{"id":67,"date":"2025-05-15T15:44:29","date_gmt":"2025-05-15T15:44:29","guid":{"rendered":"https:\/\/www.cybercarm.com\/?page_id=67"},"modified":"2025-05-15T15:56:29","modified_gmt":"2025-05-15T15:56:29","slug":"home-2","status":"publish","type":"page","link":"https:\/\/oxfordroadwarriors.co.uk\/","title":{"rendered":"Home"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;About&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;048d8e79-b07f-439b-bd57-f41c14f0a56b&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Our Mission at Cybercarm&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;c33f07d9-41e0-421a-8799-5799df695cce&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; global_colors_info=&#8221;{}&#8221;]Cybercarm is dedicated to fortifying the digital landscapes of organizations worldwide. Our mission is to provide robust cybersecurity solutions that help businesses maintain their security posture amidst evolving threats. With a focus on Compliance, Automation, Risk Management, and Observability, we strive to offer comprehensive services that ensure your data remains protected. Our commitment to innovation and excellence drives us to continuously enhance our offerings, ensuring that our clients are always one step ahead in the cybersecurity race.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; admin_label=&#8221;Hero&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;e68aa8c9-06e1-48cb-b82b-29ec720aed4c&#8221; background_image=&#8221;https:\/\/oxfordroadwarriors.co.uk\/wp-content\/uploads\/2025\/05\/cybercarm-hacker-in-the-hood-scaled.jpg&#8221; custom_padding=&#8221;13vw||13vw||true|false&#8221; custom_padding_tablet=&#8221;10vw||10vw||true|false&#8221; custom_padding_phone=&#8221;10vw||10vw||true|false&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; title_text=&#8221;cybercarm hacker in the hood&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Protecting Your Digital Future&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;f0c675ea-2574-4d0e-b725-30f8550a8550&#8243; title_text_color=&#8221;gcid-primary-color&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-primary-color%22:%91%22title_text_color%22%93}&#8221;][\/et_pb_heading][et_pb_heading title=&#8221;Cybersecurity Solutions for a Safer Tomorrow&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;ddeb8c09-9078-4424-bc15-2efb6572e28e&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Discover how Cybercarm empowers organizations to safeguard their digital assets with cutting-edge cybersecurity solutions tailored to your needs.<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;Explore Solutions&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; custom_padding=&#8221;8%||8%||false|false&#8221; custom_padding_tablet=&#8221;0%||8%||false|false&#8221; custom_padding_phone=&#8221;0%||8%||false|false&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Services&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; custom_margin=&#8221;|auto|-10px|auto|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Explore Our Cybersecurity Solutions&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;f0c675ea-2574-4d0e-b725-30f8550a8550&#8243; title_text_align=&#8221;center&#8221; title_text_color=&#8221;gcid-primary-color&#8221; global_colors_info=&#8221;{%22gcid-primary-color%22:%91%22title_text_color%22%93}&#8221;][\/et_pb_heading][et_pb_heading title=&#8221;Comprehensive Cybersecurity Services&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;c33f07d9-41e0-421a-8799-5799df695cce&#8221; title_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; custom_padding_tablet=&#8221;||0px||false|false&#8221; custom_padding_phone=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Compliance Assurance&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe012;||divi||400&#8243; icon_color=&#8221;gcid-secondary-color&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;65059203-12d3-44f6-8371-3f5cf61a0475&#8243; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22image_icon_background_color%22,%22image_icon_background_color%22%93,%22gcid-heading-color%22:%91%22header_text_color%22,%22header_text_color%22%93,%22gcid-body-color%22:%91%22body_text_color%22,%22body_text_color%22%93,%22gcid-primary-color%22:%91%22body_link_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}&#8221;]<\/p>\n<p>We assist in developing security policies, conducting thorough audits, and achieving necessary accreditations to ensure your organization remains compliant with industry standards.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Automation &#038; AI Integration&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe012;||divi||400&#8243; icon_color=&#8221;gcid-secondary-color&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;65059203-12d3-44f6-8371-3f5cf61a0475&#8243; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22image_icon_background_color%22%93,%22gcid-heading-color%22:%91%22header_text_color%22%93,%22gcid-body-color%22:%91%22body_text_color%22%93,%22gcid-primary-color%22:%91%22body_link_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}&#8221;]<\/p>\n<p>Leverage the power of automation and AI to enhance your security infrastructure, reducing manual efforts while increasing efficiency and effectiveness.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Risk Management Strategies&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf0ae;||fa||900&#8243; icon_color=&#8221;gcid-secondary-color&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;65059203-12d3-44f6-8371-3f5cf61a0475&#8243; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22image_icon_background_color%22%93,%22gcid-heading-color%22:%91%22header_text_color%22%93,%22gcid-body-color%22:%91%22body_text_color%22%93,%22gcid-primary-color%22:%91%22body_link_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}&#8221;]<\/p>\n<p>Implement advanced risk management solutions that include threat intelligence, network security, and vulnerability management to mitigate potential risks effectively.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Security Observability&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf1fb;||fa||900&#8243; icon_color=&#8221;gcid-secondary-color&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;65059203-12d3-44f6-8371-3f5cf61a0475&#8243; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22image_icon_background_color%22%93,%22gcid-heading-color%22:%91%22header_text_color%22%93,%22gcid-body-color%22:%91%22body_text_color%22%93,%22gcid-primary-color%22:%91%22body_link_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}&#8221;]<\/p>\n<p>Gain comprehensive insights into your security posture with observability tools that provide real-time monitoring and analytics.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Endpoint Protection&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf0a0;||fa||400&#8243; icon_color=&#8221;gcid-secondary-color&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;65059203-12d3-44f6-8371-3f5cf61a0475&#8243; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22image_icon_background_color%22%93,%22gcid-heading-color%22:%91%22header_text_color%22%93,%22gcid-body-color%22:%91%22body_text_color%22%93,%22gcid-primary-color%22:%91%22body_link_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}&#8221;]<\/p>\n<p>Secure your endpoints with our advanced protection solutions, ensuring that all devices accessing your network are safeguarded against threats.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Human Risk Mitigation&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf235;||fa||900&#8243; icon_color=&#8221;gcid-secondary-color&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;65059203-12d3-44f6-8371-3f5cf61a0475&#8243; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22image_icon_background_color%22%93,%22gcid-heading-color%22:%91%22header_text_color%22%93,%22gcid-body-color%22:%91%22body_text_color%22%93,%22gcid-primary-color%22:%91%22body_link_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}&#8221;]<\/p>\n<p>Address human-related vulnerabilities through targeted training and awareness programs, reducing the risk of human error in your security framework.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_text=&#8221;Learn More&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Our Core Cybersecurity Solutions&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;c33f07d9-41e0-421a-8799-5799df695cce&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/images.unsplash.com\/photo-1559523182-a284c3fb7cff?ixid=M3w1ODkyNzF8MHwxfHNlYXJjaHw1fHxidXNpbmVzcyUyMHRlY2hub2xvZ3klMjB3b3Jrc3BhY2V8ZW58MHwwfHx8MTc0NzMyMzcyOHww&#038;ixlib=rb-4.1.0&#038;fm=webp&#038;fit=crop&#038;crop=entropy&#038;w=800&#038;h=600&#038;q=20&#038;dpr=2&#8243; title_text=&#8221;800&#215;600&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;6ed8fd5c-62c5-4100-98c3-7b8b6d2c2ee6&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_heading title=&#8221;Compliance Solutions&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;a3805066-8711-43c7-9f62-5782da0e9f7a&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22%93}&#8221;]<\/p>\n<p>Ensure your organization meets industry standards with our comprehensive compliance services, including policy creation, audits, and penetration testing.<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;Learn More&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206&#8243; button_bg_color=&#8221;gcid-secondary-color&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-secondary-color%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/images.unsplash.com\/photo-1434626881859-194d67b2b86f?ixid=M3w1ODkyNzF8MHwxfHNlYXJjaHw1fHxkYXRhJTIwYW5hbHlzaXMlMjBkYXNoYm9hcmR8ZW58MHwwfHx8MTc0NzMyMzcyN3ww&#038;ixlib=rb-4.1.0&#038;fm=webp&#038;fit=crop&#038;crop=entropy&#038;w=800&#038;h=600&#038;q=20&#038;dpr=2&#8243; title_text=&#8221;800&#215;600&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;6ed8fd5c-62c5-4100-98c3-7b8b6d2c2ee6&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_heading title=&#8221;Automation &#038; AI&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;a3805066-8711-43c7-9f62-5782da0e9f7a&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22%93}&#8221;]<\/p>\n<p>Enhance your security posture with cutting-edge automation and AI technologies that streamline processes and bolster defenses.<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;Discover How&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206&#8243; button_bg_color=&#8221;gcid-secondary-color&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-secondary-color%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/images.unsplash.com\/photo-1532264251691-2ad92a2ec88f?ixid=M3w1ODkyNzF8MHwxfHNlYXJjaHw1fHxuZXR3b3JrJTIwc2VjdXJpdHklMjBzZXR1cHxlbnwwfDB8fHwxNzQ3MzIzNzI3fDA&#038;ixlib=rb-4.1.0&#038;fm=webp&#038;fit=crop&#038;crop=entropy&#038;w=800&#038;h=600&#038;q=20&#038;dpr=2&#8243; title_text=&#8221;800&#215;600&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;6ed8fd5c-62c5-4100-98c3-7b8b6d2c2ee6&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_heading title=&#8221;Risk Management&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;a3805066-8711-43c7-9f62-5782da0e9f7a&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22%93}&#8221;]<\/p>\n<p>Identify and mitigate potential threats with our robust risk management tools, designed to protect your assets and data.<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;Explore Solutions&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206&#8243; button_bg_color=&#8221;gcid-secondary-color&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-secondary-color%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/images.unsplash.com\/photo-1496368077930-c1e31b4e5b44?ixid=M3w1ODkyNzF8MHwxfHNlYXJjaHwxfHxhdXRvbWF0ZWQlMjBzZWN1cml0eSUyMHNvbHV0aW9uc3xlbnwwfDB8fHwxNzQ3MzIzNzI3fDA&#038;ixlib=rb-4.1.0&#038;fm=webp&#038;fit=crop&#038;crop=entropy&#038;w=800&#038;h=600&#038;q=20&#038;dpr=2&#8243; title_text=&#8221;800&#215;600&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;6ed8fd5c-62c5-4100-98c3-7b8b6d2c2ee6&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_heading title=&#8221;Management &#038; Observability&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;a3805066-8711-43c7-9f62-5782da0e9f7a&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22%93}&#8221;]<\/p>\n<p>Gain complete visibility into your security landscape with our management and observability solutions, ensuring proactive threat detection.<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;Get Started&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206&#8243; button_bg_color=&#8221;gcid-secondary-color&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-secondary-color%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Testimonials&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;What Our Clients Say&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;c33f07d9-41e0-421a-8799-5799df695cce&#8221; title_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#xf10d;||fa||900&#8243; icon_color=&#8221;gcid-secondary-color&#8221; align=&#8221;center&#8221; module_class=&#8221;ai_ignore_font_icon&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;c2c23269-d09e-4bca-9247-65cd5ecf15a9&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-secondary-color%22:%91%22icon_color%22%93}&#8221;][\/et_pb_icon][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]&#8221;Cybercarm&#8217;s compliance services have transformed our security protocols, ensuring we meet all necessary standards effortlessly.&#8221;[\/et_pb_text][et_pb_heading title=&#8221;Alex Johnson, CTO of TechCorp&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;a3805066-8711-43c7-9f62-5782da0e9f7a&#8221; title_text_align=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#xf10d;||fa||900&#8243; icon_color=&#8221;gcid-secondary-color&#8221; align=&#8221;center&#8221; module_class=&#8221;ai_ignore_font_icon&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;c2c23269-d09e-4bca-9247-65cd5ecf15a9&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-secondary-color%22:%91%22icon_color%22%93,%22gcid-f2943306-fa6c-45f0-b632-5fc00151366a%22:%91%22icon_color%22%93}&#8221;][\/et_pb_icon][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]&#8221;The automation solutions provided by Cybercarm have significantly reduced our response times and improved our overall security posture.&#8221;[\/et_pb_text][et_pb_heading title=&#8221;Emily Tran, Security Manager at FinSecure&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;a3805066-8711-43c7-9f62-5782da0e9f7a&#8221; title_text_align=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#xf10d;||fa||900&#8243; icon_color=&#8221;gcid-secondary-color&#8221; align=&#8221;center&#8221; module_class=&#8221;ai_ignore_font_icon&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;c2c23269-d09e-4bca-9247-65cd5ecf15a9&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-secondary-color%22:%91%22icon_color%22%93,%22gcid-f2943306-fa6c-45f0-b632-5fc00151366a%22:%91%22icon_color%22%93}&#8221;][\/et_pb_icon][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]&#8221;With Cybercarm&#8217;s risk management tools, we have a clear view of potential threats and can address them proactively.&#8221;[\/et_pb_text][et_pb_heading title=&#8221;Michael Lee, IT Director at HealthNet&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;a3805066-8711-43c7-9f62-5782da0e9f7a&#8221; title_text_align=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Testimonials&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;What Our Clients Say&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;c33f07d9-41e0-421a-8799-5799df695cce&#8221; title_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#xf10d;||fa||900&#8243; icon_color=&#8221;gcid-secondary-color&#8221; align=&#8221;center&#8221; module_class=&#8221;ai_ignore_font_icon&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;c2c23269-d09e-4bca-9247-65cd5ecf15a9&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-secondary-color%22:%91%22icon_color%22%93}&#8221;][\/et_pb_icon][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]&#8221;Cybercarm&#8217;s compliance services have transformed our security protocols, ensuring we meet all necessary standards effortlessly.&#8221;[\/et_pb_text][et_pb_heading title=&#8221;Alex Johnson, CTO of TechCorp&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;a3805066-8711-43c7-9f62-5782da0e9f7a&#8221; title_text_align=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#xf10d;||fa||900&#8243; icon_color=&#8221;gcid-secondary-color&#8221; align=&#8221;center&#8221; module_class=&#8221;ai_ignore_font_icon&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;c2c23269-d09e-4bca-9247-65cd5ecf15a9&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-secondary-color%22:%91%22icon_color%22%93,%22gcid-f2943306-fa6c-45f0-b632-5fc00151366a%22:%91%22icon_color%22%93}&#8221;][\/et_pb_icon][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]&#8221;The automation solutions provided by Cybercarm have significantly reduced our response times and improved our overall security posture.&#8221;[\/et_pb_text][et_pb_heading title=&#8221;Emily Tran, Security Manager at FinSecure&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;a3805066-8711-43c7-9f62-5782da0e9f7a&#8221; title_text_align=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#xf10d;||fa||900&#8243; icon_color=&#8221;gcid-secondary-color&#8221; align=&#8221;center&#8221; module_class=&#8221;ai_ignore_font_icon&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;c2c23269-d09e-4bca-9247-65cd5ecf15a9&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-secondary-color%22:%91%22icon_color%22%93,%22gcid-f2943306-fa6c-45f0-b632-5fc00151366a%22:%91%22icon_color%22%93}&#8221;][\/et_pb_icon][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]&#8221;With Cybercarm&#8217;s risk management tools, we have a clear view of potential threats and can address them proactively.&#8221;[\/et_pb_text][et_pb_heading title=&#8221;Michael Lee, IT Director at HealthNet&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;a3805066-8711-43c7-9f62-5782da0e9f7a&#8221; title_text_align=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Blog&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22colorEnd%22,%22colorEnd%22%93}&#8221;][et_pb_row custom_padding_last_edited=&#8221;off|phone&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;90deg&#8221; background_color_gradient_stops=&#8221;#ffffff 50%|gcid-primary-color 50%&#8221; background_color_gradient_start=&#8221;#ffffff&#8221; background_color_gradient_start_position=&#8221;50%&#8221; background_color_gradient_end=&#8221;gcid-36fd78a7-34bc-404d-873c-dafa34efaae5&#8243; background_color_gradient_end_position=&#8221;50%&#8221; custom_margin=&#8221;||30px||false|false&#8221; custom_padding=&#8221;||40px||false|false&#8221; custom_padding_tablet=&#8221;||||false|false&#8221; custom_padding_phone=&#8221;||||false|false&#8221; box_shadow_style=&#8221;preset4&#8243; box_shadow_horizontal=&#8221;30vw&#8221; box_shadow_vertical=&#8221;0px&#8221; box_shadow_color=&#8221;gcid-primary-color&#8221; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22icon_color%22,%22icon_color%22,%22icon_color%22,%22colorEnd%22%93,%22gcid-7cadd8b3-5228-48e4-90c4-212d09232f7b%22:%91%22header_text_color%22%93,%22gcid-9a15b43a-75da-4015-a522-d0ef1179ded7%22:%91%22body_text_color%22%93,%22gcid-primary-color%22:%91%22background_color_gradient_stops%22,%22box_shadow_color%22%93}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Latest Insights in Cybersecurity&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;c33f07d9-41e0-421a-8799-5799df695cce&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_post_slider posts_number=&#8221;3&#8243; bg_overlay_color=&#8221;#000000&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;ff5b0c90-99d5-45b1-b0c2-5b4e7eeac0dd&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_post_slider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blog posts_number=&#8221;1&#8243; show_pagination=&#8221;off&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;0348c28c-34b9-43d0-8c6e-c8db6c12d77f&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; custom_padding_phone=&#8221;||||false|false&#8221; custom_padding_last_edited=&#8221;off|tablet&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog posts_number=&#8221;2&#8243; show_thumbnail=&#8221;off&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;6a574beb-bb51-48e2-9511-1e113c517294&#8243; pagination_font_size_tablet=&#8221;&#8221; pagination_font_size_phone=&#8221;&#8221; pagination_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Call to Action&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;333b8a65-5730-490d-b80e-51611171c668&#8243; border_radii=&#8221;on|6px|6px|6px|6px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Secure Your Future with Cybercarm&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;c33f07d9-41e0-421a-8799-5799df695cce&#8221; title_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;0504de1e-f5ff-4281-ba60-cbbe4edf98bc&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22link_text_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22link_text_color%22%93}&#8221;]<\/p>\n<p>Contact us today to schedule a consultation and discover how Cybercarm can fortify your organization&#8217;s cybersecurity. Our experts are ready to provide tailored solutions that align with your unique needs and ensure your digital assets are protected.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_button button_text=&#8221;Get in Touch&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;ab15fb74-61a3-43aa-96b3-41e09aeef654&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercarm is dedicated to fortifying the digital landscapes of organizations worldwide. Our mission is to provide robust cybersecurity solutions that help businesses maintain their security posture amidst evolving threats. With a focus on Compliance, Automation, Risk Management, and Observability, we strive to offer comprehensive services that ensure your data remains protected. Our commitment to innovation [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-67","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/oxfordroadwarriors.co.uk\/index.php?rest_route=\/wp\/v2\/pages\/67","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/oxfordroadwarriors.co.uk\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/oxfordroadwarriors.co.uk\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/oxfordroadwarriors.co.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/oxfordroadwarriors.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=67"}],"version-history":[{"count":2,"href":"https:\/\/oxfordroadwarriors.co.uk\/index.php?rest_route=\/wp\/v2\/pages\/67\/revisions"}],"predecessor-version":[{"id":108,"href":"https:\/\/oxfordroadwarriors.co.uk\/index.php?rest_route=\/wp\/v2\/pages\/67\/revisions\/108"}],"wp:attachment":[{"href":"https:\/\/oxfordroadwarriors.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=67"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}