{"id":30,"date":"2020-04-27T21:28:42","date_gmt":"2020-04-27T21:28:42","guid":{"rendered":"https:\/\/bslthemes.com\/ryancv\/?page_id=29"},"modified":"2023-07-03T11:04:58","modified_gmt":"2023-07-03T11:04:58","slug":"home","status":"publish","type":"page","link":"https:\/\/encryptshell.com\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"30\" class=\"elementor elementor-30\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1368f2f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1368f2f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d69b8b\" data-id=\"8d69b8b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b939dc4 elementor-widget elementor-widget-ryancv-about-me\" data-id=\"b939dc4\" data-element_type=\"widget\" data-widget_type=\"ryancv-about-me.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n\t\t<!-- About -->\n\t\t<div class=\"content about\">\n\n\t\t\t\t\t\t<!-- title -->\n\t\t\t<div class=\"title\">\n\t\t\t\t<span >About Me<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t<!-- content -->\n\t\t\t<div class=\"row\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t<div class=\"col col-d-12 col-t-12 col-m-12 border-line-v\">\n\t\t\t\t\t<div class=\"text-box\">\n\t\t\t\t\t\t<div ><p><strong>Hello! I\u2019m Encrypt Shell, AKA Ashish Mohanty<\/strong><\/p><p>I work for Protecting digital world from cyber threats.\u00a0Offering expertise in cybersecurity solutions and strategies.<\/p><p>I have honed my skills in areas such as infra &amp; network security, Web Application Security, Vulnerability assessment, Penetration testing, Secure Configuration review, incident response, and compliance.<\/p><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t<div class=\"col col-d-12 col-t-12 col-m-12 border-line-v\">\n\t\t\t\t\t<div class=\"info-list\">\n\t\t\t\t\t\t<ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t<strong>\n\t\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\t\tNetwork Security Implementation\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/strong>\n\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\tImplemented robust network security measures to safeguard sensitive data and prevent unauthorized access.\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t<strong>\n\t\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\t\tVulnerability Assessment and Penetration Testing\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/strong>\n\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\tConducted comprehensive vulnerability assessments and penetration testing to identify and address potential security weaknesses.\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t<strong>\n\t\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\t\tSecurity Incident Response\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/strong>\n\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\tDeveloped and implemented effective incident response plans to minimize the impact of security breaches and ensure quick resolution.\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t<strong>\n\t\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\t\tCyber Threat Intelligence\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/strong>\n\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\tProvided real-time cyber threat intelligence to proactively detect and mitigate potential threats before they can cause harm.\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t<strong>\n\t\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\t\tSecurity Awareness Training\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/strong>\n\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\tConducted engaging security awareness training sessions to educate employees on best practices and promote a security-conscious culture.\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t<strong>\n\t\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\t\tSecurity Audit and Compliance\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/strong>\n\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\tPerformed thorough security audits and ensured compliance with industry standards and regulations to maintain a secure environment. \t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"clear\"><\/div>\n\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ac2a78f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"ac2a78f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-15d3f26\" data-id=\"15d3f26\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7412363 elementor-widget elementor-widget-ryancv-services\" data-id=\"7412363\" data-element_type=\"widget\" data-widget_type=\"ryancv-services.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n\t\t<!-- Services -->\n\t\t<div class=\"content services\">\n\n\t\t\t\t\t\t<!-- title -->\n\t\t\t<div class=\"title\">\n\t\t\t\t<span >My Services<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<!-- content -->\n\t\t\t<div class=\"row service-items border-line-v\">\n\n\t\t\t\t\t\t\t\t<!-- service item -->\n\t\t\t\t<div class=\"col col-d-6 col-t-6 col-m-12 border-line-h\">\n\t\t\t\t\t<div class=\"service-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon\">\n                                <i aria-hidden=\"true\" class=\"fas fa-glasses\"><\/i>                \t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"name\">\n\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\tVulnerability Assessment\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"desc\">\n\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t<p class=\"body\" data-pm-slice=\"1 1 []\">Conducting comprehensive vulnerability assessments identify potential security weaknesses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<!-- service item -->\n\t\t\t\t<div class=\"col col-d-6 col-t-6 col-m-12 border-line-h\">\n\t\t\t\t\t<div class=\"service-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon\">\n                                <i aria-hidden=\"true\" class=\"fas fa-building\"><\/i>                \t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"name\">\n\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\tPenetration testing\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"desc\">\n\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t<p class=\"body\" data-pm-slice=\"1 1 []\">Simulate real-world attacks to provide a point-in-time assessment of vulnerabilities and threats to address potential security weaknesses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<!-- service item -->\n\t\t\t\t<div class=\"col col-d-6 col-t-6 col-m-12 border-line-h\">\n\t\t\t\t\t<div class=\"service-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon\">\n                                <i aria-hidden=\"true\" class=\"fas fa-chart-line\"><\/i>                \t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"name\">\n\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\tSecure Configuration Review\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"desc\">\n\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t<p>Provides an in-depth inspection of your devices or applications to identify configuration weaknesses that may reduce their resilience to attack<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<!-- service item -->\n\t\t\t\t<div class=\"col col-d-6 col-t-6 col-m-12 border-line-h\">\n\t\t\t\t\t<div class=\"service-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon\">\n                                <i aria-hidden=\"true\" class=\"far fa-copyright\"><\/i>                \t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"name\">\n\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\tManaged Security Risk &amp; Compliance\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"desc\">\n\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t<p>End-to-end Managed Services to transform, automate and orchestrate Risk and Compliance processes enabling effective protection, detection and response.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<!-- service item -->\n\t\t\t\t<div class=\"col col-d-6 col-t-6 col-m-12 border-line-h\">\n\t\t\t\t\t<div class=\"service-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon\">\n                                <i aria-hidden=\"true\" class=\"far fa-eye\"><\/i>                \t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"name\">\n\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\tSecurity Operations Center (SOC)\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"desc\">\n\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t<p>Continuous monitoring, centralised visibility, detecting, preventing, investigating, and responding to cyber threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<!-- service item -->\n\t\t\t\t<div class=\"col col-d-6 col-t-6 col-m-12 border-line-h\">\n\t\t\t\t\t<div class=\"service-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon\">\n                                                \t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"name\">\n\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\tCyber Security Consulting\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"desc\">\n\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t<p><span class=\"cmp-text__paragraph-default\">Cybersecurity knowledge and deep industry expertise allow us to develop next-gen cybersecurity solutions from consulting, implementation and managed services to protect your business end-to-end<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"clear\"><\/div>\n\n\t\t\t\n\t\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>About Me Hello! I\u2019m Encrypt Shell, AKA Ashish Mohanty I work for Protecting digital world from cyber threats.\u00a0Offering expertise in&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-elementor-builder.php","meta":[],"acf":[],"_links":{"self":[{"href":"https:\/\/encryptshell.com\/index.php\/wp-json\/wp\/v2\/pages\/30"}],"collection":[{"href":"https:\/\/encryptshell.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/encryptshell.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/encryptshell.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/encryptshell.com\/index.php\/wp-json\/wp\/v2\/comments?post=30"}],"version-history":[{"count":52,"href":"https:\/\/encryptshell.com\/index.php\/wp-json\/wp\/v2\/pages\/30\/revisions"}],"predecessor-version":[{"id":805,"href":"https:\/\/encryptshell.com\/index.php\/wp-json\/wp\/v2\/pages\/30\/revisions\/805"}],"wp:attachment":[{"href":"https:\/\/encryptshell.com\/index.php\/wp-json\/wp\/v2\/media?parent=30"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}