About us

[et_pb_section fb_built=”1″ admin_label=”Header” _builder_version=”3.25.1″ background_color=”#f1fafe” use_background_color_gradient=”on” background_color_gradient_start=”#00ffd8″ background_color_gradient_end=”#0029e2″ background_color_gradient_type=”radial” background_color_gradient_direction_radial=”top” background_image=”https://www.itascasw.com/wp-content/uploads/2021/07/cyber-security-08.png” custom_padding=”||0px|||” background_last_edited=”on|phone” background_position_tablet=”center_right” locked=”off”][et_pb_row column_structure=”3_5,2_5″ _builder_version=”3.25.1″][et_pb_column type=”3_5″ _builder_version=”3.25.1″][et_pb_image src=”https://www.itascasw.com/wp-content/uploads/2021/07/cyber-security-10.png” _builder_version=”3.25.3″ max_width_tablet=”400px” max_width_phone=”200px” max_width_last_edited=”on|desktop” custom_margin=”|||-20vw” custom_margin_tablet=”|||0vw” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off”][/et_pb_image][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”3.25.1″][et_pb_text _builder_version=”3.27.4″ text_font=”||||||||” header_font=”Overpass|900|||||||” header_font_size=”84px” header_font_size_tablet=”54px” header_font_size_phone=”32px” header_font_size_last_edited=”on|desktop” locked=”off”]

About Us

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off”]

Itascasw is an IT Solution, Security and Services Company providing best solution to its clients for any development solution to Securing data. We have end to end expertise and have served several Government, Institutions, and Private Sectors.

 

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ prev_background_color=”#f1fafe” admin_label=”Features” _builder_version=”3.25.3″ custom_margin=”||” custom_padding=”||||false|” top_divider_style=”slant” top_divider_height=”20vw” bottom_divider_height=”20vw”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25.3″ custom_margin=”||-4vw” locked=”off”][et_pb_column type=”1_2″ _builder_version=”3.25.1″][et_pb_blurb title=”Virus finding” image=”https://www.itascasw.com/wp-content/uploads/2021/07/cyber-security-illustrated-icons-07.png” _builder_version=”4.9.10″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” hover_enabled=”0″ sticky_enabled=”0″][/et_pb_blurb][et_pb_blurb title=”Network layers” image=”https://www.itascasw.com/wp-content/uploads/2021/07/cyber-security-illustrated-icons-05.png” _builder_version=”4.9.10″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” hover_enabled=”0″ sticky_enabled=”0″][/et_pb_blurb][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25.1″ transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|94px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|tablet” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|tablet” transform_styles_tablet=”” transform_styles_phone=””][et_pb_blurb title=”Cloudbase Security¬†” image=”https://www.itascasw.com/wp-content/uploads/2021/07/cyber-security-illustrated-icons-03.png” _builder_version=”3.25.3″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” custom_padding=”||0px|||”][/et_pb_blurb][et_pb_blurb title=”Protections” image=”https://www.itascasw.com/wp-content/uploads/2021/07/cyber-security-illustrated-icons-06.png” _builder_version=”4.9.10″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” hover_enabled=”0″ locked=”off” sticky_enabled=”0″][/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ prev_background_color=”#ffffff” admin_label=”About” _builder_version=”3.25.3″ use_background_color_gradient=”on” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” background_color_gradient_type=”radial” background_image=”https://www.itascasw.com/wp-content/uploads/2021/07/cyber-security-04.png” background_size=”contain” background_position=”bottom_center” custom_margin=”||16vw” custom_padding=”||16vw|||” top_divider_style=”slant” top_divider_height=”20vw” locked=”off”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25.3″][et_pb_column type=”1_2″ _builder_version=”3.25.1″ custom_padding=”9vw||” custom_padding_tablet=”0vw||” custom_padding_last_edited=”off|desktop”][et_pb_text _builder_version=”3.27.4″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Overpass|600|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” background_layout=”dark” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off”]

Approach

Our Approach to Security & Prevention

[/et_pb_text][et_pb_divider color=”#00b4ff” divider_weight=”2px” _builder_version=”3.25.1″ width=”100px” custom_margin=”||0px”][/et_pb_divider][et_pb_text _builder_version=”3.27.4″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off”]

We are continuously trying our best to serve and secure the cyber boundaries of India with AIM and on Forefronts of Securing Digital India.

[/et_pb_text][et_pb_button button_text=”Set Up a Consultation” _builder_version=”3.25.3″ custom_button=”on” button_text_size=”14px” button_text_color=”#00b4ff” button_bg_color=”rgba(0,0,0,0)” button_border_width=”2px” button_border_color=”#00b4ff” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”12px|24px|12px|24px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25.1″ custom_padding=”29vw||” custom_padding_tablet=”0vw||” custom_padding_phone=”” custom_padding_last_edited=”on|desktop”][et_pb_image src=”https://www.itascasw.com/wp-content/uploads/2021/07/cyber-security-14.png” _builder_version=”3.25.3″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”-5vw|-10vw||-10vw||true” custom_margin_tablet=”0vw|0vw||0vw||true” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”3.25.3″ use_background_color_gradient=”on” background_color_gradient_start=”#3122b2″ background_color_gradient_end=”#00ffd8″ background_color_gradient_type=”radial” background_color_gradient_direction_radial=”top right” background_image=”https://www.itascasw.com/wp-content/uploads/2021/07/cyber-security-17.png” z_index=”10″ overflow-x=”visible” overflow-y=”visible” custom_padding=”||10vw|||” locked=”off”][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”3.25.3″ background_color=”#ffffff” custom_margin=”-146px|auto|-2px|auto||” custom_padding=”0px||0px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”40px” box_shadow_blur=”60px” box_shadow_spread=”-8px” box_shadow_color=”rgba(10,45,97,0.48)” locked=”off”][et_pb_column type=”2_5″ _builder_version=”3.25.3″ custom_padding=”60px|40px|60px|40px|true|true”][et_pb_text _builder_version=”3.27.4″ header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” locked=”off”]

Contact Us

[/et_pb_text][et_pb_blurb title=”(+91) 8200010241″ use_icon=”on” font_icon=”%%264%%” icon_color=”#006ac1″ icon_placement=”left” use_icon_font_size=”on” icon_font_size=”24px” _builder_version=”4.9.10″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” hover_enabled=”0″ locked=”off” sticky_enabled=”0″][/et_pb_blurb][et_pb_blurb title=”129 Gandhidham, Kutch, Gujarat” use_icon=”on” font_icon=”%%249%%” icon_color=”#006ac1″ icon_placement=”left” use_icon_font_size=”on” icon_font_size=”24px” _builder_version=”4.9.10″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” hover_enabled=”0″ locked=”off” sticky_enabled=”0″]

Monday-Friday: 8am – 5pm

[/et_pb_blurb][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”3.25.3″ use_background_color_gradient=”on” background_color_gradient_start=”#00f6ff” background_color_gradient_end=”#00ffbf” background_color_gradient_type=”radial” background_color_gradient_direction_radial=”top right” background_image=”https://www.itascasw.com/wp-content/uploads/2021/07/cyber-security-010-1.png” background_size=”contain” background_position=”bottom_left” transform_translate_linked=”off” custom_padding=”60px|40px|60px|20%|true” custom_padding_tablet=”80px|||40px” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” background_last_edited=”on|desktop” background_image_tablet=”http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-11.png” background_enable_image_tablet=”on” background_position_tablet=”top_left”][et_pb_text _builder_version=”3.27.4″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” text_orientation=”center” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” text_text_align=”center” locked=”off”]

Get Started

[/et_pb_text][et_pb_text _builder_version=”4.9.10″ text_font=”Overpass|300|||||||” text_text_color=”#0a2d61″ text_font_size=”17px” text_line_height=”1.8em” text_orientation=”center” hover_enabled=”0″ text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” sticky_enabled=”0″]

We are continuously trying our best to serve and secure the cyber boundaries of India with AIM and on Forefronts of Securing Digital India.

[/et_pb_text][et_pb_button button_text=”Book Appointment” button_alignment=”center” _builder_version=”3.25.3″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_bg_color_gradient_type=”radial” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]