{"id":2500,"date":"2020-12-15T04:01:36","date_gmt":"2020-12-15T04:01:36","guid":{"rendered":"http:\/\/localhost:8888\/alphasoniclimited\/index.php\/homepage\/software-innovation\/"},"modified":"2025-06-11T13:32:56","modified_gmt":"2025-06-11T13:32:56","slug":"home","status":"publish","type":"page","link":"https:\/\/alphasoniclimited.com\/","title":{"rendered":"Home"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]\n\t\t\t\t<p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t\t<sr7-module data-alias=\"software-innovation\" data-id=\"13\" id=\"SR7_13_1\" class=\"rs-ov-hidden\" data-version=\"6.7.30\">\n\t\t\t\t\t<sr7-adjuster><\/sr7-adjuster>\n\t\t\t\t\t<sr7-content>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_13_1-15\" data-key=\"15\">\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_13_1-15-1\" class=\"sr7-layer\">Protecting Your Digital World<\/sr7-txt>\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_13_1-15-2\" class=\"sr7-layer\">Cyber Security<\/sr7-txt>\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_13_1-15-3\" class=\"sr7-layer\">AlphaSonic Limited <\/sr7-txt>\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_13_1-15-4\" class=\"sr7-layer\">Welcome to AlphaSonic Limited a leading Cyber Security firm<\/sr7-txt>\n\t\t\t\t\t\t\t<a id=\"SR7_13_1-15-5\" class=\"sr7-layer\" href=\"https:\/\/alphasoniclimited.com\/index.php\/managed-it-services\/\" target=\"_self\">Learn more<\/a>\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_13_1-23\" data-key=\"23\">\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t<\/sr7-content>\n\t\t\t\t\t<image_lists style=\"display:none\">\n\t\t\t\t\t\t<img data-src=\"\/\/alphasoniclimited.com\/wp-content\/uploads\/2019\/03\/soft-01.png\" data-libid=\"2504\" data-lib=\"medialibrary\" title=\"soft-01\" width=\"0\" height=\"0\" data-dbsrc=\"Ly9hbHBoYXNvbmljbGltaXRlZC5jb20vd3AtY29udGVudC91cGxvYWRzLzIwMTkvMDMvc29mdC0wMS5wbmc=\"\/>\n\t\t\t\t\t<\/image_lists>\n\t\t\t\t<\/sr7-module>\n\t\t\t\t<script>\n\t\t\t\t\tSR7.PMH ??={}; SR7.PMH[\"SR7_13_1\"] = {cn:100,state:false,fn: function() { if (_tpt!==undefined && _tpt.prepareModuleHeight !== undefined) {  _tpt.prepareModuleHeight({id:\"SR7_13_1\",el:[840,840,840,960,720],type:'standard',shdw:'0',gh:[840,840,840,960,720],gw:[1240,1240,1240,778,480],vpt:['-100px&#039;,&#039;-100px&#039;,&#039;-100px&#039;,&#039;-100px&#039;,&#039;-100px'],size:{fullWidth:true, fullHeight:false},mh:'0',onh:0,onw:0,bg:{color:'{\"orig\":\"transparent\",\"type\":\"solid\",\"string\":\"transparent\"}'}});   SR7.PMH[\"SR7_13_1\"].state=true;} else if(SR7.PMH[\"SR7_13_1\"].cn-->0)\tsetTimeout( SR7.PMH[\"SR7_13_1\"].fn,19);}};SR7.PMH[\"SR7_13_1\" ].fn();\n\t\t\t\t<\/script>\n[tm_spacer size=&#8221;xs:60;sm:60;md:60;lg:60&#8243;][\/vc_column][vc_column][tm_gradation border_color=&#8221;primary&#8221; items=&#8221;%5B%7B%22title%22%3A%22Our%20Mission%22%2C%22text%22%3A%22To%20deliver%20cost-efficient%2C%20robust%20security%20solutions%20that%20safeguard%20your%20digital%20assets%20against%20evolving%20cyber%20threats.%22%2C%22button%22%3A%22Button%22%7D%2C%7B%22title%22%3A%22Objective%22%2C%22text%22%3A%22To%20empower%20businesses%20of%20all%20sizes%20with%20cutting-edge%20cybersecurity%20solutions%20that%20proactively%20defend%20against%20evolving%20threats%2C%20ensuring%20trust%2C%20compliance%2C%20and%20uninterrupted%20growth%22%2C%22button%22%3A%22Button%22%7D%5D&#8221; lg_spacing=&#8221;margin_left:30&#8243;][tm_spacer size=&#8221;xs:60;sm:60;md:60;lg:60&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; lg_spacing=&#8221;padding_top:120;padding_bottom:60&#8243; background_image=&#8221;2516&#8243;][vc_column width=&#8221;1\/2&#8243;][tm_rotate_box image_size=&#8221;full&#8221; front_button_color=&#8221;default&#8221; front_background_image=&#8221;2913&#8243; back_background_image=&#8221;2910&#8243;][tm_spacer size=&#8221;sm:50;lg:60&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][tm_heading style=&#8221;modern&#8221; tag=&#8221;h6&#8243; custom_google_font=&#8221;&#8221; text_color=&#8221;custom&#8221; custom_text_color=&#8221;#ababab&#8221; font_size=&#8221;lg:14&#8243; letter_spacing=&#8221;3px&#8221;]Why Choose AlphaSonic Limited?[\/tm_heading][tm_spacer size=&#8221;lg:23&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243;]<b>Expert Team:<\/b> Our team of seasoned cyber security professionals brings years of experience and cutting-edge knowledge to the table. We are dedicated to staying ahead of the curve, ensuring your business is protected with the latest security measures.<br \/>\n<b>Tailored Solutions:<\/b> We understand that every business is unique. That\u2019s why we offer customized security strategies that fit your specific needs, whether you\u2019re a large corporation or an Small and Medium Enterprises (SME).<br \/>\n<b>Cost Efficiency:<\/b> Quality cyber security doesn\u2019t have to break the bank. We provide affordable solutions without compromising on effectiveness, ensuring you get the best protection for your investment.<br \/>\n<b>Continuous Learning:<\/b> We stay ahead of the curve by constantly updating our training programs and services to reflect the latest in cybersecurity trends and technologies.[\/tm_heading][tm_spacer size=&#8221;lg:45&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; lg_spacing=&#8221;padding_top:120;padding_bottom:90&#8243;][vc_column][tm_heading style=&#8221;modern&#8221; tag=&#8221;h6&#8243; custom_google_font=&#8221;&#8221; text_color=&#8221;custom&#8221; custom_text_color=&#8221;#ababab&#8221; font_size=&#8221;lg:14&#8243; letter_spacing=&#8221;3px&#8221;]Our Potfolio[\/tm_heading][tm_spacer size=&#8221;lg:23&#8243;][vc_row_inner content_placement=&#8221;middle&#8221;][vc_column_inner width=&#8221;2\/3&#8243;][tm_heading custom_google_font=&#8221;&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243;]For your very specific security threat,<br \/>\nwe have <mark>highly-tailored solutions.<\/mark>[\/tm_heading][tm_spacer size=&#8221;sm:50;lg:30&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][tm_button button=&#8221;url:http%3A%2F%2Flocalhost%3A8888%2Falphasoniclimited%2Findex.php%2Fcontact-us%2F|title:Talk%20to%20a%20consultant&#8221; align=&#8221;right&#8221; xs_align=&#8221;left&#8221;][tm_spacer size=&#8221;sm:50;lg:30&#8243;][\/vc_column_inner][\/vc_row_inner][tm_spacer size=&#8221;lg:35&#8243;][tm_grid columns=&#8221;xs:1;sm:2;md:3;lg:4&#8243; column_gutter=&#8221;lg:30&#8243; row_gutter=&#8221;lg:2&#8243;][tm_box_image image=&#8221;2527&#8243; heading=&#8221;Security Assessment and Risk Management&#8221; button=&#8221;url:%23&#8243;][tm_box_image image=&#8221;2538&#8243; heading=&#8221;Incident Response and Recovery&#8221; button=&#8221;url:%23&#8243;][tm_box_image image=&#8221;2539&#8243; heading=&#8221;Compliance and Regulatory Services&#8221; button=&#8221;url:%23&#8243;][tm_box_image image=&#8221;2537&#8243; heading=&#8221;Network Security&#8221; button=&#8221;url:%23&#8243;][tm_box_image image=&#8221;2536&#8243; heading=&#8221;Data Protection and Encryption&#8221; button=&#8221;url:%23&#8243;][tm_box_image image=&#8221;2540&#8243; heading=&#8221;Cloud Security&#8221; button=&#8221;url:%23&#8243;][tm_box_image image=&#8221;2535&#8243; heading=&#8221;Application Security&#8221; button=&#8221;url:%23&#8243;][tm_box_image image=&#8221;2541&#8243; heading=&#8221;Threat Intelligence&#8221; button=&#8221;url:%23&#8243;][\/tm_grid][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][tm_spacer size=&#8221;xs:60;sm:60;md:60;lg:60&#8243;][\/vc_column][vc_column][tm_gradation border_color=&#8221;primary&#8221; items=&#8221;%5B%7B%22title%22%3A%22Our%20Mission%22%2C%22text%22%3A%22To%20deliver%20cost-efficient%2C%20robust%20security%20solutions%20that%20safeguard%20your%20digital%20assets%20against%20evolving%20cyber%20threats.%22%2C%22button%22%3A%22Button%22%7D%2C%7B%22title%22%3A%22Objective%22%2C%22text%22%3A%22To%20empower%20businesses%20of%20all%20sizes%20with%20cutting-edge%20cybersecurity%20solutions%20that%20proactively%20defend%20against%20evolving%20threats%2C%20ensuring%20trust%2C%20compliance%2C%20and%20uninterrupted%20growth%22%2C%22button%22%3A%22Button%22%7D%5D&#8221; lg_spacing=&#8221;margin_left:30&#8243;][tm_spacer size=&#8221;xs:60;sm:60;md:60;lg:60&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; lg_spacing=&#8221;padding_top:120;padding_bottom:60&#8243; background_image=&#8221;2516&#8243;][vc_column width=&#8221;1\/2&#8243;][tm_rotate_box image_size=&#8221;full&#8221; front_button_color=&#8221;default&#8221; front_background_image=&#8221;2913&#8243; back_background_image=&#8221;2910&#8243;][tm_spacer size=&#8221;sm:50;lg:60&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][tm_heading style=&#8221;modern&#8221; tag=&#8221;h6&#8243; custom_google_font=&#8221;&#8221; text_color=&#8221;custom&#8221; custom_text_color=&#8221;#ababab&#8221; font_size=&#8221;lg:14&#8243; letter_spacing=&#8221;3px&#8221;]Why Choose AlphaSonic Limited?[\/tm_heading][tm_spacer size=&#8221;lg:23&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243;]Expert Team: Our team of seasoned cyber security professionals brings years of experience and cutting-edge knowledge to the table. We are dedicated to staying ahead of the curve, ensuring your business is protected with the latest security measures. Tailored Solutions: We understand that every business is unique. That\u2019s why we offer customized security strategies that fit your specific needs, whether you\u2019re a large corporation or an Small and Medium Enterprises (SME). Cost Efficiency: Quality cyber security doesn\u2019t have to break the bank. We provide affordable solutions without compromising on effectiveness, ensuring you get the best protection for your investment. Continuous Learning: We stay ahead of the curve by constantly updating our training programs and services to reflect the latest in cybersecurity trends and technologies.[\/tm_heading][tm_spacer size=&#8221;lg:45&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; lg_spacing=&#8221;padding_top:120;padding_bottom:90&#8243;][vc_column][tm_heading style=&#8221;modern&#8221; tag=&#8221;h6&#8243; custom_google_font=&#8221;&#8221; text_color=&#8221;custom&#8221; custom_text_color=&#8221;#ababab&#8221; font_size=&#8221;lg:14&#8243; letter_spacing=&#8221;3px&#8221;]Our Potfolio[\/tm_heading][tm_spacer size=&#8221;lg:23&#8243;][vc_row_inner content_placement=&#8221;middle&#8221;][vc_column_inner width=&#8221;2\/3&#8243;][tm_heading custom_google_font=&#8221;&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243;]For your very specific security threat, we have highly-tailored solutions.[\/tm_heading][tm_spacer size=&#8221;sm:50;lg:30&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][tm_button button=&#8221;url:http%3A%2F%2Flocalhost%3A8888%2Falphasoniclimited%2Findex.php%2Fcontact-us%2F|title:Talk%20to%20a%20consultant&#8221; align=&#8221;right&#8221; xs_align=&#8221;left&#8221;][tm_spacer size=&#8221;sm:50;lg:30&#8243;][\/vc_column_inner][\/vc_row_inner][tm_spacer size=&#8221;lg:35&#8243;][tm_grid columns=&#8221;xs:1;sm:2;md:3;lg:4&#8243; column_gutter=&#8221;lg:30&#8243; row_gutter=&#8221;lg:2&#8243;][tm_box_image image=&#8221;2527&#8243; heading=&#8221;Security Assessment and Risk Management&#8221; button=&#8221;url:%23&#8243;][tm_box_image image=&#8221;2538&#8243; heading=&#8221;Incident Response and Recovery&#8221; button=&#8221;url:%23&#8243;][tm_box_image image=&#8221;2539&#8243; heading=&#8221;Compliance and Regulatory Services&#8221; button=&#8221;url:%23&#8243;][tm_box_image image=&#8221;2537&#8243; heading=&#8221;Network Security&#8221; button=&#8221;url:%23&#8243;][tm_box_image image=&#8221;2536&#8243; heading=&#8221;Data Protection and Encryption&#8221; button=&#8221;url:%23&#8243;][tm_box_image image=&#8221;2540&#8243; heading=&#8221;Cloud Security&#8221; button=&#8221;url:%23&#8243;][tm_box_image image=&#8221;2535&#8243; heading=&#8221;Application Security&#8221; button=&#8221;url:%23&#8243;][tm_box_image image=&#8221;2541&#8243; heading=&#8221;Threat Intelligence&#8221; button=&#8221;url:%23&#8243;][\/tm_grid][\/vc_column][\/vc_row]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2500","page","type-page","status-publish","hentry","post-no-thumbnail"],"_links":{"self":[{"href":"https:\/\/alphasoniclimited.com\/index.php\/wp-json\/wp\/v2\/pages\/2500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alphasoniclimited.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/alphasoniclimited.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/alphasoniclimited.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/alphasoniclimited.com\/index.php\/wp-json\/wp\/v2\/comments?post=2500"}],"version-history":[{"count":53,"href":"https:\/\/alphasoniclimited.com\/index.php\/wp-json\/wp\/v2\/pages\/2500\/revisions"}],"predecessor-version":[{"id":3292,"href":"https:\/\/alphasoniclimited.com\/index.php\/wp-json\/wp\/v2\/pages\/2500\/revisions\/3292"}],"wp:attachment":[{"href":"https:\/\/alphasoniclimited.com\/index.php\/wp-json\/wp\/v2\/media?parent=2500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}