[vc_row][vc_column width=”1/1″][uncode_block id=”73267″][/vc_column][/vc_row][vc_row row_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″][vc_column width=”1/1″][vc_empty_space empty_h=”0″ medium_visibility=”yes” mobile_visibility=”yes”][vc_empty_space empty_h=”2″ desktop_visibility=”yes” mobile_visibility=”yes”][vc_empty_space empty_h=”2″ desktop_visibility=”yes” medium_visibility=”yes”][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ mobile_visibility=”yes”][vc_column_inner column_width_percent=”95″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ align_mobile=”align_center_mobile” mobile_width=”0″ css_animation=”top-t-bottom” width=”1/1″][vc_custom_heading text_weight=”900″ separator=”yes” uncode_shortcode_id=”196217″]
Endpoint Protection Shields Your Most
Vulnerable Devices
[/vc_custom_heading][vc_column_text uncode_shortcode_id=”311655″]With the 24/7 pace of business, your employees are increasingly turning to laptops and mobile devices to get work done from home or while traveling. These devices skyrocket your productivity, but they also expose your business network to dangerous threats. Cybercriminals often target relatively unsecured endpoints with the goal of accessing confidential data – forgoing endpoint security renders your network security less effective.
Data Tech Café’s endpoint security service leverages best-in-class endpoint protection tools to identify and deflect unauthorized and potentially malicious attempts to access your data. We simplify the process of device inventory and management, whether devices are provided by the employee or by your company. Additionally, we set up safeguards such as login authentication and deploy remote software upgrades to ensure that your team’s devices are always equipped with the strongest protection available.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes” medium_visibility=”yes”][vc_column_inner column_width_percent=”95″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ align_mobile=”align_center_mobile” mobile_width=”0″ css_animation=”top-t-bottom” width=”1/1″][vc_custom_heading text_weight=”900″ separator=”yes” subheading=”With the 24/7 pace of business, your employees are increasingly turning to laptops and mobile devices to get work done from home or while traveling. These devices skyrocket your productivity, but they also expose your business network to dangerous threats. Cybercriminals often target relatively unsecured endpoints with the goal of accessing confidential data – forgoing endpoint security renders your network security less effective.
Data Tech Café’s endpoint security service leverages best-in-class endpoint protection tools to identify and deflect unauthorized and potentially malicious attempts to access your data. We simplify the process of device inventory and management, whether devices are provided by the employee or by your company. Additionally, we set up safeguards such as login authentication and deploy remote software upgrades to ensure that your team’s devices are always equipped with the strongest protection available.”]
Shield Your Most Vulnerable Devices
[/vc_custom_heading][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”3″ medium_visibility=”yes”][/vc_column][/vc_row][vc_row row_height_percent=”0″ override_padding=”yes” h_padding=”2″ top_padding=”3″ bottom_padding=”3″ back_color=”color-544365″ overlay_color=”color-xsdn” overlay_alpha=”90″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″][vc_column width=”1/1″][vc_row_inner row_inner_height_percent=”0″ back_color=”color-544365″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”3″ shift_y=”0″ z_index=”0″ medium_visibility=”yes” mobile_visibility=”yes” css=”.vc_custom_1588276025180{margin-top: 0px !important;padding-top: 0px !important;}”][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ align_mobile=”align_center_mobile” mobile_width=”0″ css_animation=”left-t-right” width=”2/3″ css=”.vc_custom_1588275973969{padding-top: 0px !important;}”][vc_custom_heading text_color=”color-xsdn” text_size=”h3″ text_weight=”900″ text_space=”fontspace-831432″]
Give your team the power of flexible, secure access to business data and applications.
[/vc_custom_heading][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ align_mobile=”align_center_mobile” mobile_width=”0″ width=”1/3″][vc_button button_color=”color-544365″ size=”btn-xl” radius=”btn-round” hover_fx=”outlined” text_skin=”yes” border_width=”0″ link=”url:tel%3A%2B1-855-836-4745|||” icon=”fa fa-phone”](855) 836-4745[/vc_button][vc_button button_color=”color-349774″ size=”btn-lg” radius=”btn-round” border_width=”0″ link=”url:%2Fcontact|||”]Get Started Today[/vc_button][vc_empty_space empty_h=”2″ desktop_visibility=”yes” medium_visibility=”yes”][/vc_column_inner][/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ back_color=”color-544365″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”3″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes”][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ align_mobile=”align_center_mobile” mobile_width=”0″ css_animation=”left-t-right” width=”1/1″][vc_custom_heading text_color=”color-xsdn” text_size=”h3″ text_weight=”900″ text_space=”fontspace-831432″]
Give your team the power of flexible, secure access to business data and applications.
[/vc_custom_heading][vc_button button_color=”color-544365″ size=”btn-xl” radius=”btn-round” wide=”yes” hover_fx=”outlined” text_skin=”yes” border_width=”0″ link=”url:tel%3A%2B1-855-836-4745|||” icon=”fa fa-phone”](855) 836-4745[/vc_button][vc_button button_color=”color-349774″ size=”btn-lg” radius=”btn-round” wide=”yes” border_width=”0″ link=”url:%2Fcontact|||”]Get Started Today[/vc_button][vc_empty_space empty_h=”0″ desktop_visibility=”yes” mobile_visibility=”yes”][vc_empty_space empty_h=”2″ desktop_visibility=”yes” medium_visibility=”yes”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row row_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″][vc_column column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1/1″][vc_empty_space empty_h=”0″][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ mobile_visibility=”yes” css=”.vc_custom_1562332376188{padding-right: 10% !important;padding-left: 10% !important;}”][vc_column_inner column_width_percent=”81″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ align_medium=”align_center_tablet” medium_width=”4″ mobile_width=”0″ css_animation=”top-t-bottom” width=”1/1″][vc_custom_heading text_weight=”900″ text_space=”fontspace-831432″]Four Reasons to Invest in Endpoint Security Service[/vc_custom_heading][/vc_column_inner][/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes” medium_visibility=”yes”][vc_column_inner column_width_percent=”81″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ align_medium=”align_center_tablet” medium_width=”4″ mobile_width=”0″ css_animation=”top-t-bottom” width=”1/1″][vc_custom_heading text_weight=”900″ text_space=”fontspace-831432″]Four Reasons to Invest in Endpoint Security Service[/vc_custom_heading][/vc_column_inner][/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes” mobile_visibility=”yes”][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ align_medium=”align_center_tablet” medium_width=”2″ mobile_width=”0″ width=”1/1″][vc_single_image media=”73743″ media_width_percent=”20″ alignment=”center”][/vc_column_inner][/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes” medium_visibility=”yes”][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ align_medium=”align_center_tablet” medium_width=”2″ mobile_width=”0″ width=”1/1″][vc_single_image media=”73743″ media_width_percent=”70″ alignment=”center”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row row_height_percent=”0″ back_image=”73743″ back_position=”center center” overlay_color=”color-xsdn” overlay_alpha=”90″ equal_height=”yes” gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ medium_visibility=”yes” mobile_visibility=”yes” back_size=”45%”][vc_column column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1/1″][vc_empty_space empty_h=”2″ desktop_visibility=”yes” mobile_visibility=”yes”][vc_empty_space empty_h=”2″ desktop_visibility=”yes” mobile_visibility=”yes”][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”4″ shift_y=”0″ shift_y_fixed=”yes” z_index=”0″][vc_column_inner column_width_percent=”100″ position_horizontal=”left” align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ expand_height=”yes” overlay_color=”color-xsdn” overlay_alpha=”80″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”left-t-right” radius=”xl” shadow=”xs” width=”1/2″][vc_column_text border_color=”color-202552″ border_style=”initial”]
Greater Protection
If your employees use personal or company-owned mobile devices for work, they expose your network to threats – minimize your risk with endpoint security solutions.[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”80″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”right-t-left” animation_delay=”100″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
Remote Access
Devices such as laptops, tablets and smartphones enable your employees to work from anywhere in the world, any time of the day or night. We help them do it safely.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”2″ mobile_visibility=”yes”][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”4″ shift_y=”-1″ z_index=”0″][vc_column_inner column_width_percent=”85″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”80″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”left-t-right” animation_delay=”300″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
Better Uptime
A threat that reaches your network can bring your operations to a halt. Data Tech Café fortifies your endpoint defenses with the ultimate goal of protecting your systems.[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”80″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”80″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”right-t-left” animation_delay=”200″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
User Training
We facilitate company-wide user adoption by teaching your employees how to access data and applications on their mobile devices while keeping cybercriminals out.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”1″ mobile_visibility=”yes”][/vc_column][/vc_row][vc_row row_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes”][vc_column column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1/1″][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”4″ shift_y=”0″ shift_y_fixed=”yes” z_index=”0″][vc_column_inner column_width_percent=”100″ position_horizontal=”left” align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ expand_height=”yes” overlay_color=”color-xsdn” overlay_alpha=”95″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”left-t-right” radius=”xl” shadow=”xs” width=”1/2″][vc_column_text border_color=”color-202552″ border_style=”initial”]
Greater Protection
If your employees use personal or company-owned mobile devices for work, they expose your network to threats – minimize your risk with endpoint security solutions.[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”95″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”right-t-left” animation_delay=”100″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
Remote Access
Devices such as laptops, tablets and smartphones enable your employees to work from anywhere in the world, any time of the day or night. We help them do it safely.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”2″ mobile_visibility=”yes”][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”4″ shift_y=”-1″ z_index=”0″][vc_column_inner column_width_percent=”85″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”95″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”left-t-right” animation_delay=”300″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
Better Uptime
A threat that reaches your network can bring your operations to a halt. Data Tech Café fortifies your endpoint defenses with the ultimate goal of protecting your systems.[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”85″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”95″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”right-t-left” animation_delay=”200″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
User Training
We facilitate company-wide user adoption by teaching your employees how to access data and applications on their mobile devices while keeping cybercriminals out.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”3″ medium_visibility=”yes” mobile_visibility=”yes”][vc_empty_space empty_h=”3″ desktop_visibility=”yes” mobile_visibility=”yes”][/vc_column][/vc_row][vc_row row_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ medium_visibility=”yes”][vc_column width=”1/1″][vc_empty_space empty_h=”0″ medium_visibility=”yes”][/vc_column][/vc_row][vc_row row_height_percent=”0″ back_color=”color-202552″ overlay_color=”color-xsdn” overlay_alpha=”96″ equal_height=”yes” gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″][vc_column column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1/1″][vc_empty_space empty_h=”1″][vc_row_inner][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”top-t-bottom” width=”1/1″][vc_custom_heading text_weight=”900″ text_space=”fontspace-831432″]Explore Our Other Managed Security Services[/vc_custom_heading][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”2″][vc_row_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ width=”1/3″ css=”.vc_custom_1559058557805{padding-bottom: 50px !important;}”][vc_single_image media=”73777″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fbackup-and-disaster-recovery-solutions%2F|||”][vc_column_text]
Backup and Disaster Recovery
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ animation_delay=”200″ width=”1/3″ css=”.vc_custom_1559058563733{padding-bottom: 50px !important;}”][vc_single_image media=”73772″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fit-compliance-solutions%2F|||”][vc_column_text]
Compliance Solutions
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ animation_delay=”400″ width=”1/3″ css=”.vc_custom_1559058569617{padding-bottom: 50px !important;}”][vc_single_image media=”73773″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Femail-security-solutions%2F|||”][vc_column_text]
Email Security
[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”1″][vc_row_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ width=”1/3″ css=”.vc_custom_1559058557805{padding-bottom: 50px !important;}”][vc_single_image media=”73775″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fnetwork-security-management%2F|||”][vc_column_text]
Network Security
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ animation_delay=”200″ width=”1/3″ css=”.vc_custom_1559058563733{padding-bottom: 50px !important;}”][vc_single_image media=”73775″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fnetwork-security-management%2F|||”][vc_column_text]
Network Security
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ animation_delay=”400″ width=”1/3″ css=”.vc_custom_1559058569617{padding-bottom: 50px !important;}”][vc_single_image media=”73897″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fdark-web-protection%2F|||”][vc_column_text]
Dark Web Protection
[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”1″][vc_row_inner][vc_column_inner column_width_percent=”60″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”1″ mobile_visibility=”yes” mobile_width=”0″ width=”1/6″][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ width=”1/3″ css=”.vc_custom_1559058966177{padding-bottom: 50px !important;}”][vc_single_image media=”73894″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fphishing-and-ransomware-protection-services%2F|||”][vc_column_text]
Phishing and Ransomware Protection
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ animation_delay=”200″ width=”1/3″ css=”.vc_custom_1559058972247{padding-bottom: 50px !important;}”][vc_single_image media=”73895″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fweb-content-filtering-solutions%2F|||”][vc_column_text]
Web Content Filtering
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”1″ mobile_visibility=”yes” mobile_width=”0″ width=”1/6″][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”3″][/vc_column][/vc_row]