[vc_row][vc_column width=”1/1″][uncode_block id=”73267″][/vc_column][/vc_row][vc_row row_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″][vc_column width=”1/1″][vc_empty_space empty_h=”0″ medium_visibility=”yes” mobile_visibility=”yes”][vc_empty_space empty_h=”2″ desktop_visibility=”yes” mobile_visibility=”yes”][vc_empty_space empty_h=”2″ desktop_visibility=”yes” medium_visibility=”yes”][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ mobile_visibility=”yes”][vc_column_inner column_width_percent=”95″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ align_mobile=”align_center_mobile” mobile_width=”0″ css_animation=”top-t-bottom” width=”1/1″][vc_custom_heading text_weight=”900″ separator=”yes” uncode_shortcode_id=”790711″]
Stop Threats Right
Out of the Gate
[/vc_custom_heading][vc_column_text uncode_shortcode_id=”124921″]If your email security solutions consist of sending suspicious emails to your spam folder, you could still be letting dangerous messages through. With cyberattacks growing more and more sophisticated, threats are no longer easy to spot. Consider phishing attacks – emails that appear to come from a legitimate source, sometimes even an executive within your company. To truly protect your employees and organization from email-based attacks, you need a two-pronged strategy: filtering and education.
Data Tech Café deploys best-in-class tools to filter out emails containing spam, malware and dangerous links or attachments. Then we educate your employees on how to spot and report any questionable messages that reach their inboxes. If you’re on the fence about an email, our engineers offer a second pair of eyes to determine whether it comes from a legitimate source.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes” medium_visibility=”yes”][vc_column_inner column_width_percent=”95″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ align_mobile=”align_center_mobile” mobile_width=”0″ css_animation=”top-t-bottom” width=”1/1″][vc_custom_heading text_weight=”900″ separator=”yes” subheading=”If your email security solutions consist of sending suspicious emails to your spam folder, you could still be letting dangerous messages through. With cyberattacks growing more and more sophisticated, threats are no longer easy to spot. Consider phishing attacks – emails that appear to come from a legitimate source, sometimes even an executive within your company. To truly protect your employees and organization from email-based attacks, you need a two-pronged strategy: filtering and education.
Data Tech Café deploys best-in-class tools to filter out emails containing spam, malware and dangerous links or attachments. Then we educate your employees on how to spot and report any questionable messages that reach their inboxes. If you’re on the fence about an email, our engineers offer a second pair of eyes to determine whether it comes from a legitimate source.”]
Stop Threats Right Out of the Gate
[/vc_custom_heading][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”3″ medium_visibility=”yes”][/vc_column][/vc_row][vc_row row_height_percent=”0″ override_padding=”yes” h_padding=”2″ top_padding=”3″ bottom_padding=”3″ back_color=”color-544365″ overlay_color=”color-xsdn” overlay_alpha=”90″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″][vc_column width=”1/1″][vc_row_inner row_inner_height_percent=”0″ back_color=”color-544365″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”3″ shift_y=”0″ z_index=”0″ medium_visibility=”yes” mobile_visibility=”yes”][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ align_mobile=”align_center_mobile” mobile_width=”0″ css_animation=”left-t-right” width=”2/3″][vc_custom_heading text_color=”color-xsdn” text_size=”h3″ text_weight=”900″ text_space=”fontspace-831432″]
Enjoy the business benefits of email communication without the potential dangers.
[/vc_custom_heading][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ align_mobile=”align_center_mobile” mobile_width=”0″ width=”1/3″][vc_button button_color=”color-544365″ size=”btn-xl” radius=”btn-round” hover_fx=”outlined” text_skin=”yes” border_width=”0″ link=”url:tel%3A%2B1-855-836-4745|||” icon=”fa fa-phone”](855) 836-4745[/vc_button][vc_button button_color=”color-349774″ size=”btn-lg” radius=”btn-round” border_width=”0″ link=”url:%2Fcontact|||”]Get Started Today[/vc_button][vc_empty_space empty_h=”2″ desktop_visibility=”yes” medium_visibility=”yes”][/vc_column_inner][/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ back_color=”color-544365″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”3″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes”][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ align_mobile=”align_center_mobile” mobile_width=”0″ css_animation=”left-t-right” width=”1/1″][vc_custom_heading text_color=”color-xsdn” text_size=”h3″ text_weight=”900″ text_space=”fontspace-831432″]
Enjoy the business benefits of email communication without the potential dangers.
[/vc_custom_heading][vc_button button_color=”color-544365″ size=”btn-xl” radius=”btn-round” wide=”yes” hover_fx=”outlined” text_skin=”yes” border_width=”0″ link=”url:tel%3A%2B1-855-836-4745|||” icon=”fa fa-phone”](855) 836-4745[/vc_button][vc_button button_color=”color-349774″ size=”btn-lg” radius=”btn-round” wide=”yes” border_width=”0″ link=”url:%2Fcontact|||”]Get Started Today[/vc_button][vc_empty_space empty_h=”0″ desktop_visibility=”yes” mobile_visibility=”yes”][vc_empty_space empty_h=”2″ desktop_visibility=”yes” medium_visibility=”yes”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row row_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″][vc_column column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1/1″][vc_empty_space empty_h=”0″][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ mobile_visibility=”yes” css=”.vc_custom_1559224104509{padding-right: 20% !important;padding-left: 20% !important;}”][vc_column_inner column_width_percent=”79″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ align_medium=”align_center_tablet” medium_width=”4″ mobile_width=”0″ css_animation=”top-t-bottom” width=”1/1″][vc_custom_heading text_weight=”900″ text_space=”fontspace-831432″]Four Reasons to Invest in Email Security Solutions[/vc_custom_heading][/vc_column_inner][/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes” medium_visibility=”yes”][vc_column_inner column_width_percent=”81″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ align_medium=”align_center_tablet” medium_width=”4″ mobile_width=”0″ css_animation=”top-t-bottom” width=”1/1″][vc_custom_heading text_weight=”900″ text_space=”fontspace-831432″]Four Reasons to Invest in Email Security Solutions[/vc_custom_heading][/vc_column_inner][/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes” mobile_visibility=”yes”][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ align_medium=”align_center_tablet” medium_width=”2″ mobile_width=”0″ width=”1/1″][vc_single_image media=”73743″ media_width_percent=”20″ alignment=”center”][/vc_column_inner][/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes” medium_visibility=”yes”][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ align_medium=”align_center_tablet” medium_width=”2″ mobile_width=”0″ width=”1/1″][vc_single_image media=”73743″ media_width_percent=”70″ alignment=”center”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row row_height_percent=”0″ back_image=”73743″ back_position=”center center” overlay_color=”color-xsdn” overlay_alpha=”90″ equal_height=”yes” gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ medium_visibility=”yes” mobile_visibility=”yes” back_size=”45%”][vc_column column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1/1″][vc_empty_space empty_h=”2″ desktop_visibility=”yes” mobile_visibility=”yes”][vc_empty_space empty_h=”2″ desktop_visibility=”yes” mobile_visibility=”yes”][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”4″ shift_y=”0″ shift_y_fixed=”yes” z_index=”0″][vc_column_inner column_width_percent=”100″ position_horizontal=”left” align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ expand_height=”yes” overlay_color=”color-xsdn” overlay_alpha=”80″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”left-t-right” radius=”xl” shadow=”xs” width=”1/2″][vc_column_text border_color=”color-202552″ border_style=”initial” uncode_shortcode_id=”571497″ border_color_type=”uncode-palette”]
Minimized Downtime
An email containing malware or other malicious software can bring your systems down for hours, or even days. Our email security solutions eliminate threats early to maximize your uptime.[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”80″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”right-t-left” animation_delay=”100″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
Employee Safety
By filtering out the majority of suspicious emails – and teaching your team how to identify and avoid the rest – we protect your employees from making a devastating mistake.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”2″ mobile_visibility=”yes”][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”4″ shift_y=”-1″ z_index=”0″][vc_column_inner column_width_percent=”85″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”80″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”left-t-right” animation_delay=”300″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
Cutting-Edge Tools
Data Tech Café consistently uses the latest versions of the industry’s best anti-spam, anti-malware and antivirus tools to fortify your email security from every angle.[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”80″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”80″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”right-t-left” animation_delay=”200″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
Expert Advice
If you can’t decide whether a message is legitimate, our engineers will take a second look at it to keep your infrastructure protected without eliminating valid opportunities.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”1″ mobile_visibility=”yes”][/vc_column][/vc_row][vc_row row_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes”][vc_column column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1/1″][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”4″ shift_y=”0″ shift_y_fixed=”yes” z_index=”0″][vc_column_inner column_width_percent=”100″ position_horizontal=”left” align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ expand_height=”yes” overlay_color=”color-xsdn” overlay_alpha=”95″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”left-t-right” radius=”xl” shadow=”xs” width=”1/2″][vc_column_text border_color=”color-202552″ border_style=”initial”]
Minimized Downtime
An email containing malware or other malicious software can bring your systems down for hours, or even days. Eliminate threats early to maximize your uptime.[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”95″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”right-t-left” animation_delay=”100″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
Employee Safety
By filtering out the majority of suspicious emails – and teaching your team how to identify and avoid the rest – we protect your employees from making a devastating mistake.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”2″ mobile_visibility=”yes”][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”4″ shift_y=”-1″ z_index=”0″][vc_column_inner column_width_percent=”85″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”95″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”left-t-right” animation_delay=”300″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
Cutting-Edge Tools
Data Tech Café consistently uses the latest versions of the industry’s best anti-spam, anti-malware and antivirus tools to fortify your email security from every angle.[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”85″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”95″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”right-t-left” animation_delay=”200″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
Expert Advice
If you can’t decide whether a message is legitimate, our engineers will take a second look at it to keep your infrastructure protected without eliminating valid opportunities.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”3″ medium_visibility=”yes” mobile_visibility=”yes”][vc_empty_space empty_h=”3″ desktop_visibility=”yes” mobile_visibility=”yes”][/vc_column][/vc_row][vc_row row_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ medium_visibility=”yes”][vc_column width=”1/1″][vc_empty_space empty_h=”0″ medium_visibility=”yes”][/vc_column][/vc_row][vc_row row_height_percent=”0″ back_color=”color-202552″ overlay_color=”color-xsdn” overlay_alpha=”96″ equal_height=”yes” gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″][vc_column column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1/1″][vc_empty_space empty_h=”1″][vc_row_inner][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”top-t-bottom” width=”1/1″][vc_custom_heading text_weight=”900″ text_space=”fontspace-831432″]Explore Our Other Managed Security Services[/vc_custom_heading][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”2″][vc_row_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ width=”1/3″ css=”.vc_custom_1559058220132{padding-bottom: 50px !important;}”][vc_single_image media=”73777″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fbackup-and-disaster-recovery-solutions%2F|||”][vc_column_text]
Backup and Disaster Recovery
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ animation_delay=”200″ width=”1/3″ css=”.vc_custom_1559058231428{padding-bottom: 50px !important;}”][vc_single_image media=”73772″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fit-compliance-solutions%2F|||”][vc_column_text]
Compliance Solutions
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ animation_delay=”400″ width=”1/3″ css=”.vc_custom_1559058236287{padding-bottom: 50px !important;}”][vc_single_image media=”73774″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fendpoint-security-service%2F|||”][vc_column_text]
Endpoint Security
[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”1″][vc_row_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ width=”1/3″ css=”.vc_custom_1559058220132{padding-bottom: 50px !important;}”][vc_single_image media=”73775″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fnetwork-security-management%2F|||”][vc_column_text]
Network Security
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ animation_delay=”200″ width=”1/3″ css=”.vc_custom_1559058231428{padding-bottom: 50px !important;}”][vc_single_image media=”73776″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fwireless-surveillance-system%2F|||”][vc_column_text]
Wireless Surveillance
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ animation_delay=”400″ width=”1/3″ css=”.vc_custom_1559058236287{padding-bottom: 50px !important;}”][vc_single_image media=”73897″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fdark-web-protection%2F|||”][vc_column_text]
Dark Web Protection
[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”1″][vc_row_inner][vc_column_inner column_width_percent=”60″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”1″ mobile_visibility=”yes” mobile_width=”0″ width=”1/6″][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ width=”1/3″ css=”.vc_custom_1559058966177{padding-bottom: 50px !important;}”][vc_single_image media=”73894″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fphishing-and-ransomware-protection-services%2F|||”][vc_column_text]
Phishing and Ransomware Protection
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ animation_delay=”200″ width=”1/3″ css=”.vc_custom_1559058972247{padding-bottom: 50px !important;}”][vc_single_image media=”73895″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fweb-content-filtering-solutions%2F|||”][vc_column_text]
Web Content Filtering
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”1″ mobile_visibility=”yes” mobile_width=”0″ width=”1/6″][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”3″][/vc_column][/vc_row]