{"id":21,"date":"2017-06-19T07:07:39","date_gmt":"2017-06-19T07:07:39","guid":{"rendered":"https:\/\/nazarethtech.com\/index.php\/services-2\/"},"modified":"2024-01-10T09:33:58","modified_gmt":"2024-01-10T15:33:58","slug":"services-2","status":"publish","type":"page","link":"https:\/\/nazarethtech.com\/index.php\/services-2\/","title":{"rendered":"Services"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"21\" class=\"elementor elementor-21\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2296c7ec elementor-section-stretched elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle elementor-invisible\" data-id=\"2296c7ec\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;background_video_link&quot;:&quot;https:\\\/\\\/nazarethtech.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/unnamed-file.mp4&quot;,&quot;background_play_on_mobile&quot;:&quot;yes&quot;,&quot;background_video_start&quot;:0}\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-background-video-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3b479c2e\" data-id=\"3b479c2e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61501058 elementor-widget elementor-widget-heading\" data-id=\"61501058\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Services<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64750db3 elementor-widget elementor-widget-heading\" data-id=\"64750db3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">We provide a wide range of Services<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a19ae6d elementor-widget elementor-widget-text-editor\" data-id=\"7a19ae6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"lead margin-bottom-0\">Our company takes pride in providing top-tier, customer-centric services designed to meet the specific needs and challenges of each client, ensuring satisfaction and success in their respective fields<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-321138fc elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"321138fc\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6307ba6f\" data-id=\"6307ba6f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-53703a79 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53703a79\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6c82d370\" data-id=\"6c82d370\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7cd3c571 elementor-widget elementor-widget-heading\" data-id=\"7cd3c571\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Secure, Scalable, and Efficient IT Solutions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-281729d4 elementor-widget elementor-widget-text-editor\" data-id=\"281729d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At Nazareth Technologies, we leverage cutting-edge technology and deep industry expertise to empower your business, ensuring robust cybersecurity, seamless IT management, and innovative solutions that drive efficiency and growth.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-68093ab elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"68093ab\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-05fe487\" data-id=\"05fe487\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9fbae5e elementor-position-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"9fbae5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/security-4907127_1920.jpg\" class=\"attachment-full size-full wp-image-2247\" alt=\"\" srcset=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/security-4907127_1920.jpg 1920w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/security-4907127_1920-300x169.jpg 300w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/security-4907127_1920-1024x576.jpg 1024w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/security-4907127_1920-768x432.jpg 768w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/security-4907127_1920-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\">Cybersecurity<\/h4><p class=\"elementor-image-box-description\">Your network is a prime target for cyber criminals, both local and around the world. While we know to defend our computers, we often leave our network defenses in the hands of out of date and unmanaged technology, leaving your organization ripe for a cyber attack.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c1f006 elementor-invisible elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"2c1f006\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;}\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-2c1f006\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"2c1f006\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"managed-security-services\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-4621\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-user-lock\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Managed Security Services<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-4621\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"managed-security-services\"><p>Offering 24\/7 monitoring and management of your IT security infrastructure to detect and respond to threats in real time.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"threat-assessment-management\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-4622\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-user-lock\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Threat Assessment &amp; Management<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-4622\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"threat-assessment-management\"><p>Identifying and mitigating risks with proactive threat intelligence and incident response strategies.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"compliance-and-governance\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-4623\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-user-lock\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Compliance and Governance<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-4623\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"compliance-and-governance\"><p>Assisting in meeting legal and regulatory requirements related to cybersecurity in your industry.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"penetration-testing\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-4624\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-user-lock\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Penetration Testing<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-4624\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"penetration-testing\"><p>Employ real-world attack simulations to evaluate the effectiveness of your security measures and identify exploitable weaknesses in your network, applications, and systems.<\/p><\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-1d0def0\" data-id=\"1d0def0\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-561375a elementor-position-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"561375a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/monitor-1307227_1920.jpg\" class=\"attachment-full size-full wp-image-2238\" alt=\"\" srcset=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/monitor-1307227_1920.jpg 1920w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/monitor-1307227_1920-300x169.jpg 300w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/monitor-1307227_1920-1024x576.jpg 1024w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/monitor-1307227_1920-768x432.jpg 768w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/monitor-1307227_1920-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\">Managed Services<\/h4><p class=\"elementor-image-box-description\">Your organization needs cybersecurity coverage that monitors, detects and responds to threats so you can rest assured that your information is safe.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e2e725 elementor-invisible elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"5e2e725\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-5e2e725\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"5e2e725\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"help-desk-services\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-9871\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-laptop\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Help Desk Services<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-9871\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"help-desk-services\"><p>Providing immediate, professional support for any IT related questions or problems your employees may encounter.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"network-management\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-9872\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-laptop\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Network Management<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-9872\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"network-management\"><p>Continuous oversight of your network operations to optimize performance and quickly resolve any issues.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"security-management\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-9873\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-laptop\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Security Management<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-9873\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"security-management\"><p>Implementing robust security measures including firewalls, anti-virus solutions, and intrusion detection to protect against threats.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"data-backup-and-recovery\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-9874\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-laptop\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Data Backup and Recovery<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-9874\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"data-backup-and-recovery\"><p>Ensuring your critical data is backed up regularly and can be quickly restored in the event of loss or corruption.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"comprehensive-it-support\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"5\" aria-controls=\"elementor-tab-content-9875\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-laptop\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Comprehensive IT Support<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-9875\" class=\"eael-accordion-content clearfix\" data-tab=\"5\" aria-labelledby=\"comprehensive-it-support\"><p>Round-the-clock monitoring and management of your IT infrastructure to ensure reliability and performance.<\/p><\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-ef1baf4\" data-id=\"ef1baf4\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8f4e8a6 elementor-position-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"8f4e8a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/world-4292933_1920.jpg\" class=\"attachment-full size-full wp-image-2239\" alt=\"\" srcset=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/world-4292933_1920.jpg 1920w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/world-4292933_1920-300x169.jpg 300w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/world-4292933_1920-1024x576.jpg 1024w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/world-4292933_1920-768x432.jpg 768w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/world-4292933_1920-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\">Procurement Services<\/h4><p class=\"elementor-image-box-description\">Your organization needs improved savings through innovative price reductions and\/or quantity discounts.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9509f0 elementor-invisible elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"d9509f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-d9509f0\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"d9509f0\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"strategic-sourcing\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-2271\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-boxes\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Strategic Sourcing<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-2271\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"strategic-sourcing\"><p>Leveraging market research and industry expertise to source products and services that meet quality and budgetary requirements.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"order-management-and-fulfillment\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-2272\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-boxes\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Order Management and Fulfillment<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-2272\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"order-management-and-fulfillment\"><p>Streamlining the order process to ensure timely delivery and accuracy of products and services.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"cost-reduction-strategies\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-2273\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-boxes\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Cost Reduction Strategies<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-2273\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"cost-reduction-strategies\"><p>Implementing strategies to reduce costs without compromising on quality, including bulk purchasing and exploring alternative suppliers.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"vendor-selection-and-management\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-2274\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-boxes\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Vendor Selection and Management<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-2274\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"vendor-selection-and-management\"><p>Identifying and partnering with reputable vendors to provide quality goods and services at competitive prices.<\/p><\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-efbb438 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"efbb438\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-cc7bcc6\" data-id=\"cc7bcc6\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bb44113 elementor-position-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"bb44113\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cyber-security-2776600.jpg\" class=\"attachment-full size-full wp-image-2241\" alt=\"\" srcset=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cyber-security-2776600.jpg 1920w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cyber-security-2776600-300x169.jpg 300w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cyber-security-2776600-1024x576.jpg 1024w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cyber-security-2776600-768x432.jpg 768w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cyber-security-2776600-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\">vCISO<\/h4><p class=\"elementor-image-box-description\">Leverage access to a dedicated CISO at your convenience. Remote and onsite options are available. Access to and involvement with your Senior Executive Team will form a partnership that will guide, strengthen, and deliver or augment a robust cyber security program.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1f99ac elementor-invisible elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"c1f99ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-c1f99ac\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"c1f99ac\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"strategic-security-leadership\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-2031\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-user\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Strategic Security Leadership<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-2031\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"strategic-security-leadership\"><p>Offering executive-level cybersecurity leadership to align security initiatives with business objectives.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"policy-development\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-2032\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-user\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Policy Development<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-2032\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"policy-development\"><p>Crafting comprehensive security policies, procedures, and standards tailored to your business&#8217;s unique needs and culture.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"vendor-and-third-party-risk-management\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-2033\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-user\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Vendor and Third-Party Risk Management<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-2033\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"vendor-and-third-party-risk-management\"><p>Assessing and managing the security risks associated with third-party vendors and partners.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"risk-management\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-2034\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-user\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Risk Management<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-2034\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"risk-management\"><p>Identifying, assessing, and mitigating risks to protect organizational assets and ensure regulatory compliance.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"technology-roadmap-planning\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"5\" aria-controls=\"elementor-tab-content-2035\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-user\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Technology Roadmap Planning<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-2035\" class=\"eael-accordion-content clearfix\" data-tab=\"5\" aria-labelledby=\"technology-roadmap-planning\"><p>Providing guidance on the adoption of security technologies and practices that align with business growth and technology trends.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"incident-response-planning\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"6\" aria-controls=\"elementor-tab-content-2036\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-user\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Incident Response Planning<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-2036\" class=\"eael-accordion-content clearfix\" data-tab=\"6\" aria-labelledby=\"incident-response-planning\"><p>Preparing and guiding organizations through potential security incidents with a well-structured response plan.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"security-awareness-training\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"7\" aria-controls=\"elementor-tab-content-2037\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-user\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Security Awareness Training<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-2037\" class=\"eael-accordion-content clearfix\" data-tab=\"7\" aria-labelledby=\"security-awareness-training\"><p>Educating staff and executives on cybersecurity best practices, emerging threats, and proactive behavior to foster a security-conscious culture.<\/p><\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5cbf899\" data-id=\"5cbf899\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b324e46 elementor-position-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"b324e46\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cloud-computing-1924338-1.png\" class=\"attachment-full size-full wp-image-2257\" alt=\"\" srcset=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cloud-computing-1924338-1.png 1920w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cloud-computing-1924338-1-300x169.png 300w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cloud-computing-1924338-1-1024x576.png 1024w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cloud-computing-1924338-1-768x432.png 768w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cloud-computing-1924338-1-1536x864.png 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\">Cloud Services<\/h4><p class=\"elementor-image-box-description\">Your organization needs to evaluate, setup, and manage transition from client-server to a virtualized environment.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8947ea6 elementor-invisible elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"8947ea6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-8947ea6\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"8947ea6\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"security\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-1431\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-cloud\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Security<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-1431\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"security\"><p>Experience enhanced security measures, including encrypted data transfer and storage, multi-factor authentication, and regular security updates.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"disaster-recovery\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-1432\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-cloud\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Disaster Recovery<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-1432\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"disaster-recovery\"><p>Leverage built-in redundancy and backup solutions to ensure your critical data is always secure and recoverable in the event of a disaster.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"mobility\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-1433\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-cloud\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Mobility<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-1433\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"mobility\"><p>Access your data and applications from anywhere, at any time, using any device with an internet connection, providing flexibility and mobility to your workforce.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"up-to-date-technology\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-1434\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-cloud\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Up-to-Date Technology<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-1434\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"up-to-date-technology\"><p>Gain access to the latest features and updates without the need for manual installations, keeping your business at the forefront of technology.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"cost-effective\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"5\" aria-controls=\"elementor-tab-content-1435\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-cloud\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Cost-Effective<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-1435\" class=\"eael-accordion-content clearfix\" data-tab=\"5\" aria-labelledby=\"cost-effective\"><p>Reduce costs associated with purchasing and maintaining physical hardware by utilizing cloud infrastructure that fits your budget.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"scalable-solutions\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"6\" aria-controls=\"elementor-tab-content-1436\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-cloud\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Scalable Solutions<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-1436\" class=\"eael-accordion-content clearfix\" data-tab=\"6\" aria-labelledby=\"scalable-solutions\"><p>Customize and scale your services as your business grows, ensuring you always have the resources you need without overpaying for what you don&#8217;t.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"enhanced-collaboration\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"7\" aria-controls=\"elementor-tab-content-1437\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-cloud\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Enhanced Collaboration<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-1437\" class=\"eael-accordion-content clearfix\" data-tab=\"7\" aria-labelledby=\"enhanced-collaboration\"><p>Facilitate better team collaboration with shared access to files and applications from any location, enhancing productivity and efficiency.<\/p><\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f0e9f83\" data-id=\"f0e9f83\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0631688 elementor-position-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"0631688\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:500}\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cyber-security-3443628_1920.jpg\" class=\"attachment-full size-full wp-image-2243\" alt=\"\" srcset=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cyber-security-3443628_1920.jpg 1920w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cyber-security-3443628_1920-300x169.jpg 300w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cyber-security-3443628_1920-1024x576.jpg 1024w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cyber-security-3443628_1920-768x432.jpg 768w, https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/cyber-security-3443628_1920-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\">Consulting<\/h4><p class=\"elementor-image-box-description\">Your organization needs developing and implementing comprehensive sets of cybersecurity policies and procedures to facilitating the adoption of new technologies.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c04aea elementor-invisible elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"8c04aea\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;,&quot;_animation_delay&quot;:500}\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-8c04aea\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"8c04aea\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"consulting-and-strategy\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-1461\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-users\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Consulting and Strategy<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-1461\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"consulting-and-strategy\"><p>Offering expert guidance to align your IT strategy with your business objectives, including recommendations for improvements and new technologies.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"system-integration\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-1462\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-users\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">System Integration<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-1462\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"system-integration\"><p>Seamlessly integrating various IT systems and applications to enhance efficiency and productivity.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"cybersecurity-solutions\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-1463\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-users\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Cybersecurity Solutions<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-1463\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"cybersecurity-solutions\"><p>Implementing robust security measures to protect your data and IT infrastructure from cyber threats.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"disaster-recovery-planning\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-1464\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-users\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Disaster Recovery Planning<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-1464\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"disaster-recovery-planning\"><p>Developing and implementing disaster recovery strategies to ensure business continuity in the face of unexpected events.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"training-and-empowerment\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"5\" aria-controls=\"elementor-tab-content-1465\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-users\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Training and Empowerment<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-chess-rook\"><\/i><\/div><div id=\"elementor-tab-content-1465\" class=\"eael-accordion-content clearfix\" data-tab=\"5\" aria-labelledby=\"training-and-empowerment\"><p>Educating your team on new technologies and best practices to maximize the benefits of your IT investments.<\/p><\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-60f110fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"60f110fd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7165c58d\" data-id=\"7165c58d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5eb756a4 elementor-widget elementor-widget-heading\" data-id=\"5eb756a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Partners<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bd2818e elementor-widget elementor-widget-text-editor\" data-id=\"4bd2818e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Here are a few of our partners for a comprehensive list please feel free to <a href=\"https:\/\/nazarethtech.com\/index.php\/contact\/\" target=\"_blank\" rel=\"noopener\">contact us\u00a0<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f147bfe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f147bfe\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4f7266a\" data-id=\"4f7266a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4992311 elementor-arrows-position-outside elementor-widget__width-inherit elementor-pagination-position-outside elementor-invisible elementor-widget elementor-widget-image-carousel\" data-id=\"4992311\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;autoplay_speed&quot;:4000,&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper swiper-image-stretch\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/att-cybersecurity-web.svg\" alt=\"att-cybersecurity-web\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/Fortinet-Logo.wine_-1.svg\" alt=\"Fortinet-Logo.wine\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/Cisco_Systems-Logo.wine_-1.svg\" alt=\"Cisco_Systems-Logo.wine\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/Amazon_Web_Services-Logo.wine_-1.svg\" alt=\"Amazon_Web_Services-Logo.wine\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/Qualys-Logo.wine_.svg\" alt=\"Qualys-Logo.wine\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/Cloudflare-Logo.wine_.svg\" alt=\"Cloudflare-Logo.wine\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/carbon-black-logo-1.svg\" alt=\"carbon-black-logo\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/Microsoft_Azure-Logo.wine_-1.svg\" alt=\"Microsoft_Azure-Logo.wine\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/Sophos-Logo.wine_-1.svg\" alt=\"Sophos-Logo.wine\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/Forcepoint-Logo.wine_.svg\" alt=\"Forcepoint-Logo.wine\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/SpyCloud-Logo-Black.svg\" alt=\"SpyCloud-Logo-Black\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"12 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2020\/09\/F5_Networks-Logo.wine_.svg\" alt=\"F5_Networks-Logo.wine\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"13 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2024\/01\/watchguard.png\" alt=\"watchguard\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"14 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2024\/01\/ubiq.png\" alt=\"ubiq\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"15 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2024\/01\/dark.png\" alt=\"dark\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"16 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2024\/01\/swim.png\" alt=\"swim\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"17 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2024\/01\/palo.png\" alt=\"palo\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"18 of 18\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/nazarethtech.com\/wp-content\/uploads\/2024\/01\/check-300x116.png\" alt=\"check\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-chevron-left\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-chevron-right\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0e4f0bf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0e4f0bf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ec5b79c\" data-id=\"ec5b79c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9164904 elementor-widget elementor-widget-spacer\" data-id=\"9164904\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f6ff97 elementor-widget elementor-widget-heading\" data-id=\"9f6ff97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SANS Incident Response Plan<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca2904f elementor-widget-mobile__width-inherit elementor-widget elementor-widget-eael-interactive-circle\" data-id=\"ca2904f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-interactive-circle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div id=\"eael-interactive-circle-ca2904f\" class=\"eael-interactive-circle\" data-tabid=\"ca2904f\">\n\t\t\t\n                <div class=\"eael-circle-wrapper eael-interactive-circle-preset-2 eael-interactive-circle-event-hover eael-circle-responsive-view\" data-appearance=\"eael-interactive-circle-animation-3\" data-autoplay=\"0\" data-autoplay-interval=\"2000\">\n                    <div class=\"eael-circle-info\">\n                        <div class=\"eael-circle-inner\" data-items=\"6\">\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-3cafa75\">\n                                    <div aria-controls=\"eael-interactive-1\" tabindex=\"0\" class=\"eael-circle-btn active\" id=\"eael-circle-item-1\">\n                                        <div class=\"eael-circle-icon-shapes\">\n                                            <div class=\"eael-shape-1\"><\/div>\n                                            <div class=\"eael-shape-2\"><\/div>\n                                        <\/div>\n\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"eael-circle-btn-txt\">Preparation<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n\n                                    <\/div>\n                                    <div class=\"eael-circle-btn-content eael-circle-item-1 active\">\n                                        <div id=\"eael-interactive1\" aria-labelledby=\"eael-circle-item-1\" class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>Before an incident occurs, organizations should take steps to prepare for the incident. This includes developing an incident response plan, establishing roles and responsibilities, and training personnel.<\/p>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-86d21ae\">\n                                    <div aria-controls=\"eael-interactive-2\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-2\">\n                                        <div class=\"eael-circle-icon-shapes\">\n                                            <div class=\"eael-shape-1\"><\/div>\n                                            <div class=\"eael-shape-2\"><\/div>\n                                        <\/div>\n\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"eael-circle-btn-txt\">Identification<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n\n                                    <\/div>\n                                    <div class=\"eael-circle-btn-content eael-circle-item-2 \">\n                                        <div id=\"eael-interactive2\" aria-labelledby=\"eael-circle-item-2\" class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>Once an incident has occurred, it is important to identify the incident and the affected systems. This can be done by performing scans, reviewing logs, and conducting interviews with personnel.<\/p>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-e6624eb\">\n                                    <div aria-controls=\"eael-interactive-3\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-3\">\n                                        <div class=\"eael-circle-icon-shapes\">\n                                            <div class=\"eael-shape-1\"><\/div>\n                                            <div class=\"eael-shape-2\"><\/div>\n                                        <\/div>\n\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"eael-circle-btn-txt\">Containment<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n\n                                    <\/div>\n                                    <div class=\"eael-circle-btn-content eael-circle-item-3 \">\n                                        <div id=\"eael-interactive3\" aria-labelledby=\"eael-circle-item-3\" class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>After an incident has been identified, it is important to contain the incident to prevent further damage. This can be done by isolating affected systems, disconnecting affected systems from the network, and disabling affected accounts.<\/p>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-bc8d8fb\">\n                                    <div aria-controls=\"eael-interactive-4\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-4\">\n                                        <div class=\"eael-circle-icon-shapes\">\n                                            <div class=\"eael-shape-1\"><\/div>\n                                            <div class=\"eael-shape-2\"><\/div>\n                                        <\/div>\n\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"eael-circle-btn-txt\">Eradication<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n\n                                    <\/div>\n                                    <div class=\"eael-circle-btn-content eael-circle-item-4 \">\n                                        <div id=\"eael-interactive4\" aria-labelledby=\"eael-circle-item-4\" class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>Once the incident has been contained, it is important to remove the malicious code or activity from the affected systems. This can be done by using malware removal tools, restoring from backups, and patching vulnerable systems.<\/p>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-5592ce1\">\n                                    <div aria-controls=\"eael-interactive-5\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-5\">\n                                        <div class=\"eael-circle-icon-shapes\">\n                                            <div class=\"eael-shape-1\"><\/div>\n                                            <div class=\"eael-shape-2\"><\/div>\n                                        <\/div>\n\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"eael-circle-btn-txt\">Recovery<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n\n                                    <\/div>\n                                    <div class=\"eael-circle-btn-content eael-circle-item-5 \">\n                                        <div id=\"eael-interactive5\" aria-labelledby=\"eael-circle-item-5\" class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>After the malicious code or activity has been removed from the affected systems, it is important to recover the affected systems. This can be done by restoring from backups, reinstalling operating systems, and reconfiguring systems.<\/p>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\t\t\t\t\t\t\t                                <div class=\"eael-circle-item elementor-repeater-item-1a7ac25\">\n                                    <div aria-controls=\"eael-interactive-6\" tabindex=\"0\" class=\"eael-circle-btn \" id=\"eael-circle-item-6\">\n                                        <div class=\"eael-circle-icon-shapes\">\n                                            <div class=\"eael-shape-1\"><\/div>\n                                            <div class=\"eael-shape-2\"><\/div>\n                                        <\/div>\n\n\t\t\t\t\t\t\t\t\t\t<!-- Start URL support -->\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-circle-btn-icon-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"eael-circle-btn-txt\">Lessons Learned<\/span>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n                                        \t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- End URL support -->\n\n                                    <\/div>\n                                    <div class=\"eael-circle-btn-content eael-circle-item-6 \">\n                                        <div id=\"eael-interactive6\" aria-labelledby=\"eael-circle-item-6\" class=\"eael-circle-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>After the incident has been resolved, it is important to review the incident and identify any areas for improvement. This can be done by conducting a post-incident review and updating the incident response plan.<\/p>                                        <\/div>\n                                    <\/div>\n                                <\/div>\n\t\t\t\t\t\t\t\n                        <\/div>\n                    <\/div>\n                <\/div>\n\t\t\t\n        <\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c2aa220 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c2aa220\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-493856a\" data-id=\"493856a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-08b52c4 elementor-widget elementor-widget-embedpres_document\" data-id=\"08b52c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"embedpres_document.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"embedpress-document-embed ep-doc-e12dab16df862af32c587056da012763 ose-document \" style=\"width: 600px; height: 600px; max-width:100%; display: inline-block\">\n\n                        <div >\n\n                <div id=\"ep-elementor-content-08b52c4\" class=\"ep-elementor-content    ep-content-protection-disabled\">\n                    <div id=\"08b52c4\" class=\"ep-embed-content-wraper\">\n                                            <\/div>\n                <\/div>\n                            <\/div>\n        <\/div>\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Services We provide a wide range of Services Our company takes pride in providing top-tier, customer-centric services designed to meet the specific needs and challenges of each client, ensuring satisfaction and success in their respective fields Secure, Scalable, and Efficient IT Solutions At Nazareth Technologies, we leverage cutting-edge technology and deep industry expertise to empower [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_eb_attr":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-21","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/nazarethtech.com\/index.php\/wp-json\/wp\/v2\/pages\/21","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nazarethtech.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nazarethtech.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nazarethtech.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nazarethtech.com\/index.php\/wp-json\/wp\/v2\/comments?post=21"}],"version-history":[{"count":108,"href":"https:\/\/nazarethtech.com\/index.php\/wp-json\/wp\/v2\/pages\/21\/revisions"}],"predecessor-version":[{"id":2802,"href":"https:\/\/nazarethtech.com\/index.php\/wp-json\/wp\/v2\/pages\/21\/revisions\/2802"}],"wp:attachment":[{"href":"https:\/\/nazarethtech.com\/index.php\/wp-json\/wp\/v2\/media?parent=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}