.hero {
position: absolute;
top: -563px;
left: 17%;
}
.bg-white{
–bs-bg-opacity: 1;
background-color: #ffff ;
}
.rounded {
border-radius: 10px ;
}
.section-title {
font-weight: bold;
margin-top: 60px;
margin-bottom: 30px;
}
.icon-box {
background: #f8f9fa;
padding: 20px;
border-radius: 10px;
margin-bottom: 20px;
text-align: center;
}
.footer {
background-color: #212529;
color: white;
padding: 40px 0;
}
.aboutus{
padding: 0px 0;
}
.form-control{
background-color: #d6e9f8;
}
.head-h5-form{
text-align: left;
}
.btn-audit{
float: left;
}
“In the evolving digital landscape, safeguarding your
Urban Cooperative Bank’s digital assets and customer
trust is paramount. With the Reserve Bank of India’s (RBI)
Comprehensive Cyber Security Framework for Urban
Cooperative Banks, the need for robust and compliant
cybersecurity and IT infrastructure has never
been more critical.
Varutra is your dedicated partner, offering
specialized cybersecurity and IT services
designed to ensure your UCB not only meets
but exceeds RBI’s stringent guidelines,
fostering resilience and operational
excellence.”
.why-choose h2 {
font-size: 32px;
font-weight: bold;
text-align: center;
margin-bottom: 40px;
}
.why-choose h2 span {
color: #e3342f; /* Red highlight */
}
.why-box {
background-color: #f4f4f4;
border-radius: 5px;
max-height: 200px;
min-height: 305px;
margin-bottom: 20px;
box-shadow: 0 2px 5px rgba(0, 0, 0, 0.05);
}
.why-box h5 {
font-size:14px;
font-weight: 600;
color: white;
background-color: #e3342f;
padding: 10px;
border-radius: 5px 5px 0px 0px;
text-align: center;
margin-bottom: 15px;
}
.why-box p {
font-size:14px;
text-align: center;
color: #333;
padding: 10px;
}
Deep understanding and practical experience with the RBI Circular, including its graded approach (Level I, II, III, IV) and specific control requirements.
We don’t believe in one-size-fits-all. Our services are customized to your UCB’s unique digital depth, risk profile, and offerings.
We focus on building a proactive defense posture to mitigate threats before they impact your operations.
Certified cybersecurity and IT experts with extensive BFSI experience, especially in cooperative banks.
From analysis and development to monitoring and response, we provide comprehensive support.
.head-size{
font-size:32px;
}
.service-item {
position: relative;
margin-bottom: 1.5rem;
}
.cyber-service {
font-size: 1.5rem;
color: white;
background-color: #e3342f;
padding: 12px;
border-radius: 50%;
margin-right: 15px;
}
.icon-tab {
display: flex;
align-items: center;
cursor: pointer;
padding: 10px;
background-color: #f8f9fa;
border-radius: 8px;
transition: background-color 0.3s;
}
.icon-tab:hover {
background-color: #ffe6e6;
}
.icon {
background-color: #dc3545;
color: white;
border-radius: 50%;
width: 40px;
height: 40px;
display: flex;
align-items: center;
justify-content: center;
font-size: 18px;
margin-right: 15px;
}
.label {
font-weight: bold;
font-size: 16px;
color: #1b1b1b;
}
.content-box {
display: none;
background-color: #fff;
border-left: 4px solid #dc3545;
padding: 15px;
border-radius: 6px;
box-shadow: 0 2px 6px rgba(0,0,0,0.1);
margin-top: 10px;
}
.service-item:hover .content-box {
display: block;
}
We help your UCB navigate the complexities of the RBI Cyber Security Framework, providing services aligned with each key requirement:
(For eligible UCBs – Level IV and above)
Regular cybersecurity awareness programs for all employees, top management, and the Board, with a focus on phishing prevention and best practices.
.it-services-section {
background-color: #fff;
padding: 60px 15px;
}
.it-services-section h2 {
text-align: center;
font-weight: 700;
font-size:32px;
}
.it-services-section h2 .highlight {
color: #e3342f;
}
.it-services-section p.section-subtitle {
text-align: center;
color: #555;
font-size: 1rem;
margin-top: 10px;
max-width: 800px;
margin-left: auto;
margin-right: auto;
}
.service-card h5{
margin-bottom:0px;
}
.service-card {
background-color: #fff;
box-shadow: 0 5px 15px rgba(0,0,0,0.1);
padding: 4px 15px 13px 42px;
border-radius: 8px;
margin-bottom: 30px;
position: relative;
}
.service-card img{
position: absolute;
top: -2px;
left: 0px;
/* background-color: #e3342f; */
color: white;
/* border-radius: 50%; */
font-size: 16px;
}
Beyond security, we offer essential IT services to optimize your UCB’s operations:
• Design, deployment, and management of robust and scalable IT infrastructure.
• Disaster Recovery (DR) and Business Continuity Planning (BCP) solutions.
• Secure data storage and backup solutions.
• Implementation of business intelligence tools for informed decision-making.
• 24/7 monitoring and support for your IT environment.
• Proactive maintenance and troubleshooting to minimize downtime.
.rbi-section h2 {
text-align: center;
font-size: 32px;
font-weight: bold;
}
.rbi-section h2 .highlight {
color: #e3342f;
}
.description {
text-align: center;
max-width: 800px;
margin: 10px auto 40px auto;
color: #8c8a8a;
font-weight: 700;
}
.rbi-section p.description {
text-align: center;
max-width: 800px;
margin: 30px auto 80px auto;
color: #8c8a8a;
font-weight: 700;
}
.rbi-box {
background-color: #f7f7f7;
border-radius: 10px;
padding: 20px;
text-align: center;
box-shadow: 0 2px 5px rgba(0,0,0,0.05);
max-height: 288px;
min-height: 296px;
}
.rbi-box .level-circle {
background-color: #e3342f;
color: white;
width: 80px;
height: 80px;
border-radius: 50%;
display: flex;
align-items: center;
justify-content: center;
margin: 0 auto;
font-weight: bold;
bottom: 57px;
position: relative;
}
.rbi-box p {
color: #333;
margin-top: -30px;
}
The RBI’s framework categorizes UCBs into four levels (I–IV) based on factors like digital adoption, payment system integration, cyber risk assessment, and third-party risks. We understand these distinctions and tailor our services accordingly:
Focus on foundational controls like bank-specific email domains with DMARC, two-factor authentication for CBS, and robust password management policies.
Includes Level 1 requirements plus enhanced network management, secure configurations, ASLC, periodic testing, anti-phishing, DLP, and incident response.
Builds on previous levels with advanced real-time threat defense, risk-based transaction monitoring, and centralized authentication (IAM).
Mandates the establishment of a dedicated Cyber Security Operations Center (C-SOC) for continuous surveillance and participation in cyber drills.
We provide a detailed gap assessment to help your UCB identify its current compliance level and chart a clear roadmap to achieve the necessary security posture.
.approach-section {
background-color: #f9f9f9;
}
.approach-section .section-intro {
text-align: center;
color: #555;
max-width: 800px;
margin: 0 auto 30px auto;
font-size: 1rem;
}
.approach-section h2 {
text-align: center;
font-weight: bold;
margin-bottom: 40px;
font-size:32px;
}
.approach-section h2 .highlight {
color: #e3342f;
}
.approach-box {
margin-bottom: 30px;
text-align: left;
}
.approach-box h5 {
font-weight: bold;
margin-bottom:10px;
color: #000;
}
.approach-box p {
color: #444;
}
.approach-box i {
color: #e3342f;
margin-right: 10px;
}
Conduct a thorough assessment of your existing IT and security infrastructure, policies, and practices against RBI guidelines.
Develop a tailored cybersecurity and IT strategy and roadmap that aligns with your UCB’s specific needs and RBI requirements.
Deploy and integrate security solutions and IT infrastructure, ensuring minimal disruption to your operations.
Provide continuous monitoring, management, and support to maintain your security posture and operational efficiency.
Conduct regular training and awareness programs to empower your team with the knowledge and skills to identify and respond to cyber threats.
Facilitate regular audits and provide comprehensive reports to ensure ongoing compliance and demonstrate your commitment to security.