{"id":5983,"date":"2025-11-29T05:53:35","date_gmt":"2025-11-29T05:53:35","guid":{"rendered":"http:\/\/localhost\/nextlogix\/?page_id=5983"},"modified":"2026-01-02T18:51:48","modified_gmt":"2026-01-02T18:51:48","slug":"cyber-security-solutions","status":"publish","type":"page","link":"https:\/\/nextlogix-tech.com\/index.php\/cyber-security-solutions\/","title":{"rendered":"Cyber Security Solutions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5983\" class=\"elementor elementor-5983\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ad13daf e-flex e-con-boxed e-con e-parent\" data-id=\"ad13daf\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-540c742 e-con-full e-flex e-con e-child\" data-id=\"540c742\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-94fb28d elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"94fb28d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">World-Class Cybersecurity Defense for Every Business<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d063b82 e-con-full e-flex e-con e-child\" data-id=\"d063b82\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd2f5b3 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"dd2f5b3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">In today\u2019s rapidly evolving digital landscape, where security threats are becoming increasingly sophisticated, our cybersecurity services deliver a strong and comprehensive defense for your business. Our expert engineers leverage advanced threat detection, prevention, and response technologies to design resilient security frameworks that safeguard your organization across every layer. With deep expertise in network, cloud, and endpoint security, we provide scalable and adaptive protection that evolves alongside your business needs.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e41030 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"8e41030\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/nextlogix-tech.com\/index.php\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"bi bi-box-arrow-in-up-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact for Cyber Security Services<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1225368 e-con-full e-flex e-con e-child\" data-id=\"1225368\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b97c104 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"b97c104\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"553\" src=\"https:\/\/nextlogix-tech.com\/wp-content\/uploads\/2025\/12\/cyber-security.webp\" class=\"attachment-medium_large size-medium_large wp-image-7137\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-267f836 e-flex e-con-boxed e-con e-parent\" data-id=\"267f836\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f83c490 elementor-widget elementor-widget-spacer\" data-id=\"f83c490\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d25a6fc e-flex e-con-boxed e-con e-parent\" data-id=\"d25a6fc\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-234c787 e-con-full e-flex e-con e-child\" data-id=\"234c787\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-687ac93 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"687ac93\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">End-to-End Cybersecurity Defense<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-24549ad e-con-full e-flex e-con e-child\" data-id=\"24549ad\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-507d323 elementor-widget elementor-widget-heading\" data-id=\"507d323\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><p data-start=\"57\" data-end=\"271\">Nextlogix delivers comprehensive end-to-end cybersecurity defense designed to protect your business across every digital layer. Our approach covers the full security lifecycle from risk assessment and architecture design to continuous monitoring, threat detection, incident response, and compliance management. By integrating advanced security technologies with proven industry best practices, we safeguard your networks, cloud environments, endpoints, applications, and data against evolving cyber threats.\n<br><br>\nOur experienced security professionals proactively identify vulnerabilities, respond rapidly to incidents, and ensure your systems remain resilient, compliant, and secure allowing you to operate with confidence in an increasingly complex threat landscape.<\/p><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a3f44d e-flex e-con-boxed e-con e-parent\" data-id=\"1a3f44d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c785f34 elementor-widget elementor-widget-spacer\" data-id=\"c785f34\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-77214e1 e-flex e-con-boxed e-con e-parent\" data-id=\"77214e1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dea8fd elementor-widget elementor-widget-heading\" data-id=\"0dea8fd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Defense Services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33590b0 e-flex e-con-boxed e-con e-parent\" data-id=\"33590b0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8734e45 elementor-widget elementor-widget-spacer\" data-id=\"8734e45\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0059b4f e-flex e-con-boxed e-con e-parent\" data-id=\"0059b4f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d82b284 elementor-widget elementor-widget-tronix_services_four\" data-id=\"d82b284\" data-element_type=\"widget\" data-widget_type=\"tronix_services_four.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"service-four-section-wrapper\">\n            <div class=\"container\">\n                <div class=\"row\">\n                                            <div class=\"col-xl-4 col-lg-6 col-md-6 \">\n                            <div class=\"service-box-four \">\n                                <div class=\"service-four-number\"><\/div>\n                                <span><\/span>\n                                <div class=\"service-four-content\">\n                                    <h5 class=\"service-four-title\"> \n                                                                                    Vulnerability Assessment &amp; Penetration Testing (VAPT)                                                                            <\/h5>\n                                    <div class=\"services-four-des\">\n                                        Identify system vulnerabilities and perform controlled penetration testing to evaluate and strengthen system resilience against cyber threats.                                    <\/div>\n                                    <div class=\"service-four-icon \">\n                                                                            <\/div>    \n                                <\/div>\n                                \n                            <\/div>                     \n                        <\/div>\n                                                <div class=\"col-xl-4 col-lg-6 col-md-6 \">\n                            <div class=\"service-box-four \">\n                                <div class=\"service-four-number\"><\/div>\n                                <span><\/span>\n                                <div class=\"service-four-content\">\n                                    <h5 class=\"service-four-title\"> \n                                                                                    Threat Intelligence &amp; Monitoring                                                                            <\/h5>\n                                    <div class=\"services-four-des\">\n                                        Real-time monitoring and advanced analytics to proactively identify, evaluate, and respond to potential cyber threats.                                    <\/div>\n                                    <div class=\"service-four-icon \">\n                                                                            <\/div>    \n                                <\/div>\n                                \n                            <\/div>                     \n                        <\/div>\n                                                <div class=\"col-xl-4 col-lg-6 col-md-6 \">\n                            <div class=\"service-box-four \">\n                                <div class=\"service-four-number\"><\/div>\n                                <span><\/span>\n                                <div class=\"service-four-content\">\n                                    <h5 class=\"service-four-title\"> \n                                                                                    Network Security &amp; Firewalls                                                                            <\/h5>\n                                    <div class=\"services-four-des\">\n                                        Deploy robust network security solutions, including next-generation firewalls, to secure data traffic and prevent unauthorized access.                                    <\/div>\n                                    <div class=\"service-four-icon \">\n                                                                            <\/div>    \n                                <\/div>\n                                \n                            <\/div>                     \n                        <\/div>\n                                                <div class=\"col-xl-4 col-lg-6 col-md-6 \">\n                            <div class=\"service-box-four \">\n                                <div class=\"service-four-number\"><\/div>\n                                <span><\/span>\n                                <div class=\"service-four-content\">\n                                    <h5 class=\"service-four-title\"> \n                                                                                    Identity &amp; Access Management (IAM)                                                                            <\/h5>\n                                    <div class=\"services-four-des\">\n                                        Implement strong authentication and authorization controls, ensuring user access is restricted according to defined roles and permissions.                                    <\/div>\n                                    <div class=\"service-four-icon \">\n                                                                            <\/div>    \n                                <\/div>\n                                \n                            <\/div>                     \n                        <\/div>\n                                                <div class=\"col-xl-4 col-lg-6 col-md-6 \">\n                            <div class=\"service-box-four \">\n                                <div class=\"service-four-number\"><\/div>\n                                <span><\/span>\n                                <div class=\"service-four-content\">\n                                    <h5 class=\"service-four-title\"> \n                                                                                    Incident Response &amp; Recovery                                                                            <\/h5>\n                                    <div class=\"services-four-des\">\n                                        Deliver swift incident response services, including containment, threat elimination, and system recovery, to reduce impact and downtime.                                    <\/div>\n                                    <div class=\"service-four-icon \">\n                                                                            <\/div>    \n                                <\/div>\n                                \n                            <\/div>                     \n                        <\/div>\n                                                <div class=\"col-xl-4 col-lg-6 col-md-6 \">\n                            <div class=\"service-box-four \">\n                                <div class=\"service-four-number\"><\/div>\n                                <span><\/span>\n                                <div class=\"service-four-content\">\n                                    <h5 class=\"service-four-title\"> \n                                                                                    Endpoint Protection                                                                            <\/h5>\n                                    <div class=\"services-four-des\">\n                                        Protect endpoint devices through advanced antivirus solutions, data encryption, and strict access controls to maintain device security and data integrity.                                    <\/div>\n                                    <div class=\"service-four-icon \">\n                                                                            <\/div>    \n                                <\/div>\n                                \n                            <\/div>                     \n                        <\/div>\n                                                <div class=\"col-xl-4 col-lg-6 col-md-6 \">\n                            <div class=\"service-box-four \">\n                                <div class=\"service-four-number\"><\/div>\n                                <span><\/span>\n                                <div class=\"service-four-content\">\n                                    <h5 class=\"service-four-title\"> \n                                                                                    Data Encryption &amp; Privacy                                                                            <\/h5>\n                                    <div class=\"services-four-des\">\n                                        Safeguard sensitive information using advanced encryption technologies and robust privacy controls to maintain data security and ensure regulatory compliance.                                    <\/div>\n                                    <div class=\"service-four-icon \">\n                                                                            <\/div>    \n                                <\/div>\n                                \n                            <\/div>                     \n                        <\/div>\n                                                <div class=\"col-xl-4 col-lg-6 col-md-6 \">\n                            <div class=\"service-box-four \">\n                                <div class=\"service-four-number\"><\/div>\n                                <span><\/span>\n                                <div class=\"service-four-content\">\n                                    <h5 class=\"service-four-title\"> \n                                                                                    Cloud Security                                                                            <\/h5>\n                                    <div class=\"services-four-des\">\n                                        Secure cloud environments through strong encryption, controlled access management, and continuous monitoring, ensuring protected data storage and reliable cloud operations.                                    <\/div>\n                                    <div class=\"service-four-icon \">\n                                                                            <\/div>    \n                                <\/div>\n                                \n                            <\/div>                     \n                        <\/div>\n                                                <div class=\"col-xl-4 col-lg-6 col-md-6 \">\n                            <div class=\"service-box-four \">\n                                <div class=\"service-four-number\"><\/div>\n                                <span><\/span>\n                                <div class=\"service-four-content\">\n                                    <h5 class=\"service-four-title\"> \n                                                                                    Application Security Testing                                                                            <\/h5>\n                                    <div class=\"services-four-des\">\n                                        Identify source code vulnerabilities early using advanced security tools to enforce secure coding practices. Seamlessly integrate security checks into CI\/CD pipelines for real-time threat detection and rapid mitigation.                                    <\/div>\n                                    <div class=\"service-four-icon \">\n                                                                            <\/div>    \n                                <\/div>\n                                \n                            <\/div>                     \n                        <\/div>\n                                                <div class=\"col-xl-4 col-lg-6 col-md-6 \">\n                            <div class=\"service-box-four \">\n                                <div class=\"service-four-number\"><\/div>\n                                <span><\/span>\n                                <div class=\"service-four-content\">\n                                    <h5 class=\"service-four-title\"> \n                                                                                    Security Information and Event Management (SIEM)                                                                            <\/h5>\n                                    <div class=\"services-four-des\">\n                                        Centralize security event logging and monitoring to detect, correlate, and analyze incidents in real time.                                    <\/div>\n                                    <div class=\"service-four-icon \">\n                                                                            <\/div>    \n                                <\/div>\n                                \n                            <\/div>                     \n                        <\/div>\n                                                            <!-- Style Two  -->\n                <\/div>\n            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-70b3c89 e-flex e-con-boxed e-con e-parent\" data-id=\"70b3c89\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0de8b50 e-con-full e-flex e-con e-child\" data-id=\"0de8b50\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dc046e elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"0dc046e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Get in Touch<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4079248 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4079248\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><p data-start=\"57\" data-end=\"271\">To start the conversation or obtain more information, reach out to our friendly team.\n<br><br>\nWe pride ourselves on our customer service and support, and look forward to hearing from you.<\/p><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a742d9d e-con-full e-flex e-con e-child\" data-id=\"a742d9d\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2209a78 e-con-full e-flex e-con e-child\" data-id=\"2209a78\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcb900b elementor-widget elementor-widget-tronix_ctf7\" data-id=\"dcb900b\" data-element_type=\"widget\" data-widget_type=\"tronix_ctf7.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"tronix-ctf7s-wrapper\">\n            \n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1099-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"1099\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php\/wp-json\/wp\/v2\/pages\/5983#wpcf7-f1099-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"1099\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1099-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<div class=\"wpcf7-turnstile cf-turnstile\" data-sitekey=\"0x4AAAAAACJuyj8BDvXJqd6m\" data-response-field-name=\"_wpcf7_turnstile_response\"><\/div>\n\n<div class=\"tronix-contact-from-two-wrappwr\">\n\t<div class=\"row\">\n\t\t<div class=\"col-lg-6 col-md-6 col-12\">\n\t\t\t<div class=\"tronix-input-area\">\n\t\t\t\t<span class=\"wpcf7-form-control-wrap\" data-name=\"fname\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Full Name\" value=\"\" type=\"text\" name=\"fname\" \/><\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"col-lg-6 col-md-6 col-12\">\n\t\t\t<div class=\"tronix-input-area\">\n\t\t\t \t<span class=\"wpcf7-form-control-wrap\" data-name=\"number\"><input class=\"wpcf7-form-control wpcf7-number wpcf7-validates-as-required wpcf7-validates-as-number\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone +(00)00000\" value=\"\" type=\"number\" name=\"number\" \/><\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"col-lg-6 col-md-6 col-12\">\n\t\t\t<div class=\"tronix-input-area\">\n\t\t\t\t<span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email Address\" value=\"\" type=\"email\" name=\"email\" \/><\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"col-lg-6 col-md-6 col-12\">\n\t\t\t<div class=\"tronix-input-area\">\n\t\t\t\t<span class=\"wpcf7-form-control-wrap\" data-name=\"cname\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" placeholder=\"Company Name\" value=\"\" type=\"text\" name=\"cname\" \/><\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"col-lg-6 col-md-6 col-12\">\n\t\t\t<div class=\"tronix-input-area\">\n\t\t\t\t<span class=\"wpcf7-form-control-wrap\" data-name=\"dname\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" placeholder=\"Company Domain\" value=\"\" type=\"text\" name=\"dname\" \/><\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n                <div class=\"col-lg-6 col-md-6 col-12\">\n\t\t\t <div class=\"tronix-input-area\">\n                                <span class=\"wpcf7-form-control-wrap\" data-name=\"rselect\"><select class=\"wpcf7-form-control wpcf7-select\" aria-invalid=\"false\" name=\"rselect\"><option value=\"Region\">Region<\/option><option value=\"Asia\">Asia<\/option><option value=\"Middle East &amp; Africa\">Middle East &amp; Africa<\/option><option value=\"Europe\">Europe<\/option><option value=\"USA &amp; Canada\">USA &amp; Canada<\/option><option value=\"Australia &amp; New Zealand\">Australia &amp; New Zealand<\/option><option value=\"Rest of World\">Rest of World<\/option><\/select><\/span>\n                         <\/div>\n\t\t<\/div> \n\n                <div class=\"col-lg-12 col-md-12 col-12\">\n\t\t\t <div class=\"tronix-input-area\">\n                                <span class=\"wpcf7-form-control-wrap\" data-name=\"sselect\"><select class=\"wpcf7-form-control wpcf7-select\" aria-invalid=\"false\" name=\"sselect\"><option value=\"Services you&#039;re looking for\">Services you&#039;re looking for<\/option><option value=\"SAP Business One Cloud Hosting\">SAP Business One Cloud Hosting<\/option><option value=\"SAP Service Level Agreement\">SAP Service Level Agreement<\/option><option value=\"Application Server\">Application Server<\/option><option value=\"Disaster Recovery\">Disaster Recovery<\/option><option value=\"Managed IT Services\">Managed IT Services<\/option><option value=\"Specialist Consulting\">Specialist Consulting<\/option><option value=\"Cyber Security\">Cyber Security<\/option><option value=\"Custom Software Development\">Custom Software Development<\/option><option value=\"Other IT Services\">Other IT Services<\/option><option value=\"General Enquiry\">General Enquiry<\/option><\/select><\/span>\n                         <\/div>\n\t\t<\/div>     \n       \n\n\t\t<div class=\"col-lg-12 col-md-12 col-12\">\n\t\t\t<div class=\"tronix-input-area message\">\n\t\t\t\t<p><\/p>\n\t\t\t<\/div>\n                <\/div>\n\n\n\t\t<div class=\"col-lg-12 col-md-12 col-12\">\n\t\t\t<div class=\"tronix-input-area message\">\n\t\t\t\t<span class=\"wpcf7-form-control-wrap\" data-name=\"message\"><textarea cols=\"10\" rows=\"3\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Project Details\" name=\"message\"><\/textarea><\/span>\n\t\t\t<\/div>\n                <\/div>\n\n\n                        <div class=\"tronix-contact-button button\">\n\t\t\t\t<input class=\"wpcf7-form-control wpcf7-submit has-spinner theme-btns\" type=\"submit\" value=\"Submit\" \/>\n\t\t\t<\/div>\n\t\t\n\t<\/div>\n<\/div><p style=\"display: none !important;\" class=\"akismet-fields-container\" data-prefix=\"_wpcf7_ak_\"><label>&#916;<textarea name=\"_wpcf7_ak_hp_textarea\" cols=\"45\" rows=\"8\" maxlength=\"100\"><\/textarea><\/label><input type=\"hidden\" id=\"ak_js_1\" name=\"_wpcf7_ak_js\" value=\"29\"\/><script>document.getElementById( \"ak_js_1\" ).setAttribute( \"value\", ( new Date() ).getTime() );<\/script><\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9381b8d e-flex e-con-boxed e-con e-parent\" data-id=\"9381b8d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6a7921 elementor-widget elementor-widget-spacer\" data-id=\"e6a7921\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>World-Class Cybersecurity Defense for Every Business In today\u2019s rapidly evolving digital landscape, where security threats are becoming increasingly sophisticated, our cybersecurity services deliver a strong and comprehensive defense for your business. Our expert engineers leverage advanced threat detection, prevention, and response technologies to design resilient security frameworks that safeguard your organization across every layer. With [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"blank-template.php","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-5983","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/nextlogix-tech.com\/index.php\/wp-json\/wp\/v2\/pages\/5983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nextlogix-tech.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nextlogix-tech.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nextlogix-tech.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nextlogix-tech.com\/index.php\/wp-json\/wp\/v2\/comments?post=5983"}],"version-history":[{"count":57,"href":"https:\/\/nextlogix-tech.com\/index.php\/wp-json\/wp\/v2\/pages\/5983\/revisions"}],"predecessor-version":[{"id":7664,"href":"https:\/\/nextlogix-tech.com\/index.php\/wp-json\/wp\/v2\/pages\/5983\/revisions\/7664"}],"wp:attachment":[{"href":"https:\/\/nextlogix-tech.com\/index.php\/wp-json\/wp\/v2\/media?parent=5983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}