{"id":711,"date":"2025-03-30T04:48:23","date_gmt":"2025-03-30T04:48:23","guid":{"rendered":"https:\/\/isoftsource.com\/cyberkoders\/?page_id=711"},"modified":"2025-04-16T00:13:12","modified_gmt":"2025-04-16T00:13:12","slug":"about-us","status":"publish","type":"page","link":"https:\/\/isoftsource.com\/cyberkoders\/about-us\/","title":{"rendered":"About us"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"711\" class=\"elementor elementor-711\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-19f8450 e-flex e-con-boxed e-con e-parent\" data-id=\"19f8450\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9e0975c e-con-full e-flex e-con e-child\" data-id=\"9e0975c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22c1372 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"22c1372\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">About us<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afe4af1 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"afe4af1\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber Koder is a premier cybersecurity and IT services company committed to delivering intelligent and adaptive security solutions. With a team of industry-certified experts, we help businesses navigate the complexities of cybersecurity, ensuring operational security, regulatory compliance, and digital resilience.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ab2111 e-flex e-con-boxed e-con e-parent\" data-id=\"5ab2111\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-75afbe4 e-grid e-con-full e-con e-child\" data-id=\"75afbe4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cedceb6 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"cedceb6\" data-element_type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"270\" height=\"440\" src=\"https:\/\/isoftsource.com\/cyberkoders\/wp-content\/uploads\/2025\/03\/vision1.jpg\" class=\"attachment-large size-large wp-image-775\" alt=\"\" srcset=\"https:\/\/isoftsource.com\/cyberkoders\/wp-content\/uploads\/2025\/03\/vision1.jpg 270w, https:\/\/isoftsource.com\/cyberkoders\/wp-content\/uploads\/2025\/03\/vision1-184x300.jpg 184w\" sizes=\"(max-width: 270px) 100vw, 270px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8a57047 e-flex e-con-boxed e-con e-child\" data-id=\"8a57047\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c9da207 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"c9da207\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Mission<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-476f4d0 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"476f4d0\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;,&quot;_animation_delay&quot;:500}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To empower organizations with state-of-the-art cybersecurity solutions that mitigate threats, ensure compliance, and fortify business operations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df5bb04 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"df5bb04\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;,&quot;_animation_delay&quot;:800}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Vision<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d6e540 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"3d6e540\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;,&quot;_animation_delay&quot;:1100}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To be a global leader in cybersecurity, enabling businesses to thrive securely in an increasingly connected world.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-25fc4b6 e-flex e-con-boxed e-con e-parent\" data-id=\"25fc4b6\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-563e99b elementor-widget elementor-widget-heading\" data-id=\"563e99b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Values<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-83e4e37 e-grid e-con-full e-con e-child\" data-id=\"83e4e37\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-966cd89 e-con-full e-flex e-con e-child\" data-id=\"966cd89\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bf4b5b1 e-con-full e-flex e-con e-child\" data-id=\"bf4b5b1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e9e9f7e elementor-widget elementor-widget-text-editor\" data-id=\"e9e9f7e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tPartner with Cyber Koder and safeguard your business with world-class cybersecurity solutions.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-48e7a10 e-grid e-con-full e-con e-child\" data-id=\"48e7a10\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9a32df4 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"9a32df4\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fac0900 elementor-widget elementor-widget-heading\" data-id=\"fac0900\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Predict<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5450b55 elementor-widget elementor-widget-text-editor\" data-id=\"5450b55\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Proactively identify emerging cyber risks with AI-driven analytics.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-794e546 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"794e546\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:600}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a4ab89a elementor-widget elementor-widget-heading\" data-id=\"a4ab89a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Prevent<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65808f7 elementor-widget elementor-widget-text-editor\" data-id=\"65808f7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Implementing security controls and automation to reduce attack surfaces.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ed005de e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"ed005de\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:900}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e07beee elementor-widget elementor-widget-heading\" data-id=\"e07beee\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d834e2 elementor-widget elementor-widget-text-editor\" data-id=\"1d834e2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Delivering continuous monitoring, threat mitigation, and compliance support.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f4e6a0 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"7f4e6a0\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:1200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a2bd569 elementor-widget elementor-widget-heading\" data-id=\"a2bd569\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Innovation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fb59ea elementor-widget elementor-widget-text-editor\" data-id=\"8fb59ea\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Continuously evolving our security solutions to combat new threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-90dba66 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"90dba66\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:1600}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a30117e elementor-widget elementor-widget-heading\" data-id=\"a30117e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Integrity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ace2d5 elementor-widget elementor-widget-text-editor\" data-id=\"9ace2d5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Upholding transparency and trust in all cybersecurity engagements.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8da0ef3 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"8da0ef3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:2000}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd2952 elementor-widget elementor-widget-heading\" data-id=\"0dd2952\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Customer-Centric Approach<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2858775 elementor-widget elementor-widget-text-editor\" data-id=\"2858775\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Providing tailored security solutions for every industry.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>About us Cyber Koder is a premier cybersecurity and IT services company committed to delivering intelligent and adaptive security solutions. With a team of industry-certified experts, we help businesses navigate the complexities of cybersecurity, ensuring operational security, regulatory compliance, and digital resilience. Our Mission To empower organizations with state-of-the-art cybersecurity solutions that mitigate threats, ensure [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-711","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/isoftsource.com\/cyberkoders\/wp-json\/wp\/v2\/pages\/711","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/isoftsource.com\/cyberkoders\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/isoftsource.com\/cyberkoders\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/isoftsource.com\/cyberkoders\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isoftsource.com\/cyberkoders\/wp-json\/wp\/v2\/comments?post=711"}],"version-history":[{"count":112,"href":"https:\/\/isoftsource.com\/cyberkoders\/wp-json\/wp\/v2\/pages\/711\/revisions"}],"predecessor-version":[{"id":1564,"href":"https:\/\/isoftsource.com\/cyberkoders\/wp-json\/wp\/v2\/pages\/711\/revisions\/1564"}],"wp:attachment":[{"href":"https:\/\/isoftsource.com\/cyberkoders\/wp-json\/wp\/v2\/media?parent=711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}