{"id":37,"date":"2020-12-29T15:54:45","date_gmt":"2020-12-29T14:54:45","guid":{"rendered":"https:\/\/www.payinbits.com\/home\/?page_id=37"},"modified":"2024-05-07T13:58:50","modified_gmt":"2024-05-07T12:58:50","slug":"information-security","status":"publish","type":"page","link":"https:\/\/www.payinbits.com\/home\/solutions\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"37\" class=\"elementor elementor-37\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-47dc56f elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"47dc56f\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f22caf5\" data-id=\"f22caf5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c2989d elementor-widget elementor-widget-heading\" data-id=\"5c2989d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Information Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48e867a elementor-widget-divider--view-line_icon elementor-view-default elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"48e867a\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-shield-alt\"><\/i><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b5b2c8 elementor-widget elementor-widget-text-editor\" data-id=\"8b5b2c8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Protect your business.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1c96d2a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1c96d2a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fcca754\" data-id=\"fcca754\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-176ad1b elementor-widget elementor-widget-spacer\" data-id=\"176ad1b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bcfce7 elementor-widget elementor-widget-text-editor\" data-id=\"3bcfce7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Your business requires optimised solutions specifically designed and properly executed <br>to protect your business data and information. <br><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acc9ba4 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"acc9ba4\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-float\" href=\"https:\/\/www.payinbits.com\/home\/contact\/request-service-information-security\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-mouse-pointer\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Know More ...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db69329 elementor-widget elementor-widget-spacer\" data-id=\"db69329\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-31e98bf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"31e98bf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-8e65027\" data-id=\"8e65027\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aea12d7 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"aea12d7\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-asterisk\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tRisk and Compliance\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWorking with our clients, we provide solutions to manage enterprise risk, maximise security compliance while minimizing risk, automating compliance and optimizing security.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-2483ffe\" data-id=\"2483ffe\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b5dd299 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"b5dd299\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-desktop\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tEndpoint Security\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tYour business can benefit from solutions providing you protection. Given the scale of attacks and the magnitude of information to protect, it is increasingly imperative to protect systems from every point possible.\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-58847eb\" data-id=\"58847eb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fcadd28 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"fcadd28\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-shield\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPrivileged Access Management\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tCompromised privileged credentials almost certainly leads to data breaches. It is increasingly imperative to get solutions to monitor and protect privileged accounts across your business. We can help with that.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7d994fb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7d994fb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-266e02f\" data-id=\"266e02f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c9450a3 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"c9450a3\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-network-wired\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tNetwork Security\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tNetwork Security solutions provide protection covering intrusion prevention, advanced behaviour analytics with state-of-the-art threat detection engines specially created to protect your organisation\u2019s network.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-377e561\" data-id=\"377e561\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5392acf elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"5392acf\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-cloud\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCloud Security\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tYour business requires optimised solutions specifically designed and properly executed to protect your business data and information. Work with us to protect your business.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-750c5c4\" data-id=\"750c5c4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ab309a3 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"ab309a3\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-brain\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tThreat Intelligence\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tManage security threats, detect and proactively prevent cyber security threats by leveraging on global threat intelligence solutions integrated into SOAR and SIEM products.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-02a2afa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"02a2afa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-089586c\" data-id=\"089586c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4545e70 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"4545e70\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-file-archive\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tData Protection\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWorking with the best cyber security companies in the industry, get efficient solutions that prevent and detect data loss, manage your data effectively and securely. Coverage also includes mobile phones, tablets, laptops and portable disks.\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-927a8b7\" data-id=\"927a8b7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c32f1c9 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"c32f1c9\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-lock\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCloud Access Security Broker\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAs services are migrated to the cloud, it is crucial to have visibility and control. Cloud Access Security Broker (CASB) solutions safeguards your business from attacks and meet compliance requirements.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f2a8149\" data-id=\"f2a8149\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fef3b55 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"fef3b55\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-database\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tDatabase Security\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tSave time and money by getting real-time protection for your business critical databases. Automate database discovery, build your own security policies and prioritise and resolve identified security gaps.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ffebd1a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ffebd1a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-0324649\" data-id=\"0324649\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d4baa74 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"d4baa74\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-mail-bulk\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tEmail Security\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tGet the protection you need from malware and phishing attacks via email. Screen emails before it gets to employees. Stop spam emails from getting through, increase productivity by proactive email security.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5a4d9b9\" data-id=\"5a4d9b9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a50133 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"2a50133\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-crosshairs\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tZero Trust Network Access\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tProtect your most valuable business assets by implementing Zero Trust solutions and services for all users, all connected devices across all connections continuously for Cloud Access, Privacy, Insider Threats, Remote Workforce and other critical areas.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7b3fd31\" data-id=\"7b3fd31\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c7ef6f9 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"c7ef6f9\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-laptop-house\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tApplication and Change Control\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tTrack and prevent track unwanted changes across all your business servers, endpoints and secure Fixed-function and Legacy systems by deploying Application Control solutions to protect against zero-day and advanced persistent threats. \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e4bbe6f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e4bbe6f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7874467\" data-id=\"7874467\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e466654 elementor-widget elementor-widget-spacer\" data-id=\"e466654\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6a2d8a elementor-invisible elementor-widget elementor-widget-image-carousel\" data-id=\"a6a2d8a\" data-element_type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;5&quot;,&quot;navigation&quot;:&quot;none&quot;,&quot;pause_on_hover&quot;:&quot;no&quot;,&quot;pause_on_interaction&quot;:&quot;no&quot;,&quot;autoplay_speed&quot;:10000,&quot;speed&quot;:5000,&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 6\"><a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"a6a2d8a\" data-elementor-lightbox-title=\"IBM\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6NTgwLCJ1cmwiOiJodHRwczpcL1wvd3d3LnBheWluYml0cy5jb21cL2hvbWVcL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjFcLzA4XC9JQk0ucG5nIiwic2xpZGVzaG93IjoiYTZhMmQ4YSJ9\" href=\"https:\/\/www.payinbits.com\/home\/partners\/\" target=\"_blank\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.payinbits.com\/home\/wp-content\/uploads\/elementor\/thumbs\/IBM-pc8gb10xj7qfi4ksvisnbs59oc23nlwa8ydg69626c.png\" alt=\"IBM\" \/><\/figure><\/a><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 6\"><a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"a6a2d8a\" data-elementor-lightbox-title=\"TrendMicro\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6NTgyLCJ1cmwiOiJodHRwczpcL1wvd3d3LnBheWluYml0cy5jb21cL2hvbWVcL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjFcLzA4XC9UcmVuZE1pY3JvLnBuZyIsInNsaWRlc2hvdyI6ImE2YTJkOGEifQ%3D%3D\" href=\"https:\/\/www.payinbits.com\/home\/partners\/\" target=\"_blank\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.payinbits.com\/home\/wp-content\/uploads\/elementor\/thumbs\/TrendMicro-pc8gb7lsv1zfreb8t3n1b8hhu15o5hmeluxuj6ways.png\" alt=\"TrendMicro\" \/><\/figure><\/a><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 6\"><a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"a6a2d8a\" data-elementor-lightbox-title=\"RSA\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6NTg5LCJ1cmwiOiJodHRwczpcL1wvd3d3LnBheWluYml0cy5jb21cL2hvbWVcL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjFcLzA4XC9SU0EucG5nIiwic2xpZGVzaG93IjoiYTZhMmQ4YSJ9\" href=\"https:\/\/www.payinbits.com\/home\/partners\/\" target=\"_blank\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.payinbits.com\/home\/wp-content\/uploads\/elementor\/thumbs\/RSA-pc8gbrceukqgj7iklu679li6b4gdn4srokn1m031c4.png\" alt=\"RSA\" \/><\/figure><\/a><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 6\"><a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"a6a2d8a\" data-elementor-lightbox-title=\"McAfee\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6NTg4LCJ1cmwiOiJodHRwczpcL1wvd3d3LnBheWluYml0cy5jb21cL2hvbWVcL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjFcLzA4XC9NY0FmZWUucG5nIiwic2xpZGVzaG93IjoiYTZhMmQ4YSJ9\" href=\"https:\/\/www.payinbits.com\/home\/partners\/\" target=\"_blank\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.payinbits.com\/home\/wp-content\/uploads\/elementor\/thumbs\/McAfee-pc8gbpgqgwnvvzlawtcy4lz94cpn7qlb0bc2ng5tok.png\" alt=\"McAfee\" \/><\/figure><\/a><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 6\"><a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"a6a2d8a\" data-elementor-lightbox-title=\"Fortinet\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6NTc5LCJ1cmwiOiJodHRwczpcL1wvd3d3LnBheWluYml0cy5jb21cL2hvbWVcL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjFcLzA4XC9Gb3J0aW5ldC5wbmciLCJzbGlkZXNob3ciOiJhNmEyZDhhIn0%3D\" href=\"https:\/\/www.payinbits.com\/home\/partners\/\" target=\"_blank\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.payinbits.com\/home\/wp-content\/uploads\/elementor\/thumbs\/Fortinet-pc8gay7eypmkjaowbzkrmauvw6g00il38kezqfa8p0.png\" alt=\"Fortinet\" \/><\/figure><\/a><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 6\"><a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"a6a2d8a\" data-elementor-lightbox-title=\"ExtremeNetworks\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6NTc1LCJ1cmwiOiJodHRwczpcL1wvd3d3LnBheWluYml0cy5jb21cL2hvbWVcL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjFcLzA4XC9FeHRyZW1lTmV0d29ya3MucG5nIiwic2xpZGVzaG93IjoiYTZhMmQ4YSJ9\" href=\"https:\/\/www.payinbits.com\/home\/partners\/\" target=\"_blank\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.payinbits.com\/home\/wp-content\/uploads\/elementor\/thumbs\/ExtremeNetworks-pc8gaj5zxd1zdjaqrt2qienie0i4lcxduhz81zwjgk.png\" alt=\"ExtremeNetworks\" \/><\/figure><\/a><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2924ec elementor-widget elementor-widget-text-editor\" data-id=\"d2924ec\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span>We have partnered with the best breed security companies to offer you the best security possible and we are constantly listening to our clients to improve on services, response and offered solutions so we can aptly meet your needs in the very best way possible.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33ba5e6 elementor-widget elementor-widget-spacer\" data-id=\"33ba5e6\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c36e3e elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6c36e3e\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-float\" href=\"https:\/\/www.payinbits.com\/home\/contact\/request-service-information-security\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-mouse-pointer\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Know More ...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eedd5ae elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-heading\" data-id=\"eedd5ae\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Security Solutions from IBM - site integration<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Information Security Protect your business. Your business requires optimised solutions specifically designed and properly executed to protect your business data and information. Know More &#8230; Risk and Compliance Working with our clients, we provide solutions to manage enterprise risk, maximise security compliance while minimizing risk, automating compliance and optimizing security. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":18,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-pagebuilder-full-width.php","meta":{"footnotes":""},"class_list":["post-37","page","type-page","status-publish","hentry"],"jetpack-related-posts":[{"id":19,"url":"https:\/\/www.payinbits.com\/home\/partners\/","url_meta":{"origin":37,"position":0},"title":"Partners","author":"PayInBits Convenience (PiBC)","date":"December 29, 2020","format":false,"excerpt":"Partners Leverage technology to your advantage. We currently have strategic partnerships with major Information Technology companies\u00a0to provide services across a broad spectrum of solutions. Featured Partner Click for More Details Leverage on Information Security, Productivity, Networking and Remote Connectivity solutions\u00a0 that are adapted to meet your specific requirements. Leading provider\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"Partners","src":"https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/12\/Partners-Header.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/12\/Partners-Header.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/12\/Partners-Header.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/12\/Partners-Header.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/12\/Partners-Header.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/12\/Partners-Header.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":134,"url":"https:\/\/www.payinbits.com\/home\/services\/forensic-audits\/","url_meta":{"origin":37,"position":1},"title":"Forensic Audits","author":"PayInBits Convenience (PiBC)","date":"December 31, 2020","format":false,"excerpt":"Forensic Audits Get to the root of IT issues. Our detailed approach to resolving issues ensures you get the very best at all times to identify and prevent system breaches from internal or external factors. Trace and explore past events to unravel the cause of a breach Request Service There\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Forensic-Audits-Header.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Forensic-Audits-Header.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Forensic-Audits-Header.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Forensic-Audits-Header.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Forensic-Audits-Header.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Forensic-Audits-Header.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":21,"url":"https:\/\/www.payinbits.com\/home\/contact\/","url_meta":{"origin":37,"position":2},"title":"Contact","author":"PayInBits Convenience (PiBC)","date":"December 29, 2020","format":false,"excerpt":"Contact Us Let's get YOU what you want! Reach Us \"Coming together is a beginning;\u00a0keeping together is progress;\u00a0working together is success.\"\u00a0-\u00a0Edward Everest Hale","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2022\/01\/Contact-Header-New.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2022\/01\/Contact-Header-New.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2022\/01\/Contact-Header-New.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2022\/01\/Contact-Header-New.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2022\/01\/Contact-Header-New.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2022\/01\/Contact-Header-New.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":130,"url":"https:\/\/www.payinbits.com\/home\/services\/project-management\/","url_meta":{"origin":37,"position":3},"title":"Project Management","author":"PayInBits Convenience (PiBC)","date":"December 31, 2020","format":false,"excerpt":"Project Management Achieve your business objectives. Achieve your business objectives and goals within budget and allocated timeframe.\u00a0With broad interactions across key verticals, we successfully deliver on all enterprise IT projects. Our Commitment to You Professional DeliveryTimely DeliveryCommunicationCollaborationCommitment to ExcellenceConfidentiality Request PM Services","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Project-Management-Header.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Project-Management-Header.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Project-Management-Header.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Project-Management-Header.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Project-Management-Header.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Project-Management-Header.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":133,"url":"https:\/\/www.payinbits.com\/home\/services\/training\/","url_meta":{"origin":37,"position":4},"title":"Training","author":"PayInBits Convenience (PiBC)","date":"December 31, 2020","format":false,"excerpt":"Training Improve your business. Training is considered a vital component in the development of employees within a company, and the difference between an organisation\u2019s success and failure in delivering products and services to its clients. We offer a broad range of training options that are suited for your organisation\u2019s needs\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":128,"url":"https:\/\/www.payinbits.com\/home\/services\/managed-services\/","url_meta":{"origin":37,"position":5},"title":"Managed Services","author":"PayInBits Convenience (PiBC)","date":"December 31, 2020","format":false,"excerpt":"Managed Services Optimize your business, increase productivity. Working together, we can achieve more with the right solutions! Request Details Managed Services Benefits Optimize your core business and identify areas of your business that can be outsourced enabling\u00a0you reduce operational costs while increasing productivity. Leverage on Expertise Resolve issues faster Lower\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Managed-Services-Header.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Managed-Services-Header.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Managed-Services-Header.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Managed-Services-Header.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Managed-Services-Header.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/www.payinbits.com\/home\/wp-content\/uploads\/2021\/11\/Managed-Services-Header.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.payinbits.com\/home\/wp-json\/wp\/v2\/pages\/37","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.payinbits.com\/home\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.payinbits.com\/home\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.payinbits.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.payinbits.com\/home\/wp-json\/wp\/v2\/comments?post=37"}],"version-history":[{"count":170,"href":"https:\/\/www.payinbits.com\/home\/wp-json\/wp\/v2\/pages\/37\/revisions"}],"predecessor-version":[{"id":3962,"href":"https:\/\/www.payinbits.com\/home\/wp-json\/wp\/v2\/pages\/37\/revisions\/3962"}],"up":[{"embeddable":true,"href":"https:\/\/www.payinbits.com\/home\/wp-json\/wp\/v2\/pages\/18"}],"wp:attachment":[{"href":"https:\/\/www.payinbits.com\/home\/wp-json\/wp\/v2\/media?parent=37"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}