[vc_row][vc_column width=”1/1″][uncode_block id=”73267″][/vc_column][/vc_row][vc_row row_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″][vc_column width=”1/1″][vc_empty_space empty_h=”0″ medium_visibility=”yes” mobile_visibility=”yes”][vc_empty_space empty_h=”2″ desktop_visibility=”yes” mobile_visibility=”yes”][vc_empty_space empty_h=”2″ desktop_visibility=”yes” medium_visibility=”yes”][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ mobile_visibility=”yes”][vc_column_inner column_width_percent=”90″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ align_mobile=”align_center_mobile” mobile_width=”0″ css_animation=”top-t-bottom” width=”1/1″][vc_custom_heading text_weight=”900″ separator=”yes” uncode_shortcode_id=”124475″]
Conducting More Business Online
Than Usual?
[/vc_custom_heading][vc_column_text uncode_shortcode_id=”149951″]Everyone knows that a cyberattack can happen at any minute. But when so much is at stake, there are simple steps you can take to protect your business right away. The most obvious way is to make sure that hackers are not able to penetrate your systems through either advanced techniques, human error—or both. With more than 70 years of combined experience, the experts at Data Tech Café know how to respond to cyberthreats and prevent attacks from happening in the first place. We provide top tier phishing prevention and ransomware protection services that elevate your cybersecurity and safeguard you from attacks 24/7.
Get peace of mind with IT solutions that have been developed to specifically address today’s biggest cybersecurity concerns. Our easy and affordable phishing prevention and ransomware protection services are particularly popular given how common these attacks are. Enlisting our help is a proactive step that immediately relieves any anxiety you might have about your devices being infected with malware or compromised in any other way. By enhancing the security of your email, data storage and network security, Data Tech Café empowers companies to run safe operations—either online or in brick-and-mortar establishments—and we are ready to help you defend yourself from cyberattacks both now and in the future.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes” medium_visibility=”yes”][vc_column_inner column_width_percent=”95″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ align_mobile=”align_center_mobile” mobile_width=”0″ css_animation=”top-t-bottom” width=”1/1″][vc_custom_heading text_weight=”900″ separator=”yes” subheading=”Everyone knows that a cyberattack can happen at any minute. But when so much is at stake, there are simple steps you can take to protect your business right away. The most obvious way is to make sure that hackers are not able to penetrate your systems through either advanced techniques, human error—or both. With more than 70 years of combined experience, the experts at Data Tech Café know how to respond to cyberthreats and prevent attacks from happening in the first place. We provide top tier phishing and ransomware protection services that elevate your cybersecurity and safeguard you from attacks 24/7.
Get peace of mind with IT solutions that have been developed to specifically address today’s biggest cybersecurity concerns. Our easy and affordable phishing and ransomware protection services are particularly popular given how common these attacks are. Enlisting our help is a proactive step that immediately relieves any anxiety you might have about your devices being infected with malware or compromised in any other way. By enhancing the security of your email, data storage and network security, Data Tech Café empowers companies to run safe operations—either online or in brick-and-mortar establishments—and we are ready to help you defend yourself from cyberattacks both now and in the future.”]
Conducting More Business Online Than Usual?
[/vc_custom_heading][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”3″ medium_visibility=”yes”][/vc_column][/vc_row][vc_row row_height_percent=”0″ override_padding=”yes” h_padding=”2″ top_padding=”3″ bottom_padding=”3″ back_color=”color-544365″ overlay_color=”color-xsdn” overlay_alpha=”90″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″][vc_column width=”1/1″][vc_row_inner row_inner_height_percent=”0″ back_color=”color-544365″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”3″ shift_y=”0″ z_index=”0″ medium_visibility=”yes” mobile_visibility=”yes”][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ align_mobile=”align_center_mobile” mobile_width=”0″ css_animation=”left-t-right” width=”2/3″][vc_custom_heading text_color=”color-xsdn” text_size=”h3″ text_weight=”900″ text_space=”fontspace-831432″]
Build up your defense with phishing and ransomware protection services
[/vc_custom_heading][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ align_mobile=”align_center_mobile” mobile_width=”0″ width=”1/3″][vc_button button_color=”color-544365″ size=”btn-xl” radius=”btn-round” hover_fx=”outlined” text_skin=”yes” border_width=”0″ link=”url:tel%3A%2B1-855-836-4745|||” icon=”fa fa-phone”](855) 836-4745[/vc_button][vc_button button_color=”color-349774″ size=”btn-lg” radius=”btn-round” border_width=”0″ link=”url:%2Fcontact|||”]Get Started Today[/vc_button][vc_empty_space empty_h=”2″ desktop_visibility=”yes” medium_visibility=”yes”][/vc_column_inner][/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ back_color=”color-544365″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”3″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes”][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ align_mobile=”align_center_mobile” mobile_width=”0″ css_animation=”left-t-right” width=”1/1″][vc_custom_heading text_color=”color-xsdn” text_size=”h3″ text_weight=”900″ text_space=”fontspace-831432″]
Build up your defense with phishing and ransomware protection services
[/vc_custom_heading][vc_button button_color=”color-544365″ size=”btn-xl” radius=”btn-round” wide=”yes” hover_fx=”outlined” text_skin=”yes” border_width=”0″ link=”url:tel%3A%2B1-855-836-4745|||” icon=”fa fa-phone”](855) 836-4745[/vc_button][vc_button button_color=”color-349774″ size=”btn-lg” radius=”btn-round” wide=”yes” border_width=”0″ link=”url:%2Fcontact|||”]Get Started Today[/vc_button][vc_empty_space empty_h=”0″ desktop_visibility=”yes” mobile_visibility=”yes”][vc_empty_space empty_h=”2″ desktop_visibility=”yes” medium_visibility=”yes”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row row_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″][vc_column column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1/1″][vc_empty_space empty_h=”0″][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ mobile_visibility=”yes”][vc_column_inner column_width_percent=”82″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ align_medium=”align_center_tablet” medium_width=”4″ mobile_width=”0″ css_animation=”top-t-bottom” width=”1/1″][vc_custom_heading text_weight=”900″ text_space=”fontspace-831432″]Four Reasons to Invest in Phishing and Ransomware Protection Services[/vc_custom_heading][/vc_column_inner][/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes” medium_visibility=”yes”][vc_column_inner column_width_percent=”81″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ align_medium=”align_center_tablet” medium_width=”4″ mobile_width=”0″ css_animation=”top-t-bottom” width=”1/1″][vc_custom_heading text_weight=”900″ text_space=”fontspace-831432″]Four Reasons to Invest in Phishing and Ransomware Protection Services[/vc_custom_heading][/vc_column_inner][/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes” mobile_visibility=”yes”][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ align_medium=”align_center_tablet” medium_width=”2″ mobile_width=”0″ width=”1/1″][vc_single_image media=”73743″ media_width_percent=”20″ alignment=”center”][/vc_column_inner][/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes” medium_visibility=”yes”][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ align_medium=”align_center_tablet” medium_width=”2″ mobile_width=”0″ width=”1/1″][vc_single_image media=”73743″ media_width_percent=”70″ alignment=”center”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row row_height_percent=”0″ back_image=”73743″ back_position=”center center” overlay_color=”color-xsdn” overlay_alpha=”90″ equal_height=”yes” gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ medium_visibility=”yes” mobile_visibility=”yes” back_size=”45%”][vc_column column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1/1″][vc_empty_space empty_h=”3″ desktop_visibility=”yes” mobile_visibility=”yes”][vc_empty_space empty_h=”3″ desktop_visibility=”yes” mobile_visibility=”yes”][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”4″ shift_y=”1″ shift_y_fixed=”yes” z_index=”0″][vc_column_inner column_width_percent=”100″ position_horizontal=”left” align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ expand_height=”yes” overlay_color=”color-xsdn” overlay_alpha=”80″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”left-t-right” radius=”xl” shadow=”xs” width=”1/2″][vc_column_text border_color=”color-202552″ border_style=”initial”]
Improve Cybersecurity
We can help you identify vulnerabilities, and then provide you with the protection you need to keep devices from being targeted with malware.[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”80″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”right-t-left” animation_delay=”100″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
Avoid Disruptions
Don’t let phishing, ransomware and other cyberattacks distract your employees from their primary responsibilities. Start minimizing downtime without delay.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”2″ mobile_visibility=”yes”][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”4″ shift_y=”-1″ z_index=”0″][vc_column_inner column_width_percent=”85″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”80″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”left-t-right” animation_delay=”300″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
Catch User Error
Don’t fall victim to a scam merely due to human error. Our phishing and ransomware protection services prevent employees from making costly mistakes.[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”80″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”80″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”right-t-left” animation_delay=”200″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
Stay Educated
By consulting with our expert technicians, you’ll stay up-to-date on the latest threats and build the knowledge base you need to manage digital risk during uncertain times.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”1″ mobile_visibility=”yes”][/vc_column][/vc_row][vc_row row_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes”][vc_column column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1/1″][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”4″ shift_y=”0″ shift_y_fixed=”yes” z_index=”0″][vc_column_inner column_width_percent=”100″ position_horizontal=”left” align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ expand_height=”yes” overlay_color=”color-xsdn” overlay_alpha=”95″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”left-t-right” radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
Manage Risk
Anticipating illicit activity is harder when threats are evolving at a breakneck pace. Dark web protection provides the constant monitoring you need.[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”95″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”right-t-left” animation_delay=”100″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
Avoid Disruptions
Don’t let phishing, ransomware and other cyberattacks distract your employees from their primary responsibilities. Start minimizing downtime without delay.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”2″ mobile_visibility=”yes”][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ equal_height=”yes” gutter_size=”4″ shift_y=”-1″ z_index=”0″][vc_column_inner column_width_percent=”85″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”95″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”left-t-right” animation_delay=”300″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
Catch User Error
Don’t fall victim to a scam merely due to human error. Our phishing and ransomware protection services prevent employees from making costly mistakes.[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”85″ align_horizontal=”align_center” gutter_size=”3″ override_padding=”yes” column_padding=”2″ overlay_color=”color-xsdn” overlay_alpha=”95″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”right-t-left” animation_delay=”200″ radius=”xl” shadow=”xs” width=”1/2″][vc_column_text]
Stay Educated
By consulting with our expert technicians, you’ll stay up-to-date on the latest threats and build the knowledge base you need to manage digital risk during uncertain times.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”3″ medium_visibility=”yes” mobile_visibility=”yes”][vc_empty_space empty_h=”3″ desktop_visibility=”yes” mobile_visibility=”yes”][/vc_column][/vc_row][vc_row row_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ medium_visibility=”yes”][vc_column width=”1/1″][vc_empty_space empty_h=”0″ medium_visibility=”yes”][/vc_column][/vc_row][vc_row row_height_percent=”0″ back_color=”color-202552″ overlay_color=”color-xsdn” overlay_alpha=”96″ equal_height=”yes” gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″][vc_column column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1/1″][vc_empty_space empty_h=”1″][vc_row_inner][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ css_animation=”top-t-bottom” width=”1/1″][vc_custom_heading text_weight=”900″ text_space=”fontspace-831432″]Explore Our Other Managed Security Services[/vc_custom_heading][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”2″][vc_row_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ width=”1/3″ css=”.vc_custom_1556915866103{padding-bottom: 50px !important;}”][vc_single_image media=”73777″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fbackup-and-disaster-recovery-solutions%2F|||”][vc_column_text]
Backup and Disaster Recovery
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ animation_delay=”200″ width=”1/3″ css=”.vc_custom_1556915882359{padding-bottom: 50px !important;}”][vc_single_image media=”73772″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fit-compliance-solutions%2F|||”][vc_column_text]
Compliance Solutions
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ animation_delay=”400″ width=”1/3″ css=”.vc_custom_1556915897918{padding-bottom: 50px !important;}”][vc_single_image media=”73773″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Femail-security-solutions%2F|||”][vc_column_text]
Email Security
[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”1″][vc_row_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ width=”1/3″ css=”.vc_custom_1556915866103{padding-bottom: 50px !important;}”][vc_single_image media=”73777″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fbackup-and-disaster-recovery-solutions%2F|||”][vc_column_text]
Backup and Disaster Recovery
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ animation_delay=”200″ width=”1/3″ css=”.vc_custom_1556915882359{padding-bottom: 50px !important;}”][vc_single_image media=”73772″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fit-compliance-solutions%2F|||”][vc_column_text]
Compliance Solutions
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ animation_delay=”400″ width=”1/3″ css=”.vc_custom_1556915897918{padding-bottom: 50px !important;}”][vc_single_image media=”73773″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Femail-security-solutions%2F|||”][vc_column_text]
Email Security
[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”1″][vc_row_inner][vc_column_inner column_width_percent=”60″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”1″ mobile_visibility=”yes” mobile_width=”0″ width=”1/6″][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ width=”1/3″ css=”.vc_custom_1559058966177{padding-bottom: 50px !important;}”][vc_single_image media=”73774″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fendpoint-security-service%2F|||”][vc_column_text]
Endpoint Security
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”3″ mobile_width=”7″ css_animation=”alpha-anim” animation_speed=”200″ animation_delay=”200″ width=”1/3″ css=”.vc_custom_1559058972247{padding-bottom: 50px !important;}”][vc_single_image media=”73775″ media_width_percent=”40″ alignment=”center” media_link=”url:%2Fit-support%2Fmanaged-security-services%2Fnetwork-security-management%2F|||”][vc_column_text]
Network Security
[/vc_column_text][/vc_column_inner][vc_column_inner column_width_percent=”100″ gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”1″ mobile_visibility=”yes” mobile_width=”0″ width=”1/6″][/vc_column_inner][/vc_row_inner][vc_empty_space empty_h=”3″][/vc_column][/vc_row]