{"id":26707,"date":"2025-11-04T10:57:27","date_gmt":"2025-11-04T05:27:27","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-in\/?p=26707"},"modified":"2025-11-11T12:35:44","modified_gmt":"2025-11-11T07:05:44","slug":"building-a-secure-government-tech-stack-for-cyber-resilience-in-india","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/building-a-secure-government-tech-stack-for-cyber-resilience-in-india\/","title":{"rendered":"Building a Secure Government Tech Stack for Cyber Resilience in India"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26707\" class=\"elementor elementor-26707\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-840d7b1 e-flex e-con-boxed e-con e-parent\" data-id=\"840d7b1\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d83979e elementor-widget elementor-widget-heading\" data-id=\"d83979e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Heightened Exposure In An Already Heightened Landscape<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-64398fe e-flex e-con-boxed e-con e-parent\" data-id=\"64398fe\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d88b1de elementor-widget elementor-widget-text-editor\" data-id=\"d88b1de\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><span style=\"color: #000000;\">India\u2019s digital governance landscape has evolved into one of the most ambitious in the world. With more than <strong>1.4 billion digital identity holders<\/strong> through Aadhaar, 400+ government digital services under the <strong>Digital India Mission<\/strong>, and over 2,000+ citizen-facing apps, India\u2019s eGovernance ecosystem is now a digital powerhouse driving inclusion and transparency across the country.\u00a0<\/span><\/p><p><span style=\"color: #000000;\">It is also an ecosystem that is coming increasingly under attack in recent times. During the period of Operation Sindoor, over 200,000 cyberattacks were attempted on Indian critical infrastructure within a week, with more than 75% of the claimed <a href=\"https:\/\/ivaluegroup.com\/en-in\/ever-under-attack\/\">DDoS attacks<\/a> directed at governmental organizations. These figures are indicative of a shifting threat landscape &#8211; while enterprises in this sector adopt cloud services, AI-enabled citizen apps, remote access platforms, and interlinked data systems, they also expose themselves to new vectors: <a href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/the-importance-of-api-security-in-alm-2\/\">API attacks<\/a>, DDoS, credential theft, and website defacements from state-sponsored actors and hacktivist campaigns.\u00a0<\/span><\/p><p><span style=\"color: #000000;\">This scenario is adding uncertainty to an already complex digital governance landscape consisting of:<\/span><\/p><ul><li><span style=\"color: #000000;\"><span style=\"color: #0000ff;\"><strong>Tighter Compliance<\/strong> <\/span>&#8211;\u00a0The upcoming DPDPA mandates strict obligations &#8211; with requirements like breach <strong>reporting within 72 hours<\/strong>, appointing data protection officers, and undertaking processes for data minimization. The repercussions of not following these rules are massive, with <strong>penalties up to \u20b9250 crores<\/strong> for failures.<\/span><\/li><li><span style=\"color: #000000;\"><span style=\"color: #0000ff;\"><strong>Proliferation Of Citizen Data<\/strong> &#8211; <\/span>More government apps are collecting sensitive health, identification, and financial data. Public safety platforms, welfare distribution, and election rolls &#8211; all of these functions depend on large-scale proliferation of citizen data.<\/span><\/li><li><span style=\"color: #000000;\"><span style=\"color: #0000ff;\"><strong>Increased Public Delivery Touchpoints<\/strong> &#8211;<\/span>\u00a0Mechanisms and touchpoints like portals, mobile apps, grievance redressal systems, digital payments, etc., are heavily used, which increases exposure via external access points and dependencies on third-party infrastructure.<\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-72ac527 e-flex e-con-boxed e-con e-parent\" data-id=\"72ac527\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f2be17 elementor-widget elementor-widget-heading\" data-id=\"5f2be17\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Cyber Resilience, and Why Is It Essential For Government Enterprises?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a584e2 e-flex e-con-boxed e-con e-parent\" data-id=\"2a584e2\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e01be6 elementor-widget elementor-widget-text-editor\" data-id=\"7e01be6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #000000;\">Most modern security solutions focus on taking a proactive rather than reactive approach, finding and snuffing attacks before they debilitate your organization. However, considering the volume of attacks government enterprises face in recent times, just having a proactive approach isn\u2019t enough &#8211; your organization must possess cyber resilience.<\/span><\/p><p><span style=\"color: #000000;\">Traditional firewalls and endpoint protection can defend against attacks, but cyber resilience ensures that even when an attack succeeds, critical public systems continue to function, recover quickly and preserve citizen trust. It\u2019s a process that helps you move beyond protection to a holistic posture of preparedness, response and continuity.<\/span><\/p><p><span style=\"color: #000000;\">Cyber resilience is built on 6 core elements that cascade onto one another to provide end-to-end resilience:\u00a0<\/span><\/p><div dir=\"ltr\" style=\"margin-left: 0pt;\" align=\"left\"><table class=\" aligncenter\" style=\"border-collapse: collapse; table-layout: fixed; width: 468pt; border: initial none initial;\"><colgroup> <col \/><\/colgroup><tbody><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Anticipation <\/span><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Through <\/span><strong><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #0000ff; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Proactive Threat Intelligence &amp; Risk Awareness<\/span><\/strong><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Government systems must stay ahead of adversaries by predicting threats before they strike. This is done through AI-driven real-time monitoring, anomaly detection and intelligence sharing across agencies.<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\"><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/14.0.0\/svg\/2b07.svg\" alt=\"\u2b07\ufe0f\" \/><\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Protection <\/span><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">With <\/span><strong><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #0000ff; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Layered Security For Hybrid Multicloud Environments<\/span><\/strong><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">As government platforms adopt cloud, AI and mobile ecosystems, protection needs to span data centres, endpoints and citizen-facing apps. Encryption, access control and zero-trust frameworks must function seamlessly across these layers.<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\"><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/14.0.0\/svg\/2b07.svg\" alt=\"\u2b07\ufe0f\" \/><\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Detection <\/span><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Using <\/span><strong><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #0000ff; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Continuous Monitoring &amp; Rapid Incident Identification<\/span><\/strong><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">The ability to detect breaches swiftly determines how well a system can limit damage. This is done through automated analytics, behaviour-based alerts and full visibility across IT &amp; OT networks.<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\"><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/14.0.0\/svg\/2b07.svg\" alt=\"\u2b07\ufe0f\" \/><\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Response <\/span><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Through <\/span><strong><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #0000ff; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Automated, Orchestrated, Tested Playbooks<\/span><\/strong><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">A resilient government ecosystem depends on well-defined, coordinated responses that integrate security operations, compliance teams and external threat intelligence. Automation here cuts response times from days to minutes.<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\"><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/14.0.0\/svg\/2b07.svg\" alt=\"\u2b07\ufe0f\" \/><\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Recovery <\/span><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">To Achieve <\/span><strong><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #0000ff; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Business Continuity &amp; Public Service Uptime<\/span><\/strong><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Supposing the worst has happened, resilient infrastructure ensures mission-critical functions bounce back rapidly with minimal disruption or data loss.<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\"><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/14.0.0\/svg\/2b07.svg\" alt=\"\u2b07\ufe0f\" \/><\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Compliance <\/span><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">By <\/span><strong><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #0000ff; background-color: transparent; font-style: italic; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Embedding Security into Policy &amp; Process<\/span><\/strong><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 10pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">True resilience aligns with frameworks like the upcoming DPDP Act, CERT-In directives and ISO 27001, ensuring data handling, privacy and breach response are built-in rather than reactive.<\/span><\/p><\/td><\/tr><\/tbody><\/table><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d9ff4c7 e-flex e-con-boxed e-con e-parent\" data-id=\"d9ff4c7\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a500e7c elementor-widget elementor-widget-heading\" data-id=\"a500e7c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">iValue\u2019s Industry-Leading Government Tech Stack<span style=\"font-size: 2.5rem; font-style: inherit;\"><\/span><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b79e02 e-flex e-con-boxed e-con e-parent\" data-id=\"6b79e02\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c7c431 elementor-widget elementor-widget-text-editor\" data-id=\"3c7c431\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #000000;\">In a Digital India where the line between mission-critical system and public-facing infrastructure is rapidly blurring for government services, <strong>iValue\u2019s Secure Government Tech Stack<\/strong> is specifically designed to provide an end-to-end, resilient ecosystem that helps government organizations protect sensitive data, respond swiftly to incidents, maintain service uptime and stay compliant in an increasingly dynamic threat landscape.<\/span><\/p><p><span style=\"color: #000000;\">At its core, this stack is built for trust, scale and continuity &#8211; combining world-class technologies from leading OEMs with iValue\u2019s deep domain expertise. Each partner in this ecosystem contributes industry-leading capabilities that together help you achieve comprehensive resilience for today\u2019s modern governance:<\/span><\/p><div><div dir=\"ltr\" style=\"margin-left: 0pt;\" align=\"left\"><table style=\"border-collapse: collapse; table-layout: fixed; width: 468pt; border: initial none initial;\"><colgroup> <col \/> <col \/><\/colgroup><tbody><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #0000ff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">SentinelOne<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Autonomous EDR\/XDR that detects &amp; contains cyber threats across government endpoints with speed &amp; precision<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #0000ff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">BlackBerry &amp; SOTI<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Unified endpoint &amp; mobility management for securing devices used across government offices &amp; field operations<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><a href=\"https:\/\/ivaluegroup.com\/en-in\/checkpoint-ivalue-group\/\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #0000ff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Check Point<\/span><\/a><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Advanced firewall &amp; segmentation controls safeguarding public data centres &amp; citizen portals\u00a0<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><a href=\"https:\/\/ivaluegroup.com\/en-in\/cyberark-ivalue-group\/\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #0000ff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">CyberArk<\/span><\/a><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Privileged Access Management (PAM) ensuring that administrative identities remain tightly controlled<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #0000ff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Fortra<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Data classification &amp; secure file transfer solutions supporting regulatory &amp; data privacy mandates<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><a href=\"https:\/\/ivaluegroup.com\/en-in\/official-distributor-of-yubikey-in-india\/\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #0000ff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Yubico<\/span><\/a><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Hardware-based solutions for phishing-resistant multi-factor authentication<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><a href=\"https:\/\/ivaluegroup.com\/en-in\/dlp-with-forcepoint-ivalue\/\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #0000ff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Forcepoint<\/span><\/a><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Insider threat analytics &amp; behavioral data protection for government personnel<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/ivaluegroup.com\/en-in\/opentext-ivalue\/\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">OpenText<\/span><\/a><\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Secure content &amp; information governance for compliance, record-keeping &amp; audits<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><a href=\"https:\/\/ivaluegroup.com\/en-in\/tenable-ivalue-group\/\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #0000ff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Tenable<\/span><\/a><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Vulnerability management providing continuous insight into all government infrastructure risks<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #0000ff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Lookout<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Mobile threat defense for securing apps and devices used in public service delivery<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #0000ff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">CoSoSys<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Data Loss Prevention (DLP) ensuring citizen data integrity &amp; confidentiality<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/ivaluegroup.com\/en-in\/limitless-possibilities-with-google-cloud-platform\/\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Google Cloud<\/span><\/a><\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Scalable cloud solutions with AI &amp; analytics for smart governance<\/span><\/p><\/td><\/tr><tr style=\"height: 0pt;\"><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/ivaluegroup.com\/en-in\/netskope-ivalue-group\/\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Netskope<\/span><\/a><\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Secure Access Service Edge (SASE) providing visibility &amp; control over all cloud-based interactions<\/span><\/p><\/td><td style=\"border-width: 1pt; border-color: #000000; vertical-align: top; padding: 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/ivaluegroup.com\/en-in\/keysight-ivalue-group\/\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Keysight<\/span><\/a><\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.2; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: 'Playfair Display', serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Network visibility &amp; testing to ensure systems perform securely &amp; reliably under all conditions<\/span><\/p><\/td><\/tr><\/tbody><\/table><p><span style=\"color: #000000;\">In an era where government services are increasingly digital, ensuring security, continuity, and compliance is no longer optional. iValue\u2019s Secure Government Tech Stack brings together best-in-class technologies and domain expertise to create a unified, resilient ecosystem that safeguards sensitive data, enables rapid incident response, and ensures uninterrupted citizen services. From endpoints to cloud, from privileged access to insider threats, this stack equips government organizations to confidently navigate today\u2019s dynamic threat landscape.<\/span><\/p><p><span style=\"color: #000000;\">Secure your government services with confidence. Explore how iValue\u2019s Secure Government Tech Stack can help you protect data, maintain continuity, and achieve regulatory compliance\u2014today and tomorrow.<\/span><\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-04ecc29 elementor-widget elementor-widget-button\" data-id=\"04ecc29\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ivaluegroup.com\/en-in\/solutions\/industry-solution-stacks-for-bfsi-manufacturing-smart-cities-more-ivalue\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Heightened Exposure In An Already Heightened Landscape India\u2019s digital governance landscape has evolved into one of the most ambitious in the world. With more than 1.4 billion digital identity holders through Aadhaar, 400+ government digital services under the Digital India Mission, and over 2,000+ citizen-facing apps, India\u2019s eGovernance ecosystem is now a digital powerhouse driving &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/building-a-secure-government-tech-stack-for-cyber-resilience-in-india\/\"> <span class=\"screen-reader-text\">Building a Secure Government Tech Stack for Cyber Resilience in India<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":26708,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[131],"tags":[627,591,306,626,625],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/26707"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/comments?post=26707"}],"version-history":[{"count":7,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/26707\/revisions"}],"predecessor-version":[{"id":26753,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/26707\/revisions\/26753"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media\/26708"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media?parent=26707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/categories?post=26707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/tags?post=26707"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/whitepapers?post=26707"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/case_studies?post=26707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}