{"id":25618,"date":"2025-08-21T20:13:11","date_gmt":"2025-08-21T14:43:11","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-in\/?page_id=25618"},"modified":"2026-02-19T15:10:19","modified_gmt":"2026-02-19T09:40:19","slug":"cybersecurity-solutions-ivalue-group","status":"publish","type":"page","link":"https:\/\/ivaluegroup.com\/en-in\/solutions\/cybersecurity-solutions-ivalue-group\/","title":{"rendered":"Cybersecurity Solutions \u2013 iValue Group"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"25618\" class=\"elementor elementor-25618\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-495318d e-con-full e-flex e-con e-parent\" data-id=\"495318d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" data-e-bg-lazyload=\"\" data-core-v316-plus=\"true\">\n\t\t<div class=\"elementor-element elementor-element-2d490c5 e-flex e-con-boxed e-con e-child\" data-id=\"2d490c5\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11dfe2e elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"11dfe2e\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-divider{--divider-border-style:none;--divider-border-width:1px;--divider-color:#0c0d0e;--divider-icon-size:20px;--divider-element-spacing:10px;--divider-pattern-height:24px;--divider-pattern-size:20px;--divider-pattern-url:none;--divider-pattern-repeat:repeat-x}.elementor-widget-divider .elementor-divider{display:flex}.elementor-widget-divider .elementor-divider__text{font-size:15px;line-height:1;max-width:95%}.elementor-widget-divider .elementor-divider__element{margin:0 var(--divider-element-spacing);flex-shrink:0}.elementor-widget-divider .elementor-icon{font-size:var(--divider-icon-size)}.elementor-widget-divider .elementor-divider-separator{display:flex;margin:0;direction:ltr}.elementor-widget-divider--view-line_icon .elementor-divider-separator,.elementor-widget-divider--view-line_text .elementor-divider-separator{align-items:center}.elementor-widget-divider--view-line_icon .elementor-divider-separator:after,.elementor-widget-divider--view-line_icon .elementor-divider-separator:before,.elementor-widget-divider--view-line_text .elementor-divider-separator:after,.elementor-widget-divider--view-line_text .elementor-divider-separator:before{display:block;content:\"\";border-block-end:0;flex-grow:1;border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--element-align-left .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-left .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-left .elementor-divider__element{margin-left:0}.elementor-widget-divider--element-align-right .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-right .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-right .elementor-divider__element{margin-right:0}.elementor-widget-divider--element-align-start .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-start .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-start .elementor-divider__element{margin-inline-start:0}.elementor-widget-divider--element-align-end .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-end .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-end .elementor-divider__element{margin-inline-end:0}.elementor-widget-divider:not(.elementor-widget-divider--view-line_text):not(.elementor-widget-divider--view-line_icon) .elementor-divider-separator{border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--separator-type-pattern{--divider-border-style:none}.elementor-widget-divider--separator-type-pattern.elementor-widget-divider--view-line .elementor-divider-separator,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:after,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:before,.elementor-widget-divider--separator-type-pattern:not([class*=elementor-widget-divider--view]) .elementor-divider-separator{width:100%;min-height:var(--divider-pattern-height);-webkit-mask-size:var(--divider-pattern-size) 100%;mask-size:var(--divider-pattern-size) 100%;-webkit-mask-repeat:var(--divider-pattern-repeat);mask-repeat:var(--divider-pattern-repeat);background-color:var(--divider-color);-webkit-mask-image:var(--divider-pattern-url);mask-image:var(--divider-pattern-url)}.elementor-widget-divider--no-spacing{--divider-pattern-size:auto}.elementor-widget-divider--bg-round{--divider-pattern-repeat:round}.rtl .elementor-widget-divider .elementor-divider__text{direction:rtl}.e-con-inner>.elementor-widget-divider,.e-con>.elementor-widget-divider{width:var(--container-widget-width,100%);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-adf0712 elementor-widget elementor-widget-heading\" data-id=\"adf0712\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h5 class=\"elementor-heading-title elementor-size-default\">Secure Future<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37753b1 elementor-widget elementor-widget-heading\" data-id=\"37753b1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Protecting Digital Assets in a Borderless World<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c8189e elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"6c8189e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Safeguard your enterprise with next-generation cybersecurity frameworks that address threats, ensure compliance, and enable resilient growth.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-089d10a e-flex e-con-boxed e-con e-child\" data-id=\"089d10a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8d2ed9d elementor-button-info elementor-widget elementor-widget-button\" data-id=\"8d2ed9d\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#Cybersecurity_LP\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to an Expert<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b2bbd4 elementor-button-info elementor-widget elementor-widget-button\" data-id=\"9b2bbd4\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#Cybersecurity_Components\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Explore Cybersecurity Solutions<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-95c1bf2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"95c1bf2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f2c853d\" data-id=\"f2c853d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-313082a elementor-widget elementor-widget-heading\" data-id=\"313082a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">The Threat Landscape<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03d6318 elementor-widget elementor-widget-heading\" data-id=\"03d6318\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Traditional Security Is Not Enough<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-847ce76 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"847ce76\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4675c38 elementor-widget elementor-widget-text-editor\" data-id=\"4675c38\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p data-start=\"676\" data-end=\"937\">The rise of hybrid work, multi-cloud environments, and AI-driven attacks has outpaced traditional defenses. Enterprises are grappling with:<\/p><p data-start=\"642\" data-end=\"872\">\u00a0<\/p><ul data-start=\"938\" data-end=\"1222\"><li data-start=\"938\" data-end=\"1016\"><p data-start=\"940\" data-end=\"1016\">Increasingly sophisticated cyber threats (APTs, ransomware, insider risks)<\/p><\/li><li data-start=\"1017\" data-end=\"1080\"><p data-start=\"1019\" data-end=\"1080\">Expanding attack surfaces across IT, OT, and IoT ecosystems<\/p><\/li><li data-start=\"1081\" data-end=\"1159\"><p data-start=\"1083\" data-end=\"1159\">Compliance pressures from DPDP Act, CERT-In directives, and ISO frameworks<\/p><\/li><li data-start=\"1160\" data-end=\"1222\"><p data-start=\"1162\" data-end=\"1222\">Lack of real-time visibility and incident response agility<\/p><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-b5ebd49 e-flex e-con-boxed e-con e-parent\" data-id=\"b5ebd49\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6402921 e-con-full e-flex e-con e-child\" data-id=\"6402921\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f686eec e-con-full e-flex e-con e-child\" data-id=\"f686eec\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-857b402 e-con-full e-flex e-con e-child\" data-id=\"857b402\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b1c5398 elementor-widget elementor-widget-heading\" data-id=\"b1c5398\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\"><span style=\"font-weight: 400;\">Why iValue<\/span><\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6df69e elementor-widget elementor-widget-heading\" data-id=\"c6df69e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">An Integrated Cybersecurity Approach for Modern Enterprises<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c41b556 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c41b556\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c45d978 elementor-widget elementor-widget-text-editor\" data-id=\"c45d978\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div>iValue goes beyond point solutions \u2014 we deliver a unified cybersecurity strategy that integrates prevention, detection, response, and compliance. With our iVCoE (Center of Excellence) and best-of-breed OEM partnerships, we help enterprises achieve resilience, not just defense.<\/div><ul><li data-start=\"1693\" data-end=\"1765\"><p data-start=\"1695\" data-end=\"1765\"><strong data-start=\"1695\" data-end=\"1719\">Holistic Protection:<\/strong> IT, OT, and IoT security under one umbrella<\/p><\/li><li data-start=\"1766\" data-end=\"1862\"><p data-start=\"1768\" data-end=\"1862\"><strong data-start=\"1768\" data-end=\"1793\">Regulatory Alignment:<\/strong> Compliance-first strategies mapped to DPDP, CERT-In, and ISO 27001<\/p><\/li><li data-start=\"1863\" data-end=\"1992\"><p data-start=\"1865\" data-end=\"1992\"><strong data-start=\"1865\" data-end=\"1892\">Ecosystem Partnerships:<\/strong> Collaborations with <strong data-start=\"1913\" data-end=\"1981\">Checkpoint, CyberArk, Netskope, Forcepoint, SentinelOne, Tenable<\/strong> and more<\/p><\/li><li data-start=\"1993\" data-end=\"2106\"><p data-start=\"1995\" data-end=\"2106\"><strong data-start=\"1995\" data-end=\"2023\">Consultative Engagement:<\/strong> Security roadmaps built around enterprise maturity, not just technology adoption<\/p><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5fbc5ab e-con-full e-flex e-con e-child\" data-id=\"5fbc5ab\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eae5cce elementor-widget elementor-widget-image\" data-id=\"eae5cce\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/07\/create-an-image-of-a-city-landscape-with-a-glowing-v5GrMzOoQ6aPTP9FjY3ulQ-UwhKq6qNRiKMURZXup-wKw-1024x576.jpeg\" class=\"attachment-large size-large wp-image-22010\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/07\/create-an-image-of-a-city-landscape-with-a-glowing-v5GrMzOoQ6aPTP9FjY3ulQ-UwhKq6qNRiKMURZXup-wKw-1024x576.jpeg 1024w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/07\/create-an-image-of-a-city-landscape-with-a-glowing-v5GrMzOoQ6aPTP9FjY3ulQ-UwhKq6qNRiKMURZXup-wKw-300x169.jpeg 300w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/07\/create-an-image-of-a-city-landscape-with-a-glowing-v5GrMzOoQ6aPTP9FjY3ulQ-UwhKq6qNRiKMURZXup-wKw-768x432.jpeg 768w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/07\/create-an-image-of-a-city-landscape-with-a-glowing-v5GrMzOoQ6aPTP9FjY3ulQ-UwhKq6qNRiKMURZXup-wKw-24x14.jpeg 24w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/07\/create-an-image-of-a-city-landscape-with-a-glowing-v5GrMzOoQ6aPTP9FjY3ulQ-UwhKq6qNRiKMURZXup-wKw-36x20.jpeg 36w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/07\/create-an-image-of-a-city-landscape-with-a-glowing-v5GrMzOoQ6aPTP9FjY3ulQ-UwhKq6qNRiKMURZXup-wKw-48x27.jpeg 48w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/07\/create-an-image-of-a-city-landscape-with-a-glowing-v5GrMzOoQ6aPTP9FjY3ulQ-UwhKq6qNRiKMURZXup-wKw.jpeg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1751f80 e-flex e-con-boxed e-con e-parent\" data-id=\"1751f80\" data-element_type=\"container\" id=\"Cybersecurity_Components\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-de1c7e8 e-flex e-con-boxed e-con e-child\" data-id=\"de1c7e8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a2396ed e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"a2396ed\" data-element_type=\"widget\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"170\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t\t\t<button id=\"#content1\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1701\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\tNetwork Security\t\t\t\t<\/span>\n\t\t\t<\/button>\n\t\t\t\t\t<button id=\"#content2\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1702\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\tEndpoint Security\t\t\t\t<\/span>\n\t\t\t<\/button>\n\t\t\t\t\t<button id=\"#content3\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1703\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\tCloud Security\t\t\t\t<\/span>\n\t\t\t<\/button>\n\t\t\t\t\t<button id=\"#content4\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1704\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\tIdentity &amp; Access Management\t\t\t\t<\/span>\n\t\t\t<\/button>\n\t\t\t\t\t<button id=\"e-n-tabs-title-1705\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1705\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\tSecurity Operations &amp; Threat Intelligence\t\t\t\t<\/span>\n\t\t\t<\/button>\n\t\t\t\t\t<button id=\"e-n-tabs-title-1706\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1706\" style=\"--n-tabs-title-order: 6;\">\n\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\tGovernance, Risk &amp; Compliance\t\t\t\t<\/span>\n\t\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1701\" role=\"tabpanel\" aria-labelledby=\"#content1\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-6b870c2 e-con-full e-flex e-con e-child\" data-id=\"6b870c2\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dacbc62 elementor-widget elementor-widget-heading\" data-id=\"dacbc62\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Defending the Perimeter and Beyond<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98fb6e5 elementor-widget elementor-widget-text-editor\" data-id=\"98fb6e5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Secure connectivity with next-gen firewalls, intrusion prevention, and zero-trust networking for hybrid infrastructures.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1702\" role=\"tabpanel\" aria-labelledby=\"#content2\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-15764aa e-con-full e-flex e-con e-child\" data-id=\"15764aa\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e189bc elementor-widget elementor-widget-heading\" data-id=\"6e189bc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Protecting the Last Mile<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-015a34f elementor-widget elementor-widget-text-editor\" data-id=\"015a34f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>AI-powered endpoint protection, EDR, and MDR to stop threats before they compromise critical assets.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1703\" role=\"tabpanel\" aria-labelledby=\"#content3\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-c635db5 e-con-full e-flex e-con e-child\" data-id=\"c635db5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8369a48 elementor-widget elementor-widget-heading\" data-id=\"8369a48\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Securing Multi-Cloud Environments<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-912e17a elementor-widget elementor-widget-text-editor\" data-id=\"912e17a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>CASB, CWPP, and CSPM solutions that protect workloads, data, and applications across hybrid and multi-cloud.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1704\" role=\"tabpanel\" aria-labelledby=\"#content4\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-bea5d35 e-flex e-con-boxed e-con e-child\" data-id=\"bea5d35\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a940c2 elementor-widget elementor-widget-heading\" data-id=\"3a940c2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Controlling Access with Confidence<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61b373c elementor-widget elementor-widget-text-editor\" data-id=\"61b373c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Advanced identity governance, MFA, and privileged access management to enforce least-privilege access and eliminate credential risks.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1705\" role=\"tabpanel\" aria-labelledby=\"e-n-tabs-title-1705\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-c2fc973 e-flex e-con-boxed e-con e-child\" data-id=\"c2fc973\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6689178 elementor-widget elementor-widget-heading\" data-id=\"6689178\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Faster Detection, Smarter Response<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21c4710 elementor-widget elementor-widget-text-editor\" data-id=\"21c4710\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p data-start=\"2861\" data-end=\"3178\">Centralized SOC capabilities, SIEM, and threat intelligence integration for proactive incident detection and mitigation.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1706\" role=\"tabpanel\" aria-labelledby=\"e-n-tabs-title-1706\" data-tab-index=\"6\" style=\"--n-tabs-title-order: 6;\" class=\" elementor-element elementor-element-9463ce4 e-flex e-con-boxed e-con e-child\" data-id=\"9463ce4\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9a2f95d elementor-widget elementor-widget-heading\" data-id=\"9a2f95d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Security with Accountability<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b0f709 elementor-widget elementor-widget-text-editor\" data-id=\"9b0f709\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Frameworks, audits, and continuous compliance mapping to keep enterprises aligned with regulatory and industry standards.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a630fed e-flex e-con-boxed e-con e-parent\" data-id=\"a630fed\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-254cb59 e-con-full e-flex e-con e-child\" data-id=\"254cb59\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e46184c e-con-full e-flex e-con e-child\" data-id=\"e46184c\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-34b19cf e-con-full e-flex e-con e-child\" data-id=\"34b19cf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f14f0f elementor-widget elementor-widget-heading\" data-id=\"0f14f0f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\"><span style=\"font-weight: normal;\">Resilience in Action<\/span><\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0628607 elementor-widget elementor-widget-heading\" data-id=\"0628607\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Turning Cybersecurity into a Business Enabler<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43fa3a9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"43fa3a9\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9af9c5b elementor-widget elementor-widget-text-editor\" data-id=\"9af9c5b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div><p data-start=\"3534\" data-end=\"3728\">Enterprises that adopt iValue\u2019s cybersecurity frameworks realize:<\/p><ul data-start=\"3729\" data-end=\"4205\"><li data-start=\"3729\" data-end=\"3814\"><p data-start=\"3731\" data-end=\"3814\"><strong data-start=\"3731\" data-end=\"3756\">Stronger Risk Posture<\/strong> \u2192 Reduced exposure to threats across IT, OT, and cloud.<\/p><\/li><li data-start=\"3815\" data-end=\"3914\"><p data-start=\"3817\" data-end=\"3914\"><strong data-start=\"3817\" data-end=\"3842\">Regulatory Confidence<\/strong> \u2192 Audit-readiness with policies aligned to DPDP and global standards.<\/p><\/li><li data-start=\"3915\" data-end=\"3997\"><p data-start=\"3917\" data-end=\"3997\"><strong data-start=\"3917\" data-end=\"3940\">Business Continuity<\/strong> \u2192 Reduced downtime from ransomware or system breaches.<\/p><\/li><li data-start=\"3998\" data-end=\"4104\"><p data-start=\"4000\" data-end=\"4104\"><strong data-start=\"4000\" data-end=\"4021\">Stakeholder Trust<\/strong> \u2192 Secure, transparent data practices that build customer and partner confidence.<\/p><\/li><li data-start=\"4105\" data-end=\"4205\"><p data-start=\"4107\" data-end=\"4205\"><strong data-start=\"4107\" data-end=\"4132\">Future-Proof Security<\/strong> \u2192 Adaptive strategies ready for AI-powered and evolving cyber threats.<\/p><\/li><\/ul><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-419d5b3 e-con-full e-flex e-con e-child\" data-id=\"419d5b3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da01260 elementor-widget elementor-widget-image\" data-id=\"da01260\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/07\/create-an-image-of-a-city-landscape-with-a-glowing-v5GrMzOoQ6aPTP9FjY3ulQ-UwhKq6qNRiKMURZXup-wKw-1024x576.jpeg\" class=\"attachment-large size-large wp-image-22010\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/07\/create-an-image-of-a-city-landscape-with-a-glowing-v5GrMzOoQ6aPTP9FjY3ulQ-UwhKq6qNRiKMURZXup-wKw-1024x576.jpeg 1024w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/07\/create-an-image-of-a-city-landscape-with-a-glowing-v5GrMzOoQ6aPTP9FjY3ulQ-UwhKq6qNRiKMURZXup-wKw-300x169.jpeg 300w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/07\/create-an-image-of-a-city-landscape-with-a-glowing-v5GrMzOoQ6aPTP9FjY3ulQ-UwhKq6qNRiKMURZXup-wKw-768x432.jpeg 768w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/07\/create-an-image-of-a-city-landscape-with-a-glowing-v5GrMzOoQ6aPTP9FjY3ulQ-UwhKq6qNRiKMURZXup-wKw-24x14.jpeg 24w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/07\/create-an-image-of-a-city-landscape-with-a-glowing-v5GrMzOoQ6aPTP9FjY3ulQ-UwhKq6qNRiKMURZXup-wKw-36x20.jpeg 36w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/07\/create-an-image-of-a-city-landscape-with-a-glowing-v5GrMzOoQ6aPTP9FjY3ulQ-UwhKq6qNRiKMURZXup-wKw-48x27.jpeg 48w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/07\/create-an-image-of-a-city-landscape-with-a-glowing-v5GrMzOoQ6aPTP9FjY3ulQ-UwhKq6qNRiKMURZXup-wKw.jpeg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cf7b292 e-flex e-con-boxed e-con e-parent\" data-id=\"cf7b292\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf30849 elementor-widget elementor-widget-heading\" data-id=\"cf30849\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\"><span style=\"font-weight: 400;\">Powered by Leaders<\/span><\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c173bca elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c173bca\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae51fac elementor-widget elementor-widget-heading\" data-id=\"ae51fac\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Cybersecurity Ecosystem<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-109c16a elementor-widget elementor-widget-text-editor\" data-id=\"109c16a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p style=\"text-align: center;\">iValue\u2019s security stack is powered by global leaders, ensuring multi-layered protection<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e42c257 elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"e42c257\" data-element_type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-image-carousel .swiper,.elementor-widget-image-carousel .swiper-container{position:static}.elementor-widget-image-carousel .swiper-container .swiper-slide figure,.elementor-widget-image-carousel .swiper .swiper-slide figure{line-height:inherit}.elementor-widget-image-carousel .swiper-slide{text-align:center}.elementor-image-carousel-wrapper:not(.swiper-container-initialized):not(.swiper-initialized) .swiper-slide{max-width:calc(100% \/ var(--e-image-carousel-slides-to-show, 3))}<\/style>\t\t<div class=\"elementor-image-carousel-wrapper swiper\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2022\/02\/Checkpoint-1.png\" alt=\"Checkpoint-1.png\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2023\/07\/Cyberark.jpg\" alt=\"Cyberark.jpg\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2022\/02\/Netskope-1.png\" alt=\"Netskope-1.png\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2022\/02\/Forcepoint.jpg\" alt=\"Forcepoint.jpg\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2021\/12\/Sentinelone.jpg\" alt=\"Sentinelone\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 6\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2022\/02\/Tenable.jpg\" alt=\"Tenable.jpg\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-chevron-left\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-chevron-right\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-933dbf1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"933dbf1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b38d5ae\" data-id=\"b38d5ae\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5495201 elementor-widget elementor-widget-heading\" data-id=\"5495201\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQs<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ef11fb elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3ef11fb\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4942624 elementor-widget elementor-widget-n-accordion\" data-id=\"4942624\" data-element_type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7680\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-7680\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How is iValue\u2019s cybersecurity approach different from traditional models? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7680\" class=\"elementor-element elementor-element-8636bbe e-con-full e-flex e-con e-child\" data-id=\"8636bbe\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-38f7b3e elementor-widget elementor-widget-text-editor\" data-id=\"38f7b3e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p data-start=\"187\" data-end=\"664\">We integrate IT, OT, IoT, and cloud security into a single maturity-driven framework, supported by global OEMs and tailored to regulatory needs.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7681\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7681\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Can you help enterprises align with India\u2019s DPDP Act? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7681\" class=\"elementor-element elementor-element-6471c9b e-con-full e-flex e-con e-child\" data-id=\"6471c9b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ee6fe2 elementor-widget elementor-widget-text-editor\" data-id=\"4ee6fe2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Yes. Our cybersecurity services and solutions are designed to map with DPDP, ISO 27001, and CERT-In guidelines, ensuring compliance alongside protection.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7682\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7682\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What industries do you specialize in? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7682\" class=\"elementor-element elementor-element-e4bc7b9 e-con-full e-flex e-con e-child\" data-id=\"e4bc7b9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6745079 elementor-widget elementor-widget-text-editor\" data-id=\"6745079\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>BFSI, Telecom, Government, Manufacturing, Healthcare, and Retail \u2014 sectors where data sensitivity and regulatory requirements are highest.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7683\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7683\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Do you offer managed security services? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7683\" class=\"elementor-element elementor-element-5e84abb e-flex e-con-boxed e-con e-child\" data-id=\"5e84abb\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a991d12 elementor-widget elementor-widget-text-editor\" data-id=\"a991d12\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Yes. Our <a href=\"https:\/\/ivaluegroup.com\/en-in\/services\/ivalue-managed-security-services\/\">Managed Security Services<\/a> (MSS) provide continuous monitoring, incident response, and threat intelligence integration.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-787e3eb e-flex e-con-boxed e-con e-parent\" data-id=\"787e3eb\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cd2630 elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"3cd2630\" data-element_type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/plugins\/elementor-pro\/assets\/css\/widget-call-to-action.min.css\">\t\t<div class=\"elementor-cta\" data-e-bg-lazyload=\".elementor-bg\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: var(--e-bg-lazyload-loaded); --e-bg-lazyload: url(https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2024\/02\/Ivalue-Blog-Banner-HD-768x317.webp);\" role=\"img\" aria-label=\"Ivalue-Blog-Banner-HD.webp\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tBuild a Resilient Cybersecurity Foundation with iValue\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tOur experts are ready to assess your current security posture and design a roadmap tailored to your enterprise.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86bccb4 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"86bccb4\" data-element_type=\"widget\" id=\"Cybersecurity_LP\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor-pro - v3.20.0 - 26-03-2024 *\/\n.elementor-button.elementor-hidden,.elementor-hidden{display:none}.e-form__step{width:100%}.e-form__step:not(.elementor-hidden){display:flex;flex-wrap:wrap}.e-form__buttons{flex-wrap:wrap}.e-form__buttons,.e-form__buttons__wrapper{display:flex}.e-form__indicators{display:flex;justify-content:space-between;align-items:center;flex-wrap:nowrap;font-size:13px;margin-bottom:var(--e-form-steps-indicators-spacing)}.e-form__indicators__indicator{display:flex;flex-direction:column;align-items:center;justify-content:center;flex-basis:0;padding:0 var(--e-form-steps-divider-gap)}.e-form__indicators__indicator__progress{width:100%;position:relative;background-color:var(--e-form-steps-indicator-progress-background-color);border-radius:var(--e-form-steps-indicator-progress-border-radius);overflow:hidden}.e-form__indicators__indicator__progress__meter{width:var(--e-form-steps-indicator-progress-meter-width,0);height:var(--e-form-steps-indicator-progress-height);line-height:var(--e-form-steps-indicator-progress-height);padding-right:15px;border-radius:var(--e-form-steps-indicator-progress-border-radius);background-color:var(--e-form-steps-indicator-progress-color);color:var(--e-form-steps-indicator-progress-meter-color);text-align:right;transition:width .1s linear}.e-form__indicators__indicator:first-child{padding-left:0}.e-form__indicators__indicator:last-child{padding-right:0}.e-form__indicators__indicator--state-inactive{color:var(--e-form-steps-indicator-inactive-primary-color,#c2cbd2)}.e-form__indicators__indicator--state-inactive [class*=indicator--shape-]:not(.e-form__indicators__indicator--shape-none){background-color:var(--e-form-steps-indicator-inactive-secondary-color,#fff)}.e-form__indicators__indicator--state-inactive object,.e-form__indicators__indicator--state-inactive svg{fill:var(--e-form-steps-indicator-inactive-primary-color,#c2cbd2)}.e-form__indicators__indicator--state-active{color:var(--e-form-steps-indicator-active-primary-color,#39b54a);border-color:var(--e-form-steps-indicator-active-secondary-color,#fff)}.e-form__indicators__indicator--state-active [class*=indicator--shape-]:not(.e-form__indicators__indicator--shape-none){background-color:var(--e-form-steps-indicator-active-secondary-color,#fff)}.e-form__indicators__indicator--state-active object,.e-form__indicators__indicator--state-active svg{fill:var(--e-form-steps-indicator-active-primary-color,#39b54a)}.e-form__indicators__indicator--state-completed{color:var(--e-form-steps-indicator-completed-secondary-color,#fff)}.e-form__indicators__indicator--state-completed [class*=indicator--shape-]:not(.e-form__indicators__indicator--shape-none){background-color:var(--e-form-steps-indicator-completed-primary-color,#39b54a)}.e-form__indicators__indicator--state-completed .e-form__indicators__indicator__label{color:var(--e-form-steps-indicator-completed-primary-color,#39b54a)}.e-form__indicators__indicator--state-completed .e-form__indicators__indicator--shape-none{color:var(--e-form-steps-indicator-completed-primary-color,#39b54a);background-color:initial}.e-form__indicators__indicator--state-completed object,.e-form__indicators__indicator--state-completed svg{fill:var(--e-form-steps-indicator-completed-secondary-color,#fff)}.e-form__indicators__indicator__icon{width:var(--e-form-steps-indicator-padding,30px);height:var(--e-form-steps-indicator-padding,30px);font-size:var(--e-form-steps-indicator-icon-size);border-width:1px;border-style:solid;display:flex;justify-content:center;align-items:center;overflow:hidden;margin-bottom:10px}.e-form__indicators__indicator__icon img,.e-form__indicators__indicator__icon object,.e-form__indicators__indicator__icon svg{width:var(--e-form-steps-indicator-icon-size);height:auto}.e-form__indicators__indicator__icon .e-font-icon-svg{height:1em}.e-form__indicators__indicator__number{width:var(--e-form-steps-indicator-padding,30px);height:var(--e-form-steps-indicator-padding,30px);border-width:1px;border-style:solid;display:flex;justify-content:center;align-items:center;margin-bottom:10px}.e-form__indicators__indicator--shape-circle{border-radius:50%}.e-form__indicators__indicator--shape-square{border-radius:0}.e-form__indicators__indicator--shape-rounded{border-radius:5px}.e-form__indicators__indicator--shape-none{border:0}.e-form__indicators__indicator__label{text-align:center}.e-form__indicators__indicator__separator{width:100%;height:var(--e-form-steps-divider-width);background-color:#babfc5}.e-form__indicators--type-icon,.e-form__indicators--type-icon_text,.e-form__indicators--type-number,.e-form__indicators--type-number_text{align-items:flex-start}.e-form__indicators--type-icon .e-form__indicators__indicator__separator,.e-form__indicators--type-icon_text .e-form__indicators__indicator__separator,.e-form__indicators--type-number .e-form__indicators__indicator__separator,.e-form__indicators--type-number_text .e-form__indicators__indicator__separator{margin-top:calc(var(--e-form-steps-indicator-padding, 30px) \/ 2 - var(--e-form-steps-divider-width, 1px) \/ 2)}.elementor-field-type-hidden{display:none}.elementor-field-type-html{display:inline-block}.elementor-field-type-tel input{direction:inherit}.elementor-login .elementor-lost-password,.elementor-login .elementor-remember-me{font-size:.85em}.elementor-field-type-recaptcha_v3 .elementor-field-label{display:none}.elementor-field-type-recaptcha_v3 .grecaptcha-badge{z-index:1}.elementor-button .elementor-form-spinner{order:3}.elementor-form .elementor-button>span{display:flex;justify-content:center;align-items:center}.elementor-form .elementor-button .elementor-button-text{white-space:normal;flex-grow:0}.elementor-form .elementor-button svg{height:auto}.elementor-form .elementor-button .e-font-icon-svg{height:1em}.elementor-select-wrapper .select-caret-down-wrapper{position:absolute;top:50%;transform:translateY(-50%);inset-inline-end:10px;pointer-events:none;font-size:11px}.elementor-select-wrapper .select-caret-down-wrapper svg{display:unset;width:1em;aspect-ratio:unset;fill:currentColor}.elementor-select-wrapper .select-caret-down-wrapper i{font-size:19px;line-height:2}.elementor-select-wrapper.remove-before:before{content:\"\"!important}<\/style>\t\t<form class=\"elementor-form\" method=\"post\" name=\"Cybersecurity_LP\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"25618\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"86bccb4\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"\" \/>\n\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tName\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Name\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Email\" required=\"required\" aria-required=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_6cbf64a elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_6cbf64a\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tPhone Number\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_6cbf64a]\" id=\"form-field-field_6cbf64a\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Phone Number\" required=\"required\" aria-required=\"true\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Only numbers and phone characters (#, -, *, etc) are accepted.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tMessage\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"4\" placeholder=\"Message\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button type=\"submit\" class=\"elementor-button elementor-size-sm\">\n\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\" elementor-button-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Send<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1ad1a31 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1ad1a31\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-28db022\" data-id=\"28db022\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8627f36 elementor-widget elementor-widget-spacer\" data-id=\"8627f36\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-con{--container-widget-width:100%}.e-con-inner>.elementor-widget-spacer,.e-con>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));--align-self:var(--container-widget-align-self,initial);--flex-shrink:0}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container,.e-con>.elementor-widget-spacer>.elementor-widget-container{height:100%;width:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))}.e-con-inner>.elementor-widget-spacer.elementor-widget-empty,.e-con>.elementor-widget-spacer.elementor-widget-empty{position:relative;min-height:22px;min-width:22px}.e-con-inner>.elementor-widget-spacer.elementor-widget-empty .elementor-widget-empty-icon,.e-con>.elementor-widget-spacer.elementor-widget-empty .elementor-widget-empty-icon{position:absolute;top:0;bottom:0;left:0;right:0;margin:auto;padding:0;width:22px;height:22px}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c82d44c elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"c82d44c\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Latest Resources<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dcd3352 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"dcd3352\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2609326 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"2609326\" data-element_type=\"widget\" data-settings=\"{&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/plugins\/elementor-pro\/assets\/css\/widget-posts.min.css\">\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-27129 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs tag-ai-in-cybersecurity tag-cyber-resilience tag-cybersecurity tag-skills-shortage-soc tag-soar tag-supply-chain-security\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/how-indian-enterprises-can-close-the-cybersecurity-capability-gap-in-2026\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Blog-3-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-27130\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Blog-3-150x150.png 150w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Blog-3-300x300.png 300w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Blog-3-1024x1024.png 1024w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Blog-3-768x768.png 768w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Blog-3-24x24.png 24w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Blog-3-36x36.png 36w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Blog-3-48x48.png 48w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Blog-3.png 1080w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/how-indian-enterprises-can-close-the-cybersecurity-capability-gap-in-2026\/\">\n\t\t\t\tHow Indian Enterprises Can Close The Cybersecurity Capability Gap In 2026\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>As India rapidly continues on its digital transformation journey in 2026, the cyber landscape surrounding it sees a clear duality &#8211; it has become both a catalyst for progress and<\/p>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-post__read-more-wrapper\">\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/how-indian-enterprises-can-close-the-cybersecurity-capability-gap-in-2026\/\" aria-label=\"Read more about How Indian Enterprises Can Close The Cybersecurity Capability Gap In 2026\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 30, 2026\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-27016 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs tag-ciem tag-cloud-security tag-cnapp tag-cspm tag-cwpp tag-hybrid-cloud tag-tenable tag-tenable-cnapp\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/cloud-blind-spots-in-indias-hybrid-infra-closing-gaps-with-tenables-cnapp\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Tenable-CNAPP-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-27030\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Tenable-CNAPP-150x150.png 150w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Tenable-CNAPP-300x300.png 300w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Tenable-CNAPP-1024x1024.png 1024w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Tenable-CNAPP-768x768.png 768w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Tenable-CNAPP-24x24.png 24w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Tenable-CNAPP-36x36.png 36w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Tenable-CNAPP-48x48.png 48w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2026\/01\/Tenable-CNAPP.png 1080w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/cloud-blind-spots-in-indias-hybrid-infra-closing-gaps-with-tenables-cnapp\/\">\n\t\t\t\tCloud Blind Spots in India\u2019s Hybrid Infra: Closing Gaps with Tenable\u2019s CNAPP Capabilities\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Digital Infrastructures For Digital India As India speeds through this phase of rapid digital transformation, cloud has emerged as a preferred choice for enterprises when it comes to setting up<\/p>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-post__read-more-wrapper\">\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/cloud-blind-spots-in-indias-hybrid-infra-closing-gaps-with-tenables-cnapp\/\" aria-label=\"Read more about Cloud Blind Spots in India\u2019s Hybrid Infra: Closing Gaps with Tenable\u2019s CNAPP Capabilities\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 22, 2026\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-26916 post type-post status-publish format-standard has-post-thumbnail hentry category-blogs tag-b2b-compliance tag-cybersecurity tag-data-fiduciary tag-data-privacy-india tag-data-protection-board-of-india tag-dpdp tag-dpdp-act tag-dpdpa tag-enterprise-security tag-regulatory-updates\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/dpdp-rules-finalized-and-its-time-for-b2b-firms-to-act\/\" tabindex=\"-1\"><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/12\/Blog-Post-17-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-26930\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/12\/Blog-Post-17-150x150.png 150w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/12\/Blog-Post-17-300x300.png 300w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/12\/Blog-Post-17-1024x1024.png 1024w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/12\/Blog-Post-17-768x768.png 768w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/12\/Blog-Post-17-24x24.png 24w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/12\/Blog-Post-17-36x36.png 36w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/12\/Blog-Post-17-48x48.png 48w, https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/12\/Blog-Post-17.png 1080w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/dpdp-rules-finalized-and-its-time-for-b2b-firms-to-act\/\">\n\t\t\t\tDPDP Rules Finalized And It\u2019s Time For B2B Firms To Act\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>The DPDP Adoption Race Is Officially Underway On November 14, 2025, a long 2-year wait ended with the notification of the DPDP Rules, 2025, a framework that marks the full<\/p>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-post__read-more-wrapper\">\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/dpdp-rules-finalized-and-its-time-for-b2b-firms-to-act\/\" aria-label=\"Read more about DPDP Rules Finalized And It\u2019s Time For B2B Firms To Act\" tabindex=\"-1\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tDecember 11, 2025\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6bda392 elementor-widget elementor-widget-spacer\" data-id=\"6bda392\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Secure Future Protecting Digital Assets in a Borderless World Safeguard your enterprise with next-generation cybersecurity frameworks that address threats, ensure compliance, and enable resilient growth. Talk to an Expert Explore Cybersecurity Solutions The Threat Landscape Why Traditional Security Is Not Enough The rise of hybrid work, multi-cloud environments, and AI-driven attacks has outpaced traditional defenses. &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/dpdp-rules-finalized-and-its-time-for-b2b-firms-to-act\/\"> <span class=\"screen-reader-text\">DPDP Rules Finalized And It\u2019s Time For B2B Firms To Act<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":29,"featured_media":0,"parent":9566,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/pages\/25618"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/comments?post=25618"}],"version-history":[{"count":25,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/pages\/25618\/revisions"}],"predecessor-version":[{"id":27331,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/pages\/25618\/revisions\/27331"}],"up":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/pages\/9566"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media?parent=25618"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/categories?post=25618"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/tags?post=25618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}