{"id":111,"date":"2024-05-02T10:54:39","date_gmt":"2024-05-02T10:54:39","guid":{"rendered":"https:\/\/thearika.com\/ameecybertech\/?page_id=111"},"modified":"2024-05-29T15:41:36","modified_gmt":"2024-05-29T15:41:36","slug":"services","status":"publish","type":"page","link":"https:\/\/thearika.com\/ameecybertech\/services\/","title":{"rendered":"Services"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"111\" class=\"elementor elementor-111\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-39db3818 elementor-section-boxed elementor-section-height-default elementor-section-height-default tf-sticky-section tf-sticky-no\" data-id=\"39db3818\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;tf_sticky&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-19a7d406\" data-id=\"19a7d406\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-27d7bfde elementor-section-boxed elementor-section-height-default elementor-section-height-default tf-sticky-section tf-sticky-no\" data-id=\"27d7bfde\" data-element_type=\"section\" data-settings=\"{&quot;tf_sticky&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2020a69b\" data-id=\"2020a69b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a079ab5 de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"7a079ab5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 26-05-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\"> Services<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-314f3f53 de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"314f3f53\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Home \/ Services<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7ae9ee0 elementor-section-boxed elementor-section-height-default elementor-section-height-default tf-sticky-section tf-sticky-no\" data-id=\"7ae9ee0\" data-element_type=\"section\" data-settings=\"{&quot;tf_sticky&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6c10295e\" data-id=\"6c10295e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b773f26 de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"7b773f26\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">our services<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79b5d725 de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"79b5d725\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">AMEE CYBER TECH PROVIDES\n<\/br>BELOW SERVICES<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cd841f0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cd841f0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fa59272\" data-id=\"fa59272\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1390564 elementor-absolute elementor-hidden-mobile de_scroll_animation_no elementor-widget elementor-widget-image\" data-id=\"1390564\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 26-05-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"598\" src=\"https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/380769766-02-8.png\" class=\"attachment-full size-full wp-image-17\" alt=\"\" srcset=\"https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/380769766-02-8.png 600w, https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/380769766-02-8-300x300.png 300w, https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/380769766-02-8-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e20c421 elementor-absolute elementor-hidden-mobile de_scroll_animation_no elementor-widget elementor-widget-image\" data-id=\"e20c421\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"598\" src=\"https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/380769766-02-8.png\" class=\"attachment-full size-full wp-image-17\" alt=\"\" srcset=\"https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/380769766-02-8.png 600w, https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/380769766-02-8-300x300.png 300w, https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/380769766-02-8-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a206bca elementor-absolute elementor-hidden-mobile de_scroll_animation_no elementor-widget elementor-widget-image\" data-id=\"a206bca\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"598\" src=\"https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/380769766-02-8.png\" class=\"attachment-full size-full wp-image-17\" alt=\"\" srcset=\"https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/380769766-02-8.png 600w, https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/380769766-02-8-300x300.png 300w, https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/380769766-02-8-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a6f4f9c elementor-section-boxed elementor-section-height-default elementor-section-height-default tf-sticky-section tf-sticky-no\" data-id=\"a6f4f9c\" data-element_type=\"section\" data-settings=\"{&quot;tf_sticky&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e0f121c\" data-id=\"e0f121c\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cd0d433 de_scroll_animation_no elementor-widget elementor-widget-menu-anchor\" data-id=\"cd0d433\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 26-05-2024 *\/\nbody.elementor-page .elementor-widget-menu-anchor{margin-bottom:0}<\/style>\t\t<div class=\"elementor-menu-anchor\" id=\"VAPT\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f30c916 de_scroll_animation_no elementor-widget elementor-widget-image\" data-id=\"f30c916\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"95\" height=\"95\" src=\"https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/cyber-security_hires.png\" class=\"attachment-full size-full wp-image-48\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e794ffe de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"e794ffe\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Vulnerability assessment\n<\/br>penetration Testing<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d852a1 de_scroll_animation_no elementor-widget elementor-widget-text-editor\" data-id=\"1d852a1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 26-05-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>(black-box, gray-box, white-box)<\/p><p>A vulnerability assessment is a systematic review of security weaknesses in an information system. It evaluates if the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation, if and whenever needed.<br \/>A penetration test (PT) is a proof-of concept approach to actually explore and exploit discovered vulnerabilities. This process takes vulnerability assessment one step further to verify and confirm if the vulnerability discovered really exists and can be exploited which an attacker in that case can result in damage to the application\/network.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0371474\" data-id=\"0371474\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8fc9a0c de_scroll_animation_no elementor-widget elementor-widget-menu-anchor\" data-id=\"8fc9a0c\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"WAT\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-489519e de_scroll_animation_no elementor-widget elementor-widget-image\" data-id=\"489519e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"95\" height=\"95\" src=\"https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/realtime-protection_hires.png\" class=\"attachment-full size-full wp-image-50\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63daf65 de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"63daf65\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Web Application \n<\/br>Testing<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bc8906 de_scroll_animation_no elementor-widget elementor-widget-text-editor\" data-id=\"1bc8906\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Advancements in web 2.0 and with a huge influx of modern web programming technology, the way we do business has been completely revolutionized. Gone are the days when the websites were as little as a business brochures and non-interactive objects. With the current available technologies, the web applications or websites or any synonym, web application is the \u2018in thing\u2019 in doing the business. Take any business, it has to exist online and interact 24 X 7 X 365 with the customers \/ potential customers.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-902e184 elementor-section-boxed elementor-section-height-default elementor-section-height-default tf-sticky-section tf-sticky-no\" data-id=\"902e184\" data-element_type=\"section\" data-settings=\"{&quot;tf_sticky&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3593c24\" data-id=\"3593c24\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b628814 de_scroll_animation_no elementor-widget elementor-widget-menu-anchor\" data-id=\"b628814\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"MAT\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2efa19 de_scroll_animation_no elementor-widget elementor-widget-image\" data-id=\"f2efa19\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"95\" height=\"94\" src=\"https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/password_hires.png\" class=\"attachment-full size-full wp-image-53\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8732868 de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"8732868\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Mobile Application \n<\/br>Testing<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42f4a26 de_scroll_animation_no elementor-widget elementor-widget-text-editor\" data-id=\"42f4a26\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Mobile application security is not just about code running smooth and safely on the mobile device. it&#8217;s Starting from the design; it also includes the unused data and data in motion. Mobile Security testing is extremely important for financial, social and commercial apps. In such cases, the application is neither released nor accepted by the customer if the security testing is not done.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2c941a9\" data-id=\"2c941a9\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0ed8abf de_scroll_animation_no elementor-widget elementor-widget-menu-anchor\" data-id=\"0ed8abf\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"NST\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9cb6ce de_scroll_animation_no elementor-widget elementor-widget-image\" data-id=\"c9cb6ce\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"95\" height=\"95\" src=\"https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/pincode-keyboard_hires-1.png\" class=\"attachment-full size-full wp-image-56\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e22a7c0 de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"e22a7c0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Network security \n<\/br>Testing<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-879423f de_scroll_animation_no elementor-widget elementor-widget-text-editor\" data-id=\"879423f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>An attacker \u2013 be it from inside the organization or an outsider, our expertise in network security testing and auditing will ensure a thorough testing and verification of your network resources and ensure security. We help our clients to develop a robust network architecture that is not only resilient to attacks, but also capable of monitoring the network for any suspicious actors.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8934f00 elementor-section-boxed elementor-section-height-default elementor-section-height-default tf-sticky-section tf-sticky-no\" data-id=\"8934f00\" data-element_type=\"section\" data-settings=\"{&quot;tf_sticky&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e512996\" data-id=\"e512996\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-84ade20 de_scroll_animation_no elementor-widget elementor-widget-menu-anchor\" data-id=\"84ade20\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"SAPD\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c03c8be de_scroll_animation_no elementor-widget elementor-widget-image\" data-id=\"c03c8be\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"95\" height=\"95\" src=\"https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/user-credentials_hires-1.png\" class=\"attachment-full size-full wp-image-58\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ecf821 de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"2ecf821\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Security architecture \n<\/br>planning & deployment<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bfa52aa de_scroll_animation_no elementor-widget elementor-widget-text-editor\" data-id=\"bfa52aa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>As per Indian Information Technology Act\u2019s (2008 amended) section 43A, any business; irrespective of its size and structure has to mandatorily protect its IT infrastructure and the sensitive data of its customer with reasonable security controls. Being this a truth, most of organizations especially medium and small scale industries either are unaware of the law in effect or are negligent in taking steps to secure the customer\u2019s data. Failing to protect sensitive data of customer can inflict stringent legal liabilities for the organization and its directors.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a42b83f\" data-id=\"a42b83f\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-963bc75 de_scroll_animation_no elementor-widget elementor-widget-menu-anchor\" data-id=\"963bc75\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"ISO\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-725a646 de_scroll_animation_no elementor-widget elementor-widget-image\" data-id=\"725a646\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"95\" height=\"95\" src=\"https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/security-checked_hires-1.png\" class=\"attachment-full size-full wp-image-60\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e719c9 de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"9e719c9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">ISO Consulting, \n<\/br> Audit & Implementation<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7f63e5 de_scroll_animation_no elementor-widget elementor-widget-text-editor\" data-id=\"c7f63e5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>ISO 27001:2013 consists of 14 groups 35 control objectives and 114 extensive controls that covers the length and breadth of an organizations \u2013 People, Processes &amp; technology. For an organization that wants to get certified with ISO 27001 ISMS standard from scratch, faces a lot of issues; right from sourcing the right consultants to implementing the business specific groups and their allied controls as we all know that each business is unique and their requirements are diverse. We understand this and with help of our certified consultants, we help our clients to achieve their goals in ISMS certifications.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e97d5cb elementor-section-boxed elementor-section-height-default elementor-section-height-default tf-sticky-section tf-sticky-no\" data-id=\"e97d5cb\" data-element_type=\"section\" data-settings=\"{&quot;tf_sticky&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-98485d5\" data-id=\"98485d5\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2430041 de_scroll_animation_no elementor-widget elementor-widget-menu-anchor\" data-id=\"2430041\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"API\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d813cd de_scroll_animation_no elementor-widget elementor-widget-image\" data-id=\"0d813cd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"95\" height=\"95\" src=\"https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/pincode-keyboard_hires-1.png\" class=\"attachment-full size-full wp-image-56\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc4c42b de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"cc4c42b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">API security \n<\/br>Testing<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba9d5af de_scroll_animation_no elementor-widget elementor-widget-text-editor\" data-id=\"ba9d5af\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>One of the most valuable assets of an organization is the data. A foundational element of innovation in today\u2019s app driven world is the API, An API is all means to make the developer\u2019s life easy. It controls resources and communication between services. APIs connect our most intimate and sensitive data.to make your data safe from hackers, you should use API security testing and ensure that the API is as safe as possible during the API lifecycle. If there is an error in API, it will affect all the applications that depend upon API. It&#8217;s very important for an organization to identify the threats to secure API from any kind of risk. That\u2019s why API security testing is very important. An Application Programming Interface provides the easiest access point to hackers.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-07a18d1\" data-id=\"07a18d1\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-359e83d de_scroll_animation_no elementor-widget elementor-widget-menu-anchor\" data-id=\"359e83d\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"Cert\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ff10ce de_scroll_animation_no elementor-widget elementor-widget-image\" data-id=\"3ff10ce\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"95\" height=\"95\" src=\"https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/user-credentials_hires-1.png\" class=\"attachment-full size-full wp-image-58\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa041b2 de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"aa041b2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Cert-In \n<\/br>Audit<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51c19f8 de_scroll_animation_no elementor-widget elementor-widget-text-editor\" data-id=\"51c19f8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>As a CERT-In Empanelled Auditor, we carry out a comprehensive security audit of your website, network &amp; applications as per the CERT In Guidelines for IT Security Audits. Once the audit is completed successfully and all the requirements have been fulfilled, we issue a CERT-In Security Certificate or Safe To Host Certificate as required.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3d3edf8 elementor-section-boxed elementor-section-height-default elementor-section-height-default tf-sticky-section tf-sticky-no\" data-id=\"3d3edf8\" data-element_type=\"section\" data-settings=\"{&quot;tf_sticky&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-cb131f6\" data-id=\"cb131f6\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-85a0e42 de_scroll_animation_no elementor-widget elementor-widget-menu-anchor\" data-id=\"85a0e42\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"PCI\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67cd418 de_scroll_animation_no elementor-widget elementor-widget-image\" data-id=\"67cd418\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"95\" height=\"95\" src=\"https:\/\/thearika.com\/ameecybertech\/wp-content\/uploads\/2024\/05\/security-checked_hires-1.png\" class=\"attachment-full size-full wp-image-60\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ccf82ec de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"ccf82ec\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">PCI DSS \n<\/br>Audit<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d12a26 de_scroll_animation_no elementor-widget elementor-widget-text-editor\" data-id=\"9d12a26\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>A PCI audit is a vigorous nspection of a merchant&#8217;s adherence to PCI DSS requirements, consisting of numerous individual controls or safeguards for protecting cardholder information (e.g., Primary Account Number, CAV\/CID\/CVC2\/CVV2, etc.) and systems that interact with payment processing.<br \/><br \/>The PCI DSS (Payment Card Industry Data Security Standard) is an information security standard designed to reduce payment card fraud by increasing security controls around cardholder data.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4bafcf9a elementor-section-boxed elementor-section-height-default elementor-section-height-default tf-sticky-section tf-sticky-no\" data-id=\"4bafcf9a\" data-element_type=\"section\" data-settings=\"{&quot;tf_sticky&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-423efbea\" data-id=\"423efbea\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-142945b elementor-section-boxed elementor-section-height-default elementor-section-height-default tf-sticky-section tf-sticky-no\" data-id=\"142945b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;tf_sticky&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-287363e\" data-id=\"287363e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2e024c2 elementor-section-boxed elementor-section-height-default elementor-section-height-default tf-sticky-section tf-sticky-no\" data-id=\"2e024c2\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;,&quot;tf_sticky&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-3b0c327\" data-id=\"3b0c327\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c3716da de_reveal_animation_yes de_reveal_animation_style_fd de_reveal_easing_easeInOutQuad de_reveal_distance_50 de_scroll_animation_no de_reveal_animation_type_default de_reveal_default_delay_0 de_reveal_duration_1000 de_reveal_direction_normal de_reveal_loop_custom de_reveal_custom_loop_1 de_reveal_start_0.5 de_reveal_animate_in_viewport_runonce de_reveal_on_desktop_yes de_reveal_on_tablet_yes de_reveal_on_mobile_yes elementor-widget elementor-widget-heading\" data-id=\"c3716da\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Amee Cyber Tech<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e677f8 de_reveal_animation_yes de_reveal_animation_style_fd de_reveal_easing_easeInOutQuad de_reveal_distance_50 de_reveal_duration_1000 de_scroll_animation_no de_reveal_animation_type_default de_reveal_default_delay_0 de_reveal_direction_normal de_reveal_loop_custom de_reveal_custom_loop_1 de_reveal_start_0.5 de_reveal_animate_in_viewport_runonce de_reveal_on_desktop_yes de_reveal_on_tablet_yes de_reveal_on_mobile_yes elementor-widget elementor-widget-heading\" data-id=\"3e677f8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Focuses on relationship with our partner and client. We pride ourselves in developing and providing effective consultancy services to our clients with effective delivery and mainstream results. Our team works on the principle of predicting and developing the complete end-to-end solutions through a detailed research and implementation, so that our client gets the maximum ROI for his business.\n\n<\/br><\/br>\nWe believe that every business entity is unique and hence the approach to promote it must also be unique. Therefore, all our solutions are tailor-made keeping in mind the requirement of our esteemed clients.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Services Home \/ Services our services AMEE CYBER TECH PROVIDES BELOW SERVICES Vulnerability assessment penetration Testing (black-box, gray-box, white-box) A vulnerability assessment is a systematic review of security weaknesses in an information system. It evaluates if the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-111","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/thearika.com\/ameecybertech\/wp-json\/wp\/v2\/pages\/111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thearika.com\/ameecybertech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/thearika.com\/ameecybertech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/thearika.com\/ameecybertech\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thearika.com\/ameecybertech\/wp-json\/wp\/v2\/comments?post=111"}],"version-history":[{"count":55,"href":"https:\/\/thearika.com\/ameecybertech\/wp-json\/wp\/v2\/pages\/111\/revisions"}],"predecessor-version":[{"id":675,"href":"https:\/\/thearika.com\/ameecybertech\/wp-json\/wp\/v2\/pages\/111\/revisions\/675"}],"wp:attachment":[{"href":"https:\/\/thearika.com\/ameecybertech\/wp-json\/wp\/v2\/media?parent=111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}