{"id":3186,"date":"2024-07-02T06:29:38","date_gmt":"2024-07-02T03:29:38","guid":{"rendered":"https:\/\/www.temp.esnadtech.sa\/?page_id=3186"},"modified":"2025-11-04T18:24:30","modified_gmt":"2025-11-04T15:24:30","slug":"cybersecurity-services","status":"publish","type":"page","link":"https:\/\/www.temp.esnadtech.sa\/en\/cybersecurity-services\/","title":{"rendered":"Cybersecurity Services"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3186\" class=\"elementor elementor-3186 elementor-919\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"wd-negative-gap elementor-element elementor-element-e745e19 wd-section-stretch elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"e745e19\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<link rel=\"stylesheet\" id=\"wd-mod-animations-keyframes-css\" href=\"https:\/\/www.temp.esnadtech.sa\/wp-content\/themes\/woodmart\/css\/parts\/mod-animations-keyframes.min.css?ver=7.5.1\" type=\"text\/css\" media=\"all\" \/> \t\t\t\t\t<div class=\"elementor-element elementor-element-146cd9f elementor-widget-divider--view-line_text elementor-widget-divider--element-align-center elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"146cd9f\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<h1 class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\tCybersecurity Services\t\t\t\t<\/h1>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-9128b26 e-flex e-con-boxed e-con e-parent\" data-id=\"9128b26\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-c70bcf0 e-flex e-con-boxed e-con e-child\" data-id=\"c70bcf0\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11c76c8 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"11c76c8\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"948\" src=\"https:\/\/www.temp.esnadtech.sa\/wp-content\/themes\/woodmart\/images\/lazy.png\" class=\"elementor-animation-bob attachment-large size-large wp-image-26176 wd-lazy-load wd-lazy-none\" alt=\"Discover EON Technology trusted cybersecurity services designed to protect your business, secure sensitive data, prevent cyber threats, and ensure compliance.\" srcset=\"\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" data-wood-src=\"https:\/\/www.temp.esnadtech.sa\/wp-content\/uploads\/2025\/11\/tech-socail7-min-1024x948.png\" data-srcset=\"https:\/\/www.temp.esnadtech.sa\/wp-content\/uploads\/2025\/11\/tech-socail7-min-1024x948.png 1024w, https:\/\/www.temp.esnadtech.sa\/wp-content\/uploads\/2025\/11\/tech-socail7-min-300x278.png 300w, https:\/\/www.temp.esnadtech.sa\/wp-content\/uploads\/2025\/11\/tech-socail7-min-768x711.png 768w, https:\/\/www.temp.esnadtech.sa\/wp-content\/uploads\/2025\/11\/tech-socail7-min.png 1080w\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-92c3d68 e-flex e-con-boxed e-con e-child\" data-id=\"92c3d68\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-765a8f6 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"765a8f6\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Services:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc249fc text-center elementor-hidden-desktop color-scheme-inherit elementor-widget elementor-widget-text-editor\" data-id=\"fc249fc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Cybersecurity services encompass a range of solutions and services aimed at protecting data and digital systems from cyber threats, which have become a significant challenge today due to the vast number of devices and data. Additionally, cyber attackers have become more innovative in executing their attacks.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa07f39 elementor-hidden-tablet elementor-hidden-mobile color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"fa07f39\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Cybersecurity services encompass a range of solutions and services aimed at protecting data and digital systems from cyber threats, which have become a significant challenge today due to the vast number of devices and data. Additionally, cyber attackers have become more innovative in executing their attacks.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fddd38 elementor-align-left elementor-invisible elementor-widget elementor-widget-button\" data-id=\"1fddd38\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.temp.esnadtech.sa\/en\/contact-us\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-arrow-alt-circle-right\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256C504 119 393 8 256 8S8 119 8 256s111 248 248 248 248-111 248-248zm-448 0c0-110.5 89.5-200 200-200s200 89.5 200 200-89.5 200-200 200S56 366.5 56 256zm72 20v-40c0-6.6 5.4-12 12-12h116v-67c0-10.7 12.9-16 20.5-8.5l99 99c4.7 4.7 4.7 12.3 0 17l-99 99c-7.6 7.6-20.5 2.2-20.5-8.5v-67H140c-6.6 0-12-5.4-12-12z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"wd-negative-gap elementor-section elementor-top-section elementor-element elementor-element-12b52c6 wd-section-stretch elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"12b52c6\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-530f182\" data-id=\"530f182\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fab0e49 elementor-widget elementor-widget-heading\" data-id=\"fab0e49\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mechanism of Cybersecurity Services:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-4f5976c e-flex e-con-boxed e-con e-parent\" data-id=\"4f5976c\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-6d930ab e-flex e-con-boxed e-con e-child\" data-id=\"6d930ab\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d1d103 elementor-invisible elementor-widget elementor-widget-wd_infobox\" data-id=\"3d1d103\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"wd_infobox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t<link rel=\"stylesheet\" id=\"wd-info-box-css\" href=\"https:\/\/www.temp.esnadtech.sa\/wp-content\/themes\/woodmart\/css\/parts\/el-info-box.min.css?ver=7.5.1\" type=\"text\/css\" media=\"all\" \/> \t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t<div class=\"wd-info-box text-left box-icon-align-left box-style-base color-scheme- wd-items-top\">\n\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-text text-size-large box-icon-simple\">\n\t\t\t\t\t\t<div class=\"info-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t03\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3\t\t\t\t\t\tclass=\"info-box-title title box-title-style-default wd-fontsize-m\" data-elementor-setting-key=\"title\">\n\t\t\t\t\t\t\t\tImplementing security controls:\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"data-elementor-setting-key=\"content\"><p>Implementing technologies such as firewalls, intrusion detection \/prevention systems (IDS\/IPS), and data encryption to prevent cyber attacks.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-383046d e-flex e-con-boxed e-con e-child\" data-id=\"383046d\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0eb4481 elementor-invisible elementor-widget elementor-widget-wd_infobox\" data-id=\"0eb4481\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"wd_infobox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t<div class=\"wd-info-box text-left box-icon-align-left box-style-base color-scheme- wd-items-top\">\n\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-text text-size-large box-icon-simple\">\n\t\t\t\t\t\t<div class=\"info-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t02\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3\t\t\t\t\t\tclass=\"info-box-title title box-title-style-default wd-fontsize-m\" data-elementor-setting-key=\"title\">\n\t\t\t\t\t\t\t\tRisk assessment:\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"data-elementor-setting-key=\"content\"><p>Analyzing potential risks such as internal and external threats, security vulnerabilities, and estimating their impact on the assets.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-b4d1150 e-flex e-con-boxed e-con e-child\" data-id=\"b4d1150\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-18b47d4 elementor-invisible elementor-widget elementor-widget-wd_infobox\" data-id=\"18b47d4\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"wd_infobox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t<div class=\"wd-info-box text-left box-icon-align-left box-style-base color-scheme- wd-items-top\">\n\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-text text-size-large box-icon-simple\">\n\t\t\t\t\t\t<div class=\"info-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t01\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3\t\t\t\t\t\tclass=\"info-box-title title box-title-style-default wd-fontsize-m\" data-elementor-setting-key=\"title\">\n\t\t\t\t\t\t\t\tIdentifying sensitive digital assets:\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"data-elementor-setting-key=\"content\"><p>Identifying the systems, data, and infrastructure that need protection from cyber attacks.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-10df517 e-flex e-con-boxed e-con e-parent\" data-id=\"10df517\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-9558133 e-flex e-con-boxed e-con e-child\" data-id=\"9558133\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41b23f8 elementor-invisible elementor-widget elementor-widget-wd_infobox\" data-id=\"41b23f8\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"wd_infobox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t<div class=\"wd-info-box text-left box-icon-align-left box-style-base color-scheme- wd-items-top\">\n\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-text text-size-large box-icon-simple\">\n\t\t\t\t\t\t<div class=\"info-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t06\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3\t\t\t\t\t\tclass=\"info-box-title title box-title-style-default wd-fontsize-m\" data-elementor-setting-key=\"title\">\n\t\t\t\t\t\t\t\tAwareness and training:\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"data-elementor-setting-key=\"content\"><p>Training employees on good cybersecurity practices, such as avoiding phishing emails and not downloading untrusted software.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-a2ee30e e-flex e-con-boxed e-con e-child\" data-id=\"a2ee30e\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b50c95 elementor-invisible elementor-widget elementor-widget-wd_infobox\" data-id=\"4b50c95\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"wd_infobox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t<div class=\"wd-info-box text-left box-icon-align-left box-style-base color-scheme- wd-items-top\">\n\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-text text-size-large box-icon-simple\">\n\t\t\t\t\t\t<div class=\"info-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t05\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3\t\t\t\t\t\tclass=\"info-box-title title box-title-style-default wd-fontsize-m\" data-elementor-setting-key=\"title\">\n\t\t\t\t\t\t\t\tUpdates and maintenance:\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"data-elementor-setting-key=\"content\"><p>Keeping systems and software updated continuously to address security vulnerabilities and reduce weaknesses.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-30c589b e-flex e-con-boxed e-con e-child\" data-id=\"30c589b\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-95ec7a6 elementor-invisible elementor-widget elementor-widget-wd_infobox\" data-id=\"95ec7a6\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"wd_infobox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t<div class=\"wd-info-box text-left box-icon-align-left box-style-base color-scheme- wd-items-top\">\n\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-text text-size-large box-icon-simple\">\n\t\t\t\t\t\t<div class=\"info-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t04\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3\t\t\t\t\t\tclass=\"info-box-title title box-title-style-default wd-fontsize-m\" data-elementor-setting-key=\"title\">\n\t\t\t\t\t\t\t\tContinuous monitoring:\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"data-elementor-setting-key=\"content\"><p>Constantly monitoring networks and systems using activity analysis tools to detect any suspicious activity or intrusion attempts.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-8b12bb3 e-flex e-con-boxed e-con e-parent\" data-id=\"8b12bb3\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-63a4ab1 elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-child\" data-id=\"63a4ab1\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-44f2124 e-flex e-con-boxed e-con e-child\" data-id=\"44f2124\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17def0a elementor-invisible elementor-widget elementor-widget-wd_infobox\" data-id=\"17def0a\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"wd_infobox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t<div class=\"wd-info-box text-left box-icon-align-left box-style-base color-scheme- wd-items-top\">\n\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-text text-size-large box-icon-simple\">\n\t\t\t\t\t\t<div class=\"info-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t08\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3\t\t\t\t\t\tclass=\"info-box-title title box-title-style-default wd-fontsize-m\" data-elementor-setting-key=\"title\">\n\t\t\t\t\t\t\t\tData recovery and backup:\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"data-elementor-setting-key=\"content\"><p>Establishing a regular backup plan for important data and defining data recovery strategies in case of any attacks.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-8ba103b e-flex e-con-boxed e-con e-child\" data-id=\"8ba103b\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a12e207 elementor-invisible elementor-widget elementor-widget-wd_infobox\" data-id=\"a12e207\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"wd_infobox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t<div class=\"wd-info-box text-left box-icon-align-left box-style-base color-scheme- wd-items-top\">\n\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-text text-size-large box-icon-simple\">\n\t\t\t\t\t\t<div class=\"info-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t07\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3\t\t\t\t\t\tclass=\"info-box-title title box-title-style-default wd-fontsize-m\" data-elementor-setting-key=\"title\">\n\t\t\t\t\t\t\t\tRegular testing (Penetration Testing):\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"data-elementor-setting-key=\"content\"><p>Conducting regular tests on systems to simulate real attacks and identify any exploitable vulnerabilities.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"wd-negative-gap elementor-section elementor-top-section elementor-element elementor-element-7c339cc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7c339cc\" data-element_type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9fb8fe4\" data-id=\"9fb8fe4\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c0e5422 elementor-widget elementor-widget-heading\" data-id=\"c0e5422\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Benefits of Cybersecurity services:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c9444e color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"5c9444e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The benefits that companies and organizations gain from utilizing cybersecurity services are numerous and include the following:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8688048 elementor-widget__width-inherit elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"8688048\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 56c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m0-48C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 168c-44.183 0-80 35.817-80 80s35.817 80 80 80 80-35.817 80-80-35.817-80-80-80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Protection of sensitive data.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 56c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m0-48C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 168c-44.183 0-80 35.817-80 80s35.817 80 80 80 80-35.817 80-80-35.817-80-80-80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Building trust.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 56c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m0-48C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 168c-44.183 0-80 35.817-80 80s35.817 80 80 80 80-35.817 80-80-35.817-80-80-80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Protection from internal threats.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 56c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m0-48C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 168c-44.183 0-80 35.817-80 80s35.817 80 80 80 80-35.817 80-80-35.817-80-80-80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Prevention of cyber attacks.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 56c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m0-48C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 168c-44.183 0-80 35.817-80 80s35.817 80 80 80 80-35.817 80-80-35.817-80-80-80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Reducing financial losses.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a18e5ce elementor-align-left elementor-invisible elementor-widget elementor-widget-button\" data-id=\"a18e5ce\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.temp.esnadtech.sa\/en\/contact-us\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-arrow-alt-circle-right\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256C504 119 393 8 256 8S8 119 8 256s111 248 248 248 248-111 248-248zm-448 0c0-110.5 89.5-200 200-200s200 89.5 200 200-89.5 200-200 200S56 366.5 56 256zm72 20v-40c0-6.6 5.4-12 12-12h116v-67c0-10.7 12.9-16 20.5-8.5l99 99c4.7 4.7 4.7 12.3 0 17l-99 99c-7.6 7.6-20.5 2.2-20.5-8.5v-67H140c-6.6 0-12-5.4-12-12z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-795a17a\" data-id=\"795a17a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"wd-negative-gap elementor-section elementor-inner-section elementor-element elementor-element-76ba772 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"76ba772\" data-element_type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3b73a33\" data-id=\"3b73a33\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8e081d8 elementor-invisible elementor-widget elementor-widget-wd_infobox\" data-id=\"8e081d8\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"wd_infobox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t<div class=\"wd-info-box text-left box-icon-align-left box-style-base color-scheme- wd-items-top\">\n\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t<div class=\"info-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width:40px; height:40px;\"><img loading=\"lazy\" decoding=\"async\"  alt=\"Automating tasks and reducing human intervention enhance business productivity and performance quality.\" src=\"https:\/\/www.temp.esnadtech.sa\/wp-content\/uploads\/2024\/07\/Picture9.svg\" title=\"Automating manual processes to increase productivity and reduce errors.\" width=\"40\" height=\"40\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3\t\t\t\t\t\tclass=\"info-box-title title box-title-style-default wd-fontsize-m\" data-elementor-setting-key=\"title\">\n\t\t\t\t\t\t\t\tProtection of sensitive data:\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"data-elementor-setting-key=\"content\"><p>Cybersecurity ensures the protection of personal and financial information from theft and unauthorized access.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-be9a775\" data-id=\"be9a775\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52fb8d1 elementor-invisible elementor-widget elementor-widget-wd_infobox\" data-id=\"52fb8d1\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"wd_infobox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t<div class=\"wd-info-box text-left box-icon-align-left box-style-base color-scheme- wd-items-top\">\n\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t<div class=\"info-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width:40px; height:40px;\"><img loading=\"lazy\" decoding=\"async\"  alt=\"Tailor-made solutions designed to enhance performance efficiency and meet each company\u2019s specific requirements.\" src=\"https:\/\/www.temp.esnadtech.sa\/wp-content\/uploads\/2024\/07\/Picture10.svg\" title=\"Custom software systems designed to meet unique business needs.\" width=\"40\" height=\"40\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3\t\t\t\t\t\tclass=\"info-box-title title box-title-style-default wd-fontsize-m\" data-elementor-setting-key=\"title\">\n\t\t\t\t\t\t\t\tPrevention of cyber attacks:\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"data-elementor-setting-key=\"content\"><p>It reduces the likelihood of systems being targeted by attacks such as hacking, malware, and ransomware.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"wd-negative-gap elementor-section elementor-inner-section elementor-element elementor-element-f9a4b30 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f9a4b30\" data-element_type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c8a0be3\" data-id=\"c8a0be3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-db9c85d elementor-invisible elementor-widget elementor-widget-wd_infobox\" data-id=\"db9c85d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"wd_infobox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t<div class=\"wd-info-box text-left box-icon-align-left box-style-base color-scheme- wd-items-top\">\n\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t<div class=\"info-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width:40px; height:40px;\"><img loading=\"lazy\" decoding=\"async\"  alt=\"Automating tasks and reducing human intervention enhance business productivity and performance quality.\" src=\"https:\/\/www.temp.esnadtech.sa\/wp-content\/uploads\/2024\/07\/Picture9.svg\" title=\"Automating manual processes to increase productivity and reduce errors.\" width=\"40\" height=\"40\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3\t\t\t\t\t\tclass=\"info-box-title title box-title-style-default wd-fontsize-m\" data-elementor-setting-key=\"title\">\n\t\t\t\t\t\t\t\tBuilding trust:\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"data-elementor-setting-key=\"content\"><p>It increases the trust of clients and partners in companies that implement strong security standards, thereby enhancing their reputation.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-919b950\" data-id=\"919b950\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9be70da elementor-invisible elementor-widget elementor-widget-wd_infobox\" data-id=\"9be70da\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"wd_infobox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t<div class=\"wd-info-box text-left box-icon-align-left box-style-base color-scheme- wd-items-top\">\n\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t<div class=\"info-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width:40px; height:40px;\"><img loading=\"lazy\" decoding=\"async\"  alt=\"Tailor-made solutions designed to enhance performance efficiency and meet each company\u2019s specific requirements.\" src=\"https:\/\/www.temp.esnadtech.sa\/wp-content\/uploads\/2024\/07\/Picture10.svg\" title=\"Custom software systems designed to meet unique business needs.\" width=\"40\" height=\"40\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3\t\t\t\t\t\tclass=\"info-box-title title box-title-style-default wd-fontsize-m\" data-elementor-setting-key=\"title\">\n\t\t\t\t\t\t\t\tReducing financial losses:\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"data-elementor-setting-key=\"content\"><p>It reduces costs associated with data recovery or system repair after cyber attacks.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"wd-negative-gap elementor-section elementor-inner-section elementor-element elementor-element-5a59b30 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5a59b30\" data-element_type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b362335\" data-id=\"b362335\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bdb714a elementor-invisible elementor-widget elementor-widget-wd_infobox\" data-id=\"bdb714a\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"wd_infobox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t<div class=\"wd-info-box text-left box-icon-align-left box-style-base color-scheme- wd-items-top\">\n\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t<div class=\"info-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width:40px; height:40px;\"><img loading=\"lazy\" decoding=\"async\"  alt=\"Automating tasks and reducing human intervention enhance business productivity and performance quality.\" src=\"https:\/\/www.temp.esnadtech.sa\/wp-content\/uploads\/2024\/07\/Picture9.svg\" title=\"Automating manual processes to increase productivity and reduce errors.\" width=\"40\" height=\"40\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<h3\t\t\t\t\t\tclass=\"info-box-title title box-title-style-default wd-fontsize-m\" data-elementor-setting-key=\"title\">\n\t\t\t\t\t\t\t\tProtection from internal threats:\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"data-elementor-setting-key=\"content\"><p>It helps detect and prevent threats from within the organization, such as data misuse or privilege abuse.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-12208c3 elementor-hidden-tablet elementor-hidden-mobile\" data-id=\"12208c3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-6aa606f wd-section-stretch e-flex e-con-boxed e-con e-parent\" data-id=\"6aa606f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-862d09a elementor-widget-divider--view-line_text elementor-widget-divider--element-align-center elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"862d09a\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<h4 class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\tAre you looking for a professional technical partner in Cybersecurity ?\t\t\t\t<\/h4>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e03f50 elementor-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"9e03f50\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/api.whatsapp.com\/send?phone=966546859920\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-arrow-alt-circle-right\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256C504 119 393 8 256 8S8 119 8 256s111 248 248 248 248-111 248-248zm-448 0c0-110.5 89.5-200 200-200s200 89.5 200 200-89.5 200-200 200S56 366.5 56 256zm72 20v-40c0-6.6 5.4-12 12-12h116v-67c0-10.7 12.9-16 20.5-8.5l99 99c4.7 4.7 4.7 12.3 0 17l-99 99c-7.6 7.6-20.5 2.2-20.5-8.5v-67H140c-6.6 0-12-5.4-12-12z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Services Cybersecurity Services: Cybersecurity services encompass a range of solutions and services aimed at protecting data and digital systems<\/p>\n","protected":false},"author":1,"featured_media":26176,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-3186","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.temp.esnadtech.sa\/en\/wp-json\/wp\/v2\/pages\/3186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.temp.esnadtech.sa\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.temp.esnadtech.sa\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.temp.esnadtech.sa\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.temp.esnadtech.sa\/en\/wp-json\/wp\/v2\/comments?post=3186"}],"version-history":[{"count":0,"href":"https:\/\/www.temp.esnadtech.sa\/en\/wp-json\/wp\/v2\/pages\/3186\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.temp.esnadtech.sa\/en\/wp-json\/wp\/v2\/media\/26176"}],"wp:attachment":[{"href":"https:\/\/www.temp.esnadtech.sa\/en\/wp-json\/wp\/v2\/media?parent=3186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}