canvas","class_list":["post-1311","consua_tab","type-consua_tab","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/esotas.com\/index.php\/wp-json\/wp\/v2\/consua_tab\/1311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/esotas.com\/index.php\/wp-json\/wp\/v2\/consua_tab"}],"about":[{"href":"https:\/\/esotas.com\/index.php\/wp-json\/wp\/v2\/types\/consua_tab"}],"version-history":[{"count":0,"href":"https:\/\/esotas.com\/index.php\/wp-json\/wp\/v2\/consua_tab\/1311\/revisions"}],"wp:attachment":[{"href":"https:\/\/esotas.com\/index.php\/wp-json\/wp\/v2\/media?parent=1311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}