{"id":1685,"date":"2025-03-25T19:24:06","date_gmt":"2025-03-25T16:24:06","guid":{"rendered":"https:\/\/cbernet.com\/maintenance-support-services-cbernet\/"},"modified":"2025-04-10T18:58:19","modified_gmt":"2025-04-10T15:58:19","slug":"maintenance-support-services-cbernet","status":"publish","type":"page","link":"https:\/\/cbernet.com\/en\/maintenance-support-services-cbernet\/","title":{"rendered":"Maintenance &amp; Support Services | CBERNET"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1685\" class=\"elementor elementor-1685 elementor-511\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-43edba1 e-con-full e-flex e-con e-parent\" data-id=\"43edba1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c072755 elementor-widget elementor-widget-heading\" data-id=\"c072755\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Maintenance &amp; Support Services<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f8a24eb e-con-full e-flex e-con e-parent\" data-id=\"f8a24eb\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-95e045a e-con-full e-flex e-con e-child\" data-id=\"95e045a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0909aec elementor-widget elementor-widget-text-editor\" data-id=\"0909aec\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber security is a process that is not just a matter of installing a system and leaving it alone, but a process that becomes sustainable through continuous monitoring, updating and proactive interventions. In today&#8217;s dynamic threat environment, with vulnerabilities changing every day, it is critical to keep your infrastructure up-to-date and be prepared for any attack. <\/p><p>As CBERNET, we offer comprehensive maintenance and support services to ensure that your IT and OT systems always operate at the highest level of security. We constantly monitor your systems, detect security threats in advance and develop rapid response mechanisms against potential risks. <\/p><p><strong>Continuity is Essential in Cyber Security<\/strong><\/p><p>Many organizations make the mistake of taking cybersecurity measures once and assuming that they will remain at the same level. However, as new vulnerabilities, attack methods and threats are constantly changing, these measures need to be regularly updated and managed. <\/p><p>CBERNET maintenance and support services not only keep your security systems up and running, but also ensure you are prepared for the latest threats.<\/p><p><strong>Our Maintenance &amp; Support Solutions to Strengthen Your Cybersecurity<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7aa33fc elementor-widget elementor-widget-n-accordion\" data-id=\"7aa33fc\" data-element_type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1280\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1280\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 24\/7 Proactive Security Monitoring <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"et-icon et-right-arrow\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"et-icon et-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1280\" class=\"elementor-element elementor-element-d7c7754 e-con-full e-flex e-con e-child\" data-id=\"d7c7754\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1280\" class=\"elementor-element elementor-element-2225f51 e-flex e-con-boxed e-con e-child\" data-id=\"2225f51\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b5f5b7 elementor-widget elementor-widget-text-editor\" data-id=\"4b5f5b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We offer advanced security monitoring and analysis solutions to not only detect threats, but to prevent them before they happen. By taking a proactive approach to cyber threats, we ensure that your systems are always protected. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1281\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1281\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Updating and Optimization of Security Systems <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"et-icon et-right-arrow\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"et-icon et-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1281\" class=\"elementor-element elementor-element-532aca7 e-con-full e-flex e-con e-child\" data-id=\"532aca7\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1281\" class=\"elementor-element elementor-element-6222fcf e-flex e-con-boxed e-con e-child\" data-id=\"6222fcf\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d7e987c elementor-widget elementor-widget-text-editor\" data-id=\"d7e987c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We regularly analyze outdated and ineffective security configurations and optimize them against new threats. Firewall rules, access policies, network segmentation and event management processes are constantly updated to ensure that your infrastructure always operates with the best performance. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1282\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1282\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Rapid Incident Response and Crisis Management <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"et-icon et-right-arrow\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"et-icon et-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1282\" class=\"elementor-element elementor-element-1c65e35 e-flex e-con-boxed e-con e-child\" data-id=\"1c65e35\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1282\" class=\"elementor-element elementor-element-141e41b e-con-full e-flex e-con e-child\" data-id=\"141e41b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c11c599 elementor-widget elementor-widget-text-editor\" data-id=\"c11c599\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the event of a possible security breach or cyber-attack, we ensure that damages are minimized by intervening immediately. We take measures to protect your organization&#8217;s business continuity and implement crisis management strategies. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1283\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1283\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Network and System Health Checks <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"et-icon et-right-arrow\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"et-icon et-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1283\" class=\"elementor-element elementor-element-43a0212 e-flex e-con-boxed e-con e-child\" data-id=\"43a0212\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1283\" class=\"elementor-element elementor-element-3cfb6d7 e-con-full e-flex e-con e-child\" data-id=\"3cfb6d7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a680e5b elementor-widget elementor-widget-text-editor\" data-id=\"a680e5b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Vulnerabilities often remain hidden and can pose a threat unnoticed. With regular health checks, we scan your systems, identify risks and take preventive actions. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1284\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1284\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Updating and Implementing Security Policies <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"et-icon et-right-arrow\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"et-icon et-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1284\" class=\"elementor-element elementor-element-2512ad7 e-flex e-con-boxed e-con e-child\" data-id=\"2512ad7\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1284\" class=\"elementor-element elementor-element-04fe210 e-con-full e-flex e-con e-child\" data-id=\"04fe210\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cefff9d elementor-widget elementor-widget-text-editor\" data-id=\"cefff9d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In cyber security, effective implementation of these rules is as important as written policies and procedures. We develop up-to-date security policies specific to your organization and ensure that they are implemented correctly by employees. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1285\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1285\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Firewall, IDS\/IPS and SIEM Management <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"et-icon et-right-arrow\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"et-icon et-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1285\" class=\"elementor-element elementor-element-f404991 e-flex e-con-boxed e-con e-child\" data-id=\"f404991\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1285\" class=\"elementor-element elementor-element-2d21a06 e-con-full e-flex e-con e-child\" data-id=\"2d21a06\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-855fea2 elementor-widget elementor-widget-text-editor\" data-id=\"855fea2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We manage firewalls, intrusion detection\/prevention systems (IDS\/IPS) and Security Information and Event Management (SIEM) solutions for the stable and effective operation of your security infrastructure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-788eb76 elementor-widget elementor-widget-text-editor\" data-id=\"788eb76\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Uninterrupted Cyber Security with CBERNET<\/strong><\/p><p>Security is not just a precaution, it is one of the most important components that protect the continuity and reputation of your organization. As CBERNET, we implement our maintenance and support solutions in the best way to ensure that your business is constantly protected against cyber threats. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53318bc e-con-full e-flex e-con e-child\" data-id=\"53318bc\" data-element_type=\"container\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d54355f elementor-widget elementor-widget-image\" data-id=\"d54355f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"700\" src=\"https:\/\/cbernet.com\/wp-content\/uploads\/xstore\/xstore-placeholder-1024x1024.png\" class=\"attachment-large size-large wp-image-1579 lazyload lazyload-simple et-lazyload-fadeIn\" alt=\"\" sizes=\"(max-width: 1000px) 100vw, 1000px\" data-src=\"https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/hizmet-bakim-destek-02.jpg\" data-srcset=\"https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/hizmet-bakim-destek-02.jpg 1000w, https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/hizmet-bakim-destek-02-300x210.jpg 300w, https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/hizmet-bakim-destek-02-768x538.jpg 768w, https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/hizmet-bakim-destek-02-1x1.jpg 1w, https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/hizmet-bakim-destek-02-10x7.jpg 10w\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ff89b9 elementor-widget elementor-widget-heading\" data-id=\"4ff89b9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Our Services<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75c0c78 elementor-widget elementor-widget-etheme_static_block\" data-id=\"75c0c78\" data-element_type=\"widget\" data-widget_type=\"etheme_static_block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t    <div class=\"etheme-static_block-wrapper\">\n\t            <div class=\"et-no-preview\"><h3>8theme - Static Block<\/h3><p>No preview available.<\/p><\/div><style>\n                .et-no-preview{\n                    font-size: 13px;\n                    background: #f0f0f0;\n                    padding: 8px 12px;\n                    color: #000;\n                    font-family: -apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen-Sans,Ubuntu,Cantarell,Helvetica Neue,sans-serif;\n                }\n                .et-no-preview h3 {\n                    font-size: 14px;\n                    font-family: inherit;\n                    font-weight: 600;\n                    margin: 4px 0;\n                }\n                .et-no-preview p {\n                    margin: 4px 0;\n                    font-size: 13px;\n                }\n            <\/style>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-423e862 e-con-full e-flex e-con e-parent\" data-id=\"423e862\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-36cf519 e-con-full e-flex e-con e-child\" data-id=\"36cf519\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b937659 e-con-full e-flex e-con e-child\" data-id=\"b937659\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-13ffa73 elementor-widget elementor-widget-heading\" data-id=\"13ffa73\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sustainable<br>For your safety<br><strong>Contact<\/strong> us<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-04fd0f5 e-con-full e-flex e-con e-child\" data-id=\"04fd0f5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aeafb77 etheme-contact-form-7-button-custom elementor-widget elementor-widget-et-contact-form-7\" data-id=\"aeafb77\" data-element_type=\"widget\" data-widget_type=\"et-contact-form-7.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t                <div class=\"pp-contact-form etheme-contact-form-7 placeholder-show\">\n                                        \n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1676-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"1676\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/1685#wpcf7-f1676-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"1676\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.4\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1676-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<p><label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" autocomplete=\"name\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Your Name &amp; Surname\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n<\/p>\n<p><label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" autocomplete=\"email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Your Email Address\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n<\/p>\n<p><label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"phone-number\"><input size=\"40\" maxlength=\"400\" minlength=\"3\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Your Phone Number\" value=\"\" type=\"tel\" name=\"phone-number\" \/><\/span><\/label>\n<\/p>\n<p><label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" placeholder=\"Your message\" name=\"your-message\"><\/textarea><\/span> <\/label>\n<\/p>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n                <\/div>\n                \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f21bdcb e-con-full e-flex e-con e-child\" data-id=\"f21bdcb\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6d91b26 e-con-full e-flex e-con e-child\" data-id=\"6d91b26\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f03ee7f elementor-icon-list--layout-inline elementor-align-left elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"f03ee7f\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"tel:+90%20312%20285%2026%2076%20\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-phone\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M493.4 24.6l-104-24c-11.3-2.6-22.9 3.3-27.5 13.9l-48 112c-4.2 9.8-1.4 21.3 6.9 28l60.6 49.6c-36 76.7-98.9 140.5-177.2 177.2l-49.6-60.6c-6.8-8.3-18.2-11.1-28-6.9l-112 48C3.9 366.5-2 378.1.6 389.4l24 104C27.1 504.2 36.7 512 48 512c256.1 0 464-207.5 464-464 0-11.2-7.7-20.9-18.6-23.4z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">+90 312 285 26 76  <\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e7477db e-con-full e-flex e-con e-child\" data-id=\"e7477db\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bc85c55 elementor-icon-list--layout-inline elementor-align-left elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"bc85c55\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"mailto:info@cbernet.com\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-envelope\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 64H48C21.49 64 0 85.49 0 112v288c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V112c0-26.51-21.49-48-48-48zm0 48v40.805c-22.422 18.259-58.168 46.651-134.587 106.49-16.841 13.247-50.201 45.072-73.413 44.701-23.208.375-56.579-31.459-73.413-44.701C106.18 199.465 70.425 171.067 48 152.805V112h416zM48 400V214.398c22.914 18.251 55.409 43.862 104.938 82.646 21.857 17.205 60.134 55.186 103.062 54.955 42.717.231 80.509-37.199 103.053-54.947 49.528-38.783 82.032-64.401 104.947-82.653V400H48z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">info@cbernet.com<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c4aa44 e-con-full e-flex e-con e-child\" data-id=\"7c4aa44\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c17b680 elementor-icon-list--layout-inline elementor-align-right elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c17b680\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-map-pin\" viewBox=\"0 0 288 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M112 316.94v156.69l22.02 33.02c4.75 7.12 15.22 7.12 19.97 0L176 473.63V316.94c-10.39 1.92-21.06 3.06-32 3.06s-21.61-1.14-32-3.06zM144 0C64.47 0 0 64.47 0 144s64.47 144 144 144 144-64.47 144-144S223.53 0 144 0zm0 76c-37.5 0-68 30.5-68 68 0 6.62-5.38 12-12 12s-12-5.38-12-12c0-50.73 41.28-92 92-92 6.62 0 12 5.38 12 12s-5.38 12-12 12z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">K\u0131z\u0131l\u0131rmak Mahallesi 1443.Cadde No:9 Ulusoy Plaza Kat:2 Daire:6 \u00c7ankaya \/ Ankara TURKEY<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Maintenance &amp; Support Services Cyber security is a process that is not just a matter of installing a system and leaving it alone, but a<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1685","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages\/1685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/comments?post=1685"}],"version-history":[{"count":1,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages\/1685\/revisions"}],"predecessor-version":[{"id":1686,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages\/1685\/revisions\/1686"}],"wp:attachment":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/media?parent=1685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}