Check server response of

Server response
NS records
Whois domain
Response headers
Request headers
Raw HTML code
301 Moved Permanently - rdsec.com
HTTP Status: 301
User-Agent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; [email protected])
Date: Fri, 09 May 2025 12:30:20 GMT
Content-Type: text/html
Content-Length: 167
Connection: keep-alive
Cache-Control: max-age=3600
Expires: Fri, 09 May 2025 13:30:20 GMT
Location: https://rdsec.co
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GkvpL%2FZ%2FuaSEmDuPm4%2Bzwp4JHOMMG527ZlVn4PLe7%2FqsCL6rrx3WV9Mgxu146OnkMVPqSkv2FiVEpPjMQAxfQpvH%2BFaqxYvl%2FQiR7Yy4ySMtHoZA%2FOvpnUAymsskiGhtj8mu7xFOAQ%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 93d1351f1828d912-HEL
server-timing: cfL4;desc="?proto=TCP&rtt=3498&min_rtt=3498&rtt_var=1749&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=165&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"

HTTP Code 301 Moved Permanently

301 Moved Permanently means that the requested resource has been permanently moved to a new URL. All future requests should use the new address.

When is Code 301 used?

  • When changing a website domain
  • When modifying URL structures
  • When setting up redirects for SEO

What does Code 301 mean for the user?

The browser will automatically redirect the user to the new address, and search engines will update their indexes.

200 OK - https://rdsec.co
HTTP Status: 200
User-Agent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; [email protected])
Date: Fri, 09 May 2025 12:30:20 GMT
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
X-Frame-Options: ALLOWALL
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Referrer-Policy: origin
Permissions-Policy: fullscreen=*
Cross-Origin-Resource-Policy: cross-origin
Cross-Origin-Opener-Policy: cross-origin
Cross-Origin-Embedder-Policy: unsafe-none
Strict-Transport-Security: max-age=15552000; includeSubDomains
Content-Security-Policy: default-src * data: blob: http: https: 'self' https://*.durable.co 'unsafe-inline' *.durable.co 'unsafe-eval';
X-Powered-By: Next.js
Cache-Control: private, no-cache, no-store, max-age=0, must-revalidate
Vary: Accept-Encoding
cf-cache-status: DYNAMIC
Set-Cookie: __cflb=02DiuH2r6T5i4sjob6QVCZZ79L4uYcDGc9CoaK6uK3arQ; SameSite=None; Secure; path=/; expires=Sat, 10-May-25 11:30:20 GMT; HttpOnly
Server: cloudflare
CF-RAY: 93d135208c9a8d87-HEL

HTTP Code 200 OK

200 OK is a standard successful HTTP server response. It means that the client’s request (e.g., from a browser) was successfully processed, and the server is delivering the requested data.

When is Code 200 used?

  • When loading a web page
  • When successfully receiving an API response
  • When processing a form or another HTTP request

What does Code 200 mean for the user?

The user receives content without errors, and the page or application functions properly. If Code 200 is accompanied by data, the browser or program processes and displays it to the user.

GET / HTTP/1.1
Host: rdsec.com
Accept: */*
User-Agent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; [email protected])
<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width"/><link rel="icon" href=""/><title>RD Sec: Premier Cyber Security Solutions in Houston, TX</title><meta http-equiv="Content-Language" content="en"/><meta name="keywords" content="cyber security,cybersecurity solutions,Houston cyber security,RD Sec,RD Sec Houston,cyber security business Texas,IT security solutions Houston,network security Houston,cyber protection Houston,cyber threat management Houston,cybersecurity services Texas,Houston IT security,cybersecurity company Houston,cybersecurity experts TX,cyber risk assessment Houston"/><meta name="title" property="og:title" content="RD Sec: Premier Cyber Security Solutions in Houston, TX"/><meta name="twitter:title" content="RD Sec: Premier Cyber Security Solutions in Houston, TX"/><meta property="og:type" content="website"/><meta name="twitter:card" content="summary"/><meta property="og:url" content="https://rdsec.co/"/><meta name="description" property="og:description" content="RD Sec provides leading cyber security solutions in Houston, TX. Protect your business with our advanced security services. Contact us today to secure your data."/><meta name="twitter:description" content="RD Sec provides leading cyber security solutions in Houston, TX. Protect your business with our advanced security services. Contact us today to secure your data."/><meta name="image" property="og:image" content="https://cdn.durable.co/getty/3aDiexJ6oh3QwQZI7EG5E7dKuTkDyetrv9u9bRU8QQce1Djguh3M4ix1AmR3FpYU.jpeg"/><meta name="twitter:image" content="https://cdn.durable.co/getty/3aDiexJ6oh3QwQZI7EG5E7dKuTkDyetrv9u9bRU8QQce1Djguh3M4ix1AmR3FpYU.jpeg"/><meta name="robots" content="all"/><meta http-equiv="content-language" content="en"/><meta name="next-head-count" content="17"/><link rel="preload" href="/_next/static/css/3a3eb9bc00ba47b4.css" as="style"/><link rel="stylesheet" href="/_next/static/css/3a3eb9bc00ba47b4.css" data-n-g=""/><link rel="preload" href="/_next/static/css/6ad5f70cb56137d7.css" as="style"/><link rel="stylesheet" href="/_next/static/css/6ad5f70cb56137d7.css" data-n-p=""/><link rel="preload" href="/_next/static/css/26a1a5c22ee4e247.css" as="style"/><link rel="stylesheet" href="/_next/static/css/26a1a5c22ee4e247.css"/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js"></script><script defer="" src="/_next/static/chunks/2258.2378eb10d861c9f0.js"></script><script defer="" src="/_next/static/chunks/866.2118f9e639af3dc7.js"></script><script defer="" src="/_next/static/chunks/6383.0f35b7b0ab4f12c2.js"></script><script defer="" src="/_next/static/chunks/94726e6d.7f2b3b7a2ac48163.js"></script><script defer="" src="/_next/static/chunks/4715.f9edd631f6d53dab.js"></script><script defer="" src="/_next/static/chunks/925.5b22221ec9c1874e.js"></script><script defer="" src="/_next/static/chunks/9910.e25620111f3f0711.js"></script><script defer="" src="/_next/static/chunks/2289.c1d44654c112c839.js"></script><script defer="" src="/_next/static/chunks/120-9aa0e12b8112f0af.js"></script><script defer="" src="/_next/static/chunks/4379-b9e61b372aa1a00f.js"></script><script defer="" src="/_next/static/chunks/1552.4d8970a13190fe46.js"></script><script src="/_next/static/chunks/webpack-211ad179f18f1707.js" defer=""></script><script src="/_next/static/chunks/framework-d805b48c0466ba30.js" defer=""></script><script src="/_next/static/chunks/main-d23a437884bebb8d.js" defer=""></script><script src="/_next/static/chunks/pages/_app-e4dda47183cac0dc.js" defer=""></script><script src="/_next/static/chunks/3891-a027cc9a7eda0a66.js" defer=""></script><script src="/_next/static/chunks/1942-d53d32d7d6bdb797.js" defer=""></script><script src="/_next/static/chunks/pages/%5B%5B...slug%5D%5D-625d848c42cf764e.js" defer=""></script><script src="/_next/static/ZEoysBzbQXY3XeUfn60yS/_buildManifest.js" defer=""></script><script src="/_next/static/ZEoysBzbQXY3XeUfn60yS/_ssgManifest.js" defer=""></script></head><body class="overflow-x-hidden"><div id="__next" data-reactroot=""><style>
    #nprogress {
      pointer-events: none;
    }
    #nprogress .bar {
      background: #3E990A;
      position: fixed;
      z-index: 9999;
      top: 0;
      left: 0;
      width: 100%;
      height: 3px;
    }
    #nprogress .peg {
      display: block;
      position: absolute;
      right: 0px;
      width: 100px;
      height: 100%;
      box-shadow: 0 0 10px #3E990A, 0 0 5px #3E990A;
      opacity: 1;
      -webkit-transform: rotate(3deg) translate(0px, -4px);
      -ms-transform: rotate(3deg) translate(0px, -4px);
      transform: rotate(3deg) translate(0px, -4px);
    }
    #nprogress .spinner {
      display: block;
      position: fixed;
      z-index: 1031;
      top: 15px;
      right: 15px;
    }
    #nprogress .spinner-icon {
      width: 18px;
      height: 18px;
      box-sizing: border-box;
      border: solid 2px transparent;
      border-top-color: #3E990A;
      border-left-color: #3E990A;
      border-radius: 50%;
      -webkit-animation: nprogresss-spinner 400ms linear infinite;
      animation: nprogress-spinner 400ms linear infinite;
    }
    .nprogress-custom-parent {
      overflow: hidden;
      position: relative;
    }
    .nprogress-custom-parent #nprogress .spinner,
    .nprogress-custom-parent #nprogress .bar {
      position: absolute;
    }
    @-webkit-keyframes nprogress-spinner {
      0% {
        -webkit-transform: rotate(0deg);
      }
      100% {
        -webkit-transform: rotate(360deg);
      }
    }
    @keyframes nprogress-spinner {
      0% {
        transform: rotate(0deg);
      }
      100% {
        transform: rotate(360deg);
      }
    }
  </style><div id="main-body" class="flex flex-col h-full overflow-y-auto overflow-x-hidden smooth-scroll transition-all"><header id="website-header" class="!z-[2000] transition-colors duration-300" style="background-color:#FFFFFF;color:#000000"><div class="relative z-10 grid items-center lg:gap-6 xl:gap-10 mx-auto pt-4 pb-4 container" style="grid-template-columns:1fr auto 1fr"><div class="lg:w-auto whitespace-nowrap"><ul class="lg:flex items-center gap-x-4 gap-y-2 flex-wrap hidden"><li><a target="_blank" href="https://linkedin.com/company/rd-sec"><div class="flex justify-center items-center w-10 h-10 rounded-md" style="background-color:#000000;border-color:#000000"><svg xmlns="http://www.w3.org/2000/svg" fill="currentColor" viewBox="0 0 24 24" width="24" height="24" class="w-7 h-7" style="color:#FFFFFF"><path fill-rule="evenodd" d="M19.5565 2C20.9051 2 22 3.09492 22 4.44352V19.5565C22 20.9051 20.9051 22 19.5565 22H4.44352C3.09492 22 2 20.9051 2 19.5565V4.44352C2 3.09492 3.09488 2 4.44352 2H19.5565ZM8.26801 18.5343V9.71723H5.33676v8.81707h2.93125Zm10.56789 0v-5.0562c0-2.7083-1.446-3.96822-3.3742-3.96822-1.5549 0-2.2513.85512-2.6413 1.45572V9.71723H9.88988c.03887.82737 0 8.81707 0 8.81707h2.93052v-4.9241c0-.2636.0189-.527.0966-.7154.2115-.5264.694-1.0716 1.5037-1.0716 1.0599 0 1.4846.8088 1.4846 1.9936v4.7175h2.9306ZM6.82219 5.4657c-1.00289 0-1.65813.65934-1.65813 1.52352 0 .84601.63532 1.52351 1.61934 1.52351 1.02207 0 1.67719-.6775 1.67719-1.52351-.01895-.86297-.63442-1.52164-1.6384-1.52352Z" clip-rule="evenodd"></path></svg></div></a></li></ul></div><div class="flex-1 flex flex-col items-center gap-4 whitespace-nowrap"><div class="flex flex-col items-center justify-center gap-4 w-full"><a class="max-w-full overflow-hidden grid" target="_self" href="/"><img class="hidden lg:block transition-all object-contain" src="https://cdn.durable.co/blocks/21OzaldofBx9itzs9x5F5oCduanVxV0GM6tu1VHGVW7dkhJ9Rr5PKTntTgj7zDum.png" alt="RD Sec" style="height:97px"/><img class="lg:hidden transition-all object-contain" src="https://cdn.durable.co/blocks/21OzaldofBx9itzs9x5F5oCduanVxV0GM6tu1VHGVW7dkhJ9Rr5PKTntTgj7zDum.png" alt="RD Sec" style="height:41px"/></a></div><ul class="hidden items-center flex-wrap lg:flex justify-center gap-x-6" style="color:#000000"><li class="border-b-2" style="border-color:#000000;background-color:transparent;color:currentColor"><a class="block body-normal whitespace-nowrap py-1.5" target="_self" href="/">HOME</a></li><li class="border-b-2" style="border-color:transparent;background-color:transparent;color:currentColor"><a class="block body-normal whitespace-nowrap py-1.5" target="_self" href="/partners-2">PARTNERS</a></li></ul></div><div class="flex justify-end whitespace-nowrap"><div class="ml-auto lg:hidden"><button class="inline-flex items-center justify-center p-2 rounded-md focus:outline-none transition-colors duration-300" style="color:#000000"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20" fill="currentColor" aria-hidden="true" data-slot="icon" class="block h-5 w-5"><path fill-rule="evenodd" d="M2 4.75A.75.75 0 0 1 2.75 4h14.5a.75.75 0 0 1 0 1.5H2.75A.75.75 0 0 1 2 4.75ZM2 10a.75.75 0 0 1 .75-.75h14.5a.75.75 0 0 1 0 1.5H2.75A.75.75 0 0 1 2 10Zm0 5.25a.75.75 0 0 1 .75-.75h14.5a.75.75 0 0 1 0 1.5H2.75a.75.75 0 0 1-.75-.75Z" clip-rule="evenodd"></path></svg></button></div></div></div></header><section class="relative"><div id="677c50e9d1076c349f822b23" data-text-color="transparent" class="flex relative break-word items-end" style="margin-top:-0px;padding-top:0px;z-index:39;min-height:calc(100vh - 0px)" data-combine-with-header="true"><div class="w-full flex break-word transition-all duration-300 items-end"><div class="relative z-10 container mx-auto px-5 md:px-6 transition-all duration-300 pt-0 pb-8 lg:pb-32"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500  opacity-0 translate-y-8 relative z-10 w-full h-full"><div class="flex w-full gap-10 lg:gap-20 transition-all duration-300 flex-col lg:flex-row justify-start"><div class="flex-1 flex flex-col gap-4 w-full max-w-3xl items-start"><h1 class="break-word heading-xlarge" style="color:transparent">Defend. Protect. Prevail.</h1><pre class="body-large" style="color:transparent">Affordable, Reliable, and High-End Cybersecurity Solutions to Protect What Matters Most.</pre></div></div></div></div></div></div><svg class="absolute bottom-0 left-0 z-50 overflow-visible" fill="transparent" width="0" height="3" viewBox="0 0 0 3"><path d="M0 3H0" stroke="#FFFFFF" stroke-width="3"></path></svg></section><section class="relative"><div id="677c502fd1076c349f822b1d" class="flex flex-none flex-shrink-0 relative break-word items-center" style="min-height:0px;z-index:38"><div class="relative z-10 container mx-auto pt-8 lg:pt-12 pb-0"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500  opacity-0 translate-y-8"><div class="rich-text-block max-w-5xl text-undefined mx-auto" style="color:#000000"><h2 style="white-space:pre-line">Our Mission</h2>
<p>We're security experts who take a hands-on, consultative approach with our clients. We design cutting-edge solutions to shield you from the latest threats, educating you every step of the way. Our custom-tailored architecture delivers rock-solid protection you can count on.</p>
<p>Our unparalleled expertise is your biggest advantage. We'll be by your side, ensuring you get the highest level of support and the best possible safeguards for your business.</p></div></div></div><svg class="absolute bottom-0 left-0" width="0" height="0" viewBox="0 0 0 0"><clipPath id="677c502fd1076c349f822b1d-swoopLeft"><rect width="0" height="0" fill="transparent"></rect><path d="M0 0C0 0 0 0 0 0H0V0" transform="translate(0, 0)" fill="transparent"></path></clipPath></svg></div></section><section class="relative"><div id="67bcd7d1ece7ac288296a5d6" class="flex flex-none flex-shrink-0 relative break-word items-center" style="min-height:calc(0px - 0px);z-index:37"><div class="relative z-10 container mx-auto pt-0 pb-8 lg:pb-12"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500  opacity-0 translate-y-8 flex w-full gap-10 lg:gap-20 flex-col-reverse lg:flex-row-reverse items-center"><div class="flex-1 flex flex-col max-w-240 items-start"><div class="rich-text-block" style="color:#000000"><p style="text-align:left"> </p>
<h2 style="white-space:pre-line;text-align:left">OUR VALUES</h2></div></div><div class="flex-1 flex w-full h-full justify-center lg:justify-start"><div class="flex-shrink-0 relative w-full h-full mx-auto aspect-w-16 aspect-h-9"><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:absolute;top:0;left:0;bottom:0;right:0"><img alt="" title="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="fill" class="" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover;object-position:center center"/><noscript><img alt="" title="" sizes="200vw" srcSet="/_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fblocks%2F2mlgvybBz5VVOs1U4X7JwiMfe6qwXZ1nDwfjr7cuORHRwgqkDxHkJ6mDsx7TfC3F.jpg&amp;w=480&amp;q=90 480w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fblocks%2F2mlgvybBz5VVOs1U4X7JwiMfe6qwXZ1nDwfjr7cuORHRwgqkDxHkJ6mDsx7TfC3F.jpg&amp;w=640&amp;q=90 640w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fblocks%2F2mlgvybBz5VVOs1U4X7JwiMfe6qwXZ1nDwfjr7cuORHRwgqkDxHkJ6mDsx7TfC3F.jpg&amp;w=768&amp;q=90 768w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fblocks%2F2mlgvybBz5VVOs1U4X7JwiMfe6qwXZ1nDwfjr7cuORHRwgqkDxHkJ6mDsx7TfC3F.jpg&amp;w=1080&amp;q=90 1080w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fblocks%2F2mlgvybBz5VVOs1U4X7JwiMfe6qwXZ1nDwfjr7cuORHRwgqkDxHkJ6mDsx7TfC3F.jpg&amp;w=1200&amp;q=90 1200w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fblocks%2F2mlgvybBz5VVOs1U4X7JwiMfe6qwXZ1nDwfjr7cuORHRwgqkDxHkJ6mDsx7TfC3F.jpg&amp;w=1920&amp;q=90 1920w" src="/_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fblocks%2F2mlgvybBz5VVOs1U4X7JwiMfe6qwXZ1nDwfjr7cuORHRwgqkDxHkJ6mDsx7TfC3F.jpg&amp;w=1920&amp;q=90" decoding="async" data-nimg="fill" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover;object-position:center center" class="" loading="lazy"/></noscript></span></div></div></div></div><svg class="absolute bottom-0 left-0" width="0" height="0" viewBox="0 0 0 0"><clipPath id="67bcd7d1ece7ac288296a5d6-slantLeft"><rect width="0" height="0" fill="transparent"></rect><path d="M0 0L-0 0V0H0" transform="translate(0, 0)" fill="transparent"></path></clipPath></svg></div></section><section class="relative"><div id="677c502bd1076c349f822b19" class="flex flex-none relative items-center" style="min-height:calc(0px - 0px);z-index:36"><div class="relative z-10 w-full pt-12 lg:pt-20 pb-12 lg:pb-20"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500  opacity-0 translate-y-8"><div class="flex gap-x-6 gap-y-12 flex-col"><div class="flex-1 px-5 md:px-6"><div class="flex overflow-hidden w-full" style="-webkit-mask:linear-gradient(90deg, transparent, white 5% 95%, transparent);mask:linear-gradient(90deg, transparent, white 5% 95%, transparent)"><div class="flex flex-wrap items-center w-full gap-20" style="min-width:max-content"><div class="relative flex flex-shrink-0 w-auto transition-all rounded-2xl md:rounded-3xl lg:rounded-4xl h-12 md:h-16 mr-20"><img class="h-full transition-all duration-300" src="https://cdn.durable.co/blocks/32m8unshYA5fqJfwrLp6V9DfBgD2HFuZSiyZZFQaQbfqiiYi28tEukOU9Bddvrs2.png" alt=""/></div><div class="relative flex flex-shrink-0 w-auto transition-all rounded-2xl md:rounded-3xl lg:rounded-4xl h-12 md:h-16 mr-20"><img class="h-full transition-all duration-300" src="https://cdn.durable.co/blocks/1avXAMqKUeGDjeDJnMo90IgUj9jtDKzQloh0KNgeMTUwdIhLPL5HodTZIFCUg6WR.png" alt=""/></div><div class="relative flex flex-shrink-0 w-auto transition-all rounded-2xl md:rounded-3xl lg:rounded-4xl h-12 md:h-16 mr-20"><img class="h-full transition-all duration-300" src="https://cdn.durable.co/blocks/23DOO60P0zirjhHXt38zXcuFHhYCtqoHReYBMwZqaF6NyvQr84mLLhi58424liKI.png" alt=""/></div><div class="relative flex flex-shrink-0 w-auto transition-all rounded-2xl md:rounded-3xl lg:rounded-4xl h-12 md:h-16 mr-20"><img class="h-full transition-all duration-300" src="https://cdn.durable.co/blocks/3bl1QA9D1i0Vz4vKv2vpdIsUGp1dVZ1xOTno20xf6X2eBmmVFYCmDcZagrShheqa.png" alt=""/></div><div class="relative flex flex-shrink-0 w-auto transition-all rounded-2xl md:rounded-3xl lg:rounded-4xl h-12 md:h-16 mr-20"><img class="h-full transition-all duration-300" src="https://cdn.durable.co/blocks/dOHC2EpEyYL3c6kPKOaMZz6VWEETLoey2uPkWoHP5Ol0bB1UKOXthSSRDzxwkAEu.png" alt=""/></div><div class="relative flex flex-shrink-0 w-auto transition-all rounded-2xl md:rounded-3xl lg:rounded-4xl h-12 md:h-16 mr-20"><img class="h-full transition-all duration-300" src="https://cdn.durable.co/blocks/254Z0CBhxNxmL8AAsN2BMtoQfqlpZ7t7UinacoDCEvnKm12waLSrf0f1MydVyTVJ.png" alt=""/></div><div class="relative flex flex-shrink-0 w-auto transition-all rounded-2xl md:rounded-3xl lg:rounded-4xl h-12 md:h-16 mr-20"><img class="h-full transition-all duration-300" src="https://cdn.durable.co/blocks/16BIndYIcAsTBDVlRdMU2YXQ33K7540pY59qGo1fbeZoQxnHpDw4Xa73ePnQzH42.png" alt=""/></div><div class="relative flex flex-shrink-0 w-auto transition-all rounded-2xl md:rounded-3xl lg:rounded-4xl h-12 md:h-16 mr-20"><img class="h-full transition-all duration-300" src="https://cdn.durable.co/blocks/1fBI37DkbfGjtu6RgqRViCZaeCzZeVYAOVUGmeMNMcXbm3LFfZgXY8I1apcOWv8e.png" alt=""/></div><div class="relative flex flex-shrink-0 w-auto transition-all rounded-2xl md:rounded-3xl lg:rounded-4xl h-12 md:h-16 mr-20"><img class="h-full transition-all duration-300" src="https://cdn.durable.co/blocks/15pFWknfGBkx9q807d7djuToWyLd14yGqt1vw5F0MCiDx8b5GC7Unbgf3n6AzNFg.png" alt=""/></div><div class="relative flex flex-shrink-0 w-auto transition-all rounded-2xl md:rounded-3xl lg:rounded-4xl h-12 md:h-16 mr-20"><img class="h-full transition-all duration-300" src="https://cdn.durable.co/blocks/2cjD9ZOIhcpd75scDPnlRUoczRKsKJ9JhqjSRt0TUXYstwLSjcIFSPVo76ye4EIR.png" alt=""/></div><div class="relative flex flex-shrink-0 w-auto transition-all rounded-2xl md:rounded-3xl lg:rounded-4xl h-12 md:h-16 mr-20"><img class="h-full transition-all duration-300" src="https://cdn.durable.co/blocks/0cTzByOfsQlhAdPqcn5XV3X11iUYlcvNaWaRd70fCR67FD8fO712FmsieXYlGOVp.png" alt=""/></div><div class="relative flex flex-shrink-0 w-auto transition-all rounded-2xl md:rounded-3xl lg:rounded-4xl h-12 md:h-16 mr-20"><img class="h-full transition-all duration-300" src="https://cdn.durable.co/blocks/16mN3VPVZHHwDnC8rbIVm09rZBGDQQHodySV997Wd7LCDgGldI98ilGT3tWPIAjR.png" alt=""/></div></div></div></div></div></div></div><svg class="absolute bottom-0 left-0" width="0" height="0" viewBox="0 0 0 0"><clipPath id="677c502bd1076c349f822b19-swoopRight"><rect width="0" height="0" fill="transparent"></rect><path d="M0 0C0 0 0 0 0 0H0V0" transform="translate(0, 0)" fill="transparent"></path></clipPath></svg></div></section><section class="relative"><div id="67bcdf18ece7ac288296a5e7" class="relative flex flex-none flex-shrink-0 break-word items-center" style="min-height:calc(0px - 0px);z-index:35"><div class="relative z-10 container mx-auto pt-12 lg:pt-20 pb-12 lg:pb-20"><div><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500  opacity-0 translate-y-8 flex flex-col gap-4 mb-6 items-center text-center mx-auto"><h2 class="break-word heading-large block w-full mx-auto" style="color:#000000">Strategic Services</h2><pre class="body-normal block w-full mx-auto" style="color:#000000">Proactively defending your business with tailored security strategies, advanced threat intelligence, and risk-driven solutions to stay ahead of cyber threats.
</pre></div><div class="flex flex-wrap relative justify-center"><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-100 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"><div class=""><div class="flex-shrink-0 relative transition-all duration-300 w-12 h-12 mx-auto"><div class="absolute w-full h-full" style="color:#000000;background-color:#960000;-webkit-mask-image:url(&quot;https://static.thenounproject.com/png/126839-200.png&quot;);mask-image:url(&quot;https://static.thenounproject.com/png/126839-200.png&quot;);-webkit-mask-position:center;mask-position:center;-webkit-mask-repeat:no-repeat;mask-repeat:no-repeat;-webkit-mask-size:contain;mask-size:contain"></div></div></div></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Comprehensive Security Assessments</p><div class="rich-text-block mx-auto" style="color:currentColor"><p>Our team of cybersecurity experts conduct thorough evaluations to uncover vulnerabilities and analyze risks. We'll develop customized strategies to fortify your defenses and keep you resilient against evolving threats.</p></div></div></div></div></div></div></div><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-200 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"><div class=""><div class="flex-shrink-0 relative transition-all duration-300 w-12 h-12 mx-auto"><div class="absolute w-full h-full" style="color:#000000;background-color:#960000;-webkit-mask-image:url(&quot;https://static.thenounproject.com/png/805835-200.png&quot;);mask-image:url(&quot;https://static.thenounproject.com/png/805835-200.png&quot;);-webkit-mask-position:center;mask-position:center;-webkit-mask-repeat:no-repeat;mask-repeat:no-repeat;-webkit-mask-size:contain;mask-size:contain"></div></div></div></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Regulatory Compliance Support</p><div class="rich-text-block mx-auto" style="color:currentColor"><p>Navigating complex compliance requirements like ITAR and SOX can be challenging. We'll guide you every step of the way, ensuring your organization meets all necessary standards.</p></div></div></div></div></div></div></div><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-300 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"><div class=""><div class="flex-shrink-0 relative transition-all duration-300 w-12 h-12 mx-auto"><div class="absolute w-full h-full" style="color:#000000;background-color:#960000;-webkit-mask-image:url(&quot;https://static.thenounproject.com/png/153546-200.png&quot;);mask-image:url(&quot;https://static.thenounproject.com/png/153546-200.png&quot;);-webkit-mask-position:center;mask-position:center;-webkit-mask-repeat:no-repeat;mask-repeat:no-repeat;-webkit-mask-size:contain;mask-size:contain"></div></div></div></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Strategic Security Leadership</p><div class="rich-text-block mx-auto" style="color:currentColor"><p>Our virtual CISO service provides the high-level security expertise you need to align your cybersecurity initiatives with your broader business goals. Let us help you maximize the value of your security investments.</p></div></div></div></div></div></div></div></div></div></div><svg class="absolute bottom-0 left-0" width="0" height="0" viewBox="0 0 0 0"><clipPath id="67bcdf18ece7ac288296a5e7-pointUp"><rect width="0" height="0" fill="transparent"></rect><path d="M0 0V0L0 0L0 0L0 0V0H0" transform="translate(0, 0)" fill="transparent"></path></clipPath></svg></div></section><section class="relative"><div id="67bcdbdeece7ac288296a5e5" class="relative flex flex-none flex-shrink-0 break-word items-center" style="min-height:calc(0px - 0px);z-index:34"><div class="relative z-10 container mx-auto pt-12 lg:pt-20 pb-12 lg:pb-20"><div><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500  opacity-0 translate-y-8 flex flex-col gap-4 mb-6 items-center text-center mx-auto"><h2 class="break-word heading-large block w-full mx-auto" style="color:#000000">Security thought leadership, every step of the way</h2><pre class="body-normal block w-full mx-auto" style="color:#000000">Delivering end-to-end solutions—from strategy to execution—to design, implement, and sustain secure, high-performance IT environments.

</pre></div><div class="flex flex-wrap relative justify-center"><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-100 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Security Architecture</p><div class="rich-text-block mx-auto" style="color:currentColor"><p style="text-align: left;">Robust security infrastructure solutions designed to meet your unique needs.<br /><br />•Security Architecture &amp; Design: We craft custom security blueprints tailored to your specific environment and threat landscape.<br /><br />•Security Assessments &amp; Audits: Proactive identification of vulnerabilities and weaknesses before they can be exploited.</p></div></div></div></div></div></div></div><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-200 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Project Implementation</p><div class="rich-text-block mx-auto" style="color:currentColor"><p style="text-align: left;">Seamless deployment of your customized security solutions.<br /><br />•Expert Deployment: Our skilled professionals ensure smooth integration with minimal disruption.<br /><br />•Efficient Execution: We prioritize effective delivery and optimal performance.<br /><br />•Enhanced Confidence: Empowering your organization with a stronger, more resilient cybersecurity posture.</p></div></div></div></div></div></div></div><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-300 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Post Implementation Support</p><div class="rich-text-block mx-auto" style="color:currentColor"><p>Ongoing maintenance and expert assistance.<br /><br />•Proactive Monitoring: Continuous vigilance against emerging threats.<br /><br />•Responsive Support: Timely resolution of issues and quick response to incidents.</p></div></div></div></div></div></div></div></div></div></div></div></section><section class="relative"><div id="67bce2f9ece7ac288296a5e8" data-text-color="#000000" class="flex relative break-word items-start" style="z-index:33;min-height:calc(0px - 0px)" data-combine-with-header="false"><div class="flex w-full break-word items-start"><div class="relative z-10 container mx-auto px-5 md:px-6 transition-all duration-300 pt-20 lg:pt-48 pb-20 lg:pb-48"><div><div class="flex flex-col gap-4 w-full max-w-2xl items-end text-right ml-auto"></div></div></div></div></div></section><section class="relative"><div id="67be267dfe79b99307a1f7d8" class="relative flex flex-none flex-shrink-0 break-word items-center" style="min-height:calc(0px - 0px);z-index:32"><div class="relative z-10 container mx-auto pt-8 lg:pt-12 pb-8 lg:pb-12"><div><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500  opacity-0 translate-y-8 flex flex-col gap-4 mb-6 items-center text-center mx-auto"><h2 class="break-word heading-large block w-full mx-auto" style="color:#000000">Operate Securely</h2><pre class="body-normal block w-full mx-auto" style="color:#000000">Ensuring continuous threat detection, rapid response, and resilience for your business.
</pre></div><div class="flex flex-wrap relative justify-center"><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl opacity-0"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-100 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl justify-center" style="background-color:rgba(0,0,0,0.8)"><div><div class="flex-shrink-0 relative overflow-hidden aspect-w-16 aspect-h-9 rounded-2xl md:rounded-3xl lg:rounded-4xl" style="min-height:0px"><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:absolute;top:0;left:0;bottom:0;right:0"><img alt="Lock. Data  Concept" title="Lock. Data  Concept" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="fill" class="" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover;object-position:center center"/><noscript><img alt="Lock. Data  Concept" title="Lock. Data  Concept" sizes="200vw" srcSet="/_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F276qykSPKLwOo9pcI2CZIrWhogaTX647lL1NB1cPzyPVNat4LvXZi93Le5dDrMjC.jpeg&amp;w=480&amp;q=90 480w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F276qykSPKLwOo9pcI2CZIrWhogaTX647lL1NB1cPzyPVNat4LvXZi93Le5dDrMjC.jpeg&amp;w=640&amp;q=90 640w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F276qykSPKLwOo9pcI2CZIrWhogaTX647lL1NB1cPzyPVNat4LvXZi93Le5dDrMjC.jpeg&amp;w=768&amp;q=90 768w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F276qykSPKLwOo9pcI2CZIrWhogaTX647lL1NB1cPzyPVNat4LvXZi93Le5dDrMjC.jpeg&amp;w=1080&amp;q=90 1080w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F276qykSPKLwOo9pcI2CZIrWhogaTX647lL1NB1cPzyPVNat4LvXZi93Le5dDrMjC.jpeg&amp;w=1200&amp;q=90 1200w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F276qykSPKLwOo9pcI2CZIrWhogaTX647lL1NB1cPzyPVNat4LvXZi93Le5dDrMjC.jpeg&amp;w=1920&amp;q=90 1920w" src="/_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F276qykSPKLwOo9pcI2CZIrWhogaTX647lL1NB1cPzyPVNat4LvXZi93Le5dDrMjC.jpeg&amp;w=1920&amp;q=90" decoding="async" data-nimg="fill" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover;object-position:center center" class="" loading="lazy"/></noscript></span></div><div class="flex flex-row items-center justify-center"></div><div class="flex flex-col absolute w-full h-full top-0 left-0 justify-center" style="background-color:rgba(0,0,0,0.8);min-height:0px"><div class="flex flex-col items-center text-center mx-auto p-10 justify-center" style="color:#FFFFFF"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Security Operations</p><div class="rich-text-block mx-auto" style="color:currentColor"><p class="small" style="text-align: center;">Comprehensive support for your daily security needs.<br /><br />•Maintenance &amp; Updates: Regular maintenance and timely updates to keep your systems secure.<br />•Proactive Threat Mitigation: We actively work to prevent breaches and attacks.<br />•System Overhauls: We provide comprehensive overhauls to modernize and enhance your security infrastructure when needed.</p></div></div></div></div></div></div></div><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl opacity-0"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-200 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl justify-center" style="background-color:rgba(0,0,0,0.8)"><div><div class="flex-shrink-0 relative overflow-hidden aspect-w-16 aspect-h-9 rounded-2xl md:rounded-3xl lg:rounded-4xl" style="min-height:0px"><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:absolute;top:0;left:0;bottom:0;right:0"><img alt="Shot of two technicians using a digital tablet while working in a server room" title="Shot of two technicians using a digital tablet while working in a server room" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="fill" class="" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover;object-position:center center"/><noscript><img alt="Shot of two technicians using a digital tablet while working in a server room" title="Shot of two technicians using a digital tablet while working in a server room" sizes="200vw" srcSet="/_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F1atyukw0odVDS5Ga6dvjuwJnqsBDiKD7uqMtT3pIpdPsJhBvr0qM96p4f5a1cOEW.jpeg&amp;w=480&amp;q=90 480w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F1atyukw0odVDS5Ga6dvjuwJnqsBDiKD7uqMtT3pIpdPsJhBvr0qM96p4f5a1cOEW.jpeg&amp;w=640&amp;q=90 640w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F1atyukw0odVDS5Ga6dvjuwJnqsBDiKD7uqMtT3pIpdPsJhBvr0qM96p4f5a1cOEW.jpeg&amp;w=768&amp;q=90 768w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F1atyukw0odVDS5Ga6dvjuwJnqsBDiKD7uqMtT3pIpdPsJhBvr0qM96p4f5a1cOEW.jpeg&amp;w=1080&amp;q=90 1080w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F1atyukw0odVDS5Ga6dvjuwJnqsBDiKD7uqMtT3pIpdPsJhBvr0qM96p4f5a1cOEW.jpeg&amp;w=1200&amp;q=90 1200w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F1atyukw0odVDS5Ga6dvjuwJnqsBDiKD7uqMtT3pIpdPsJhBvr0qM96p4f5a1cOEW.jpeg&amp;w=1920&amp;q=90 1920w" src="/_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F1atyukw0odVDS5Ga6dvjuwJnqsBDiKD7uqMtT3pIpdPsJhBvr0qM96p4f5a1cOEW.jpeg&amp;w=1920&amp;q=90" decoding="async" data-nimg="fill" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover;object-position:center center" class="" loading="lazy"/></noscript></span></div><div class="flex flex-row items-center justify-center"></div><div class="flex flex-col absolute w-full h-full top-0 left-0 justify-center" style="background-color:rgba(0,0,0,0.8);min-height:0px"><div class="flex flex-col items-center text-center mx-auto p-10 justify-center" style="color:#FFFFFF"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Break-Fix</p><div class="rich-text-block mx-auto" style="color:currentColor"><p class="small">Rapid response to security incidents and system malfunctions.<br /><br />•Swift Diagnosis: Quick identification and resolution of issues.<br />•Effective Repairs: Reliable and efficient repair services for systems and vulnerabilities.<br />•Fortified Defenses: Strengthening your defenses to protect against future threats.</p></div></div></div></div></div></div></div><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl opacity-0"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-300 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl justify-center" style="background-color:rgba(0,0,0,0.8)"><div><div class="flex-shrink-0 relative overflow-hidden aspect-w-16 aspect-h-9 rounded-2xl md:rounded-3xl lg:rounded-4xl" style="min-height:0px"><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:absolute;top:0;left:0;bottom:0;right:0"><img alt="Software development. Technology and innovation. Gears on smartphone screen" title="Software development. Technology and innovation. Gears on smartphone screen" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="fill" class="" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover;object-position:center center"/><noscript><img alt="Software development. Technology and innovation. Gears on smartphone screen" title="Software development. Technology and innovation. Gears on smartphone screen" sizes="200vw" srcSet="/_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F3bmGQwrscyi4Eu5aOGB3nkwnjayV1gM3Li8XK240MM0cfyunnbLhWhXA3UJc6fFy.jpeg&amp;w=480&amp;q=90 480w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F3bmGQwrscyi4Eu5aOGB3nkwnjayV1gM3Li8XK240MM0cfyunnbLhWhXA3UJc6fFy.jpeg&amp;w=640&amp;q=90 640w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F3bmGQwrscyi4Eu5aOGB3nkwnjayV1gM3Li8XK240MM0cfyunnbLhWhXA3UJc6fFy.jpeg&amp;w=768&amp;q=90 768w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F3bmGQwrscyi4Eu5aOGB3nkwnjayV1gM3Li8XK240MM0cfyunnbLhWhXA3UJc6fFy.jpeg&amp;w=1080&amp;q=90 1080w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F3bmGQwrscyi4Eu5aOGB3nkwnjayV1gM3Li8XK240MM0cfyunnbLhWhXA3UJc6fFy.jpeg&amp;w=1200&amp;q=90 1200w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F3bmGQwrscyi4Eu5aOGB3nkwnjayV1gM3Li8XK240MM0cfyunnbLhWhXA3UJc6fFy.jpeg&amp;w=1920&amp;q=90 1920w" src="/_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F3bmGQwrscyi4Eu5aOGB3nkwnjayV1gM3Li8XK240MM0cfyunnbLhWhXA3UJc6fFy.jpeg&amp;w=1920&amp;q=90" decoding="async" data-nimg="fill" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover;object-position:center center" class="" loading="lazy"/></noscript></span></div><div class="flex flex-row items-center justify-center"></div><div class="flex flex-col absolute w-full h-full top-0 left-0 justify-center" style="background-color:rgba(0,0,0,0.8);min-height:0px"><div class="flex flex-col items-center text-center mx-auto p-10 justify-center" style="color:#FFFFFF"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Upgrades &amp; Enhancements</p><div class="rich-text-block mx-auto" style="color:currentColor"><p class="small">Keeping your security solutions current and effective.<br /><br />•Technology Updates: We ensure your systems are always utilizing the latest technologies.<br />•Feature Enhancements: Regularly upgrade features to address evolving threats.<br />•Strategic Improvements: Continuously improve security posture through strategic upgrades.</p></div></div></div></div></div></div></div></div></div></div></div></section><section class="relative"><div id="67bde979203fa054c0195d86" class="relative flex flex-none flex-shrink-0 break-word items-center" style="min-height:calc(0px - 0px);z-index:31"><div class="relative z-10 container mx-auto pt-8 lg:pt-12 pb-0"><div><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500  opacity-0 translate-y-8 flex flex-col gap-4 mb-6 items-center text-center mx-auto"><h2 class="break-word heading-large block w-full mx-auto" style="color:#000000">Managed Services</h2><pre class="body-normal block w-full mx-auto" style="color:#000000">Get stronger security, seamless compliance, and reduced risk—so you can focus on growth with confidence.
</pre></div><div class="flex flex-wrap relative justify-center"><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-100 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex-shrink-0 relative overflow-hidden aspect-w-16 aspect-h-9 rounded-2xl md:rounded-3xl lg:rounded-4xl"><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:absolute;top:0;left:0;bottom:0;right:0"><img alt="Abstract concept Internet Cyber Security network with lock" title="Abstract concept Internet Cyber Security network with lock" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="fill" class="" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover;object-position:center center"/><noscript><img alt="Abstract concept Internet Cyber Security network with lock" title="Abstract concept Internet Cyber Security network with lock" sizes="200vw" srcSet="/_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F12Kd7YPSZ3JdjCZtSjQoU8PVyHlzBMWwaL5I1TdDZDM3sNmZjOKIm8ABmtlforN0.jpeg&amp;w=480&amp;q=90 480w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F12Kd7YPSZ3JdjCZtSjQoU8PVyHlzBMWwaL5I1TdDZDM3sNmZjOKIm8ABmtlforN0.jpeg&amp;w=640&amp;q=90 640w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F12Kd7YPSZ3JdjCZtSjQoU8PVyHlzBMWwaL5I1TdDZDM3sNmZjOKIm8ABmtlforN0.jpeg&amp;w=768&amp;q=90 768w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F12Kd7YPSZ3JdjCZtSjQoU8PVyHlzBMWwaL5I1TdDZDM3sNmZjOKIm8ABmtlforN0.jpeg&amp;w=1080&amp;q=90 1080w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F12Kd7YPSZ3JdjCZtSjQoU8PVyHlzBMWwaL5I1TdDZDM3sNmZjOKIm8ABmtlforN0.jpeg&amp;w=1200&amp;q=90 1200w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F12Kd7YPSZ3JdjCZtSjQoU8PVyHlzBMWwaL5I1TdDZDM3sNmZjOKIm8ABmtlforN0.jpeg&amp;w=1920&amp;q=90 1920w" src="/_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F12Kd7YPSZ3JdjCZtSjQoU8PVyHlzBMWwaL5I1TdDZDM3sNmZjOKIm8ABmtlforN0.jpeg&amp;w=1920&amp;q=90" decoding="async" data-nimg="fill" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover;object-position:center center" class="" loading="lazy"/></noscript></span></div><div class="flex flex-row items-center justify-center"></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Managed Security Service Provider (MSSP)</p><div class="rich-text-block mx-auto" style="color:currentColor"><p>Next-gen Managed Security Services (MSSP) to safeguard your business against evolving cyber threats. Our 24/7 monitoring, proactive threat intelligence, and rapid response ensure your critical assets stay protected. </p></div></div></div></div></div></div></div><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-200 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex-shrink-0 relative overflow-hidden aspect-w-16 aspect-h-9 rounded-2xl md:rounded-3xl lg:rounded-4xl"><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:absolute;top:0;left:0;bottom:0;right:0"><img alt="A business person is searching chart indexes on a computer screen." title="A business person is searching chart indexes on a computer screen." src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="fill" class="" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover;object-position:center center"/><noscript><img alt="A business person is searching chart indexes on a computer screen." title="A business person is searching chart indexes on a computer screen." sizes="200vw" srcSet="/_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F31PpplKq9Yny8QkmCODFu4YTjveDeDdskrZIiBFvFgQe3CIvsWblBjvOIkleUQk6.jpeg&amp;w=480&amp;q=90 480w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F31PpplKq9Yny8QkmCODFu4YTjveDeDdskrZIiBFvFgQe3CIvsWblBjvOIkleUQk6.jpeg&amp;w=640&amp;q=90 640w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F31PpplKq9Yny8QkmCODFu4YTjveDeDdskrZIiBFvFgQe3CIvsWblBjvOIkleUQk6.jpeg&amp;w=768&amp;q=90 768w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F31PpplKq9Yny8QkmCODFu4YTjveDeDdskrZIiBFvFgQe3CIvsWblBjvOIkleUQk6.jpeg&amp;w=1080&amp;q=90 1080w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F31PpplKq9Yny8QkmCODFu4YTjveDeDdskrZIiBFvFgQe3CIvsWblBjvOIkleUQk6.jpeg&amp;w=1200&amp;q=90 1200w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F31PpplKq9Yny8QkmCODFu4YTjveDeDdskrZIiBFvFgQe3CIvsWblBjvOIkleUQk6.jpeg&amp;w=1920&amp;q=90 1920w" src="/_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fgetty%2F31PpplKq9Yny8QkmCODFu4YTjveDeDdskrZIiBFvFgQe3CIvsWblBjvOIkleUQk6.jpeg&amp;w=1920&amp;q=90" decoding="async" data-nimg="fill" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover;object-position:center center" class="" loading="lazy"/></noscript></span></div><div class="flex flex-row items-center justify-center"></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Infrastructure Managed Services</p><div class="rich-text-block mx-auto" style="color:currentColor"><p>End-to-end Infrastructure Managed Services to keep your IT environment optimized, resilient, and future-ready. Our proactive monitoring, automation, and expert support ensure maximum uptime, security, and performance.</p></div></div></div></div></div></div></div></div></div></div><svg class="absolute bottom-0 left-0" width="0" height="0" viewBox="0 0 0 0"><clipPath id="67bde979203fa054c0195d86-slantLeft"><rect width="0" height="0" fill="transparent"></rect><path d="M0 0L-0 0V0H0" transform="translate(0, 0)" fill="transparent"></path></clipPath></svg></div></section><section class="relative"><div id="67bdeb8a203fa054c0195d8c" class="flex flex-none flex-shrink-0 relative break-word items-center" style="min-height:calc(0px - 0px);z-index:30"><div class="relative z-10 container mx-auto pt-0 pb-0"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500  opacity-0 translate-y-8 flex w-full gap-10 lg:gap-20 flex-col lg:flex-row items-center"><div class="flex-1 flex flex-col max-w-240 items-start"><div class="rich-text-block" style="color:#000000"><h2 style="white-space:pre-line">Hardware &amp; Software Sales</h2>
<p>Providing cutting-edge technology solutions with expert guidance to optimize performance, security, and scalability for your business.</p></div></div><div class="flex-1 flex w-full h-full justify-center lg:justify-start"><div class="flex-shrink-0 relative w-full h-full mx-auto aspect-w-16 aspect-h-9"><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:absolute;top:0;left:0;bottom:0;right:0"><img alt="" title="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="fill" class="rounded-2xl md:rounded-3xl lg:rounded-4xl" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover;object-position:center center"/><noscript><img alt="" title="" sizes="200vw" srcSet="/_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fblocks%2F2d2sU4kSYVf2hGT0ED93liOqteCVL81ilin6oLVRsu4zdRuNljATQyFI2HBw8hYc.jpg&amp;w=480&amp;q=90 480w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fblocks%2F2d2sU4kSYVf2hGT0ED93liOqteCVL81ilin6oLVRsu4zdRuNljATQyFI2HBw8hYc.jpg&amp;w=640&amp;q=90 640w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fblocks%2F2d2sU4kSYVf2hGT0ED93liOqteCVL81ilin6oLVRsu4zdRuNljATQyFI2HBw8hYc.jpg&amp;w=768&amp;q=90 768w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fblocks%2F2d2sU4kSYVf2hGT0ED93liOqteCVL81ilin6oLVRsu4zdRuNljATQyFI2HBw8hYc.jpg&amp;w=1080&amp;q=90 1080w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fblocks%2F2d2sU4kSYVf2hGT0ED93liOqteCVL81ilin6oLVRsu4zdRuNljATQyFI2HBw8hYc.jpg&amp;w=1200&amp;q=90 1200w, /_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fblocks%2F2d2sU4kSYVf2hGT0ED93liOqteCVL81ilin6oLVRsu4zdRuNljATQyFI2HBw8hYc.jpg&amp;w=1920&amp;q=90 1920w" src="/_next/image?url=https%3A%2F%2Fcdn.durable.co%2Fblocks%2F2d2sU4kSYVf2hGT0ED93liOqteCVL81ilin6oLVRsu4zdRuNljATQyFI2HBw8hYc.jpg&amp;w=1920&amp;q=90" decoding="async" data-nimg="fill" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover;object-position:center center" class="rounded-2xl md:rounded-3xl lg:rounded-4xl" loading="lazy"/></noscript></span></div></div></div></div><svg class="absolute bottom-0 left-0" width="0" height="0" viewBox="0 0 0 0"><clipPath id="67bdeb8a203fa054c0195d8c-pointUp"><rect width="0" height="0" fill="transparent"></rect><path d="M0 0V0L0 0L0 0L0 0V0H0" transform="translate(0, 0)" fill="transparent"></path></clipPath></svg></div></section><section class="relative"><div id="67be22eb643cc205b8d2389a" class="relative flex flex-none flex-shrink-0 break-word items-center" style="min-height:calc(0px - 0px);z-index:29"><div class="relative z-10 container mx-auto pt-12 lg:pt-20 pb-12 lg:pb-20"><div><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500  opacity-0 translate-y-8 flex flex-col gap-4 mb-6 items-center text-center mx-auto"><h2 class="break-word heading-large block w-full mx-auto" style="color:#000000">Our Expertise &amp; Capabilities</h2><pre class="body-normal block w-full mx-auto" style="color:#000000">Leveraging deep industry knowledge and cutting-edge technology to deliver tailored, resilient, and future-ready security and infrastructure solutions.</pre></div><div class="flex flex-wrap relative justify-center"><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-100 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"><div class=""><div class="flex-shrink-0 relative transition-all duration-300 w-24 h-24 mx-auto"><div class="absolute w-full h-full" style="color:#000000;background-color:#cf0515;-webkit-mask-image:url(&quot;https://static.thenounproject.com/png/1104749-200.png&quot;);mask-image:url(&quot;https://static.thenounproject.com/png/1104749-200.png&quot;);-webkit-mask-position:center;mask-position:center;-webkit-mask-repeat:no-repeat;mask-repeat:no-repeat;-webkit-mask-size:contain;mask-size:contain"></div></div></div></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Next Gen Firewall &amp; SASE</p><div class="rich-text-block mx-auto" style="color:currentColor"><p class="small" style="text-align: justify;">Advanced threat detection and prevention, secure access to applications and data from any location, deep packet inspection, intrusion prevention, and application control.</p></div></div></div></div></div></div></div><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-200 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"><div class=""><div class="flex-shrink-0 relative transition-all duration-300 w-24 h-24 mx-auto"><div class="absolute w-full h-full" style="color:#000000;background-color:#cf0515;-webkit-mask-image:url(&quot;https://static.thenounproject.com/png/995807-200.png&quot;);mask-image:url(&quot;https://static.thenounproject.com/png/995807-200.png&quot;);-webkit-mask-position:center;mask-position:center;-webkit-mask-repeat:no-repeat;mask-repeat:no-repeat;-webkit-mask-size:contain;mask-size:contain"></div></div></div></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Email Security</p><div class="rich-text-block mx-auto" style="color:currentColor"><p class="small" style="text-align: justify;">Protection against phishing, malware, and spam, ensuring data confidentiality and compliance with data protection regulations.</p></div></div></div></div></div></div></div><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-300 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"><div class=""><div class="flex-shrink-0 relative transition-all duration-300 w-24 h-24 mx-auto"><div class="absolute w-full h-full" style="color:#000000;background-color:#cf0515;-webkit-mask-image:url(&quot;https://static.thenounproject.com/png/79511-200.png&quot;);mask-image:url(&quot;https://static.thenounproject.com/png/79511-200.png&quot;);-webkit-mask-position:center;mask-position:center;-webkit-mask-repeat:no-repeat;mask-repeat:no-repeat;-webkit-mask-size:contain;mask-size:contain"></div></div></div></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Multi-Factor Authentication</p><div class="rich-text-block mx-auto" style="color:currentColor"><p class="small" style="text-align: justify;">Extra layer of security, significantly reducing the risk of unauthorized access, enhancing user authentication.</p></div></div></div></div></div></div></div><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-400 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"><div class=""><div class="flex-shrink-0 relative transition-all duration-300 w-24 h-24 mx-auto"><div class="absolute w-full h-full" style="color:#000000;background-color:#cf0515;-webkit-mask-image:url(&quot;https://static.thenounproject.com/png/926896-200.png&quot;);mask-image:url(&quot;https://static.thenounproject.com/png/926896-200.png&quot;);-webkit-mask-position:center;mask-position:center;-webkit-mask-repeat:no-repeat;mask-repeat:no-repeat;-webkit-mask-size:contain;mask-size:contain"></div></div></div></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Web Application Firewalls (WAF)</p><div class="rich-text-block mx-auto" style="color:currentColor"><p class="small" style="text-align: justify;">Shields web applications from common exploits, maintaining the integrity and availability of web services, protecting against data leaks and service disruptions.</p></div></div></div></div></div></div></div><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-500 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"><div class=""><div class="flex-shrink-0 relative transition-all duration-300 w-24 h-24 mx-auto"><div class="absolute w-full h-full" style="color:#000000;background-color:#cf0515;-webkit-mask-image:url(&quot;https://static.thenounproject.com/png/124255-200.png&quot;);mask-image:url(&quot;https://static.thenounproject.com/png/124255-200.png&quot;);-webkit-mask-position:center;mask-position:center;-webkit-mask-repeat:no-repeat;mask-repeat:no-repeat;-webkit-mask-size:contain;mask-size:contain"></div></div></div></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Next-Gen Endpoint Protection</p><div class="rich-text-block mx-auto" style="color:currentColor"><p class="small" style="text-align: justify;">Real-time protection against malware, ransomware, and zero-day threats at the endpoint level, reducing the attack surface.</p></div></div></div></div></div></div></div><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-600 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"><div class=""><div class="flex-shrink-0 relative transition-all duration-300 w-24 h-24 mx-auto"><div class="absolute w-full h-full" style="color:#000000;background-color:#cf0515;-webkit-mask-image:url(&quot;https://static.thenounproject.com/png/31072-200.png&quot;);mask-image:url(&quot;https://static.thenounproject.com/png/31072-200.png&quot;);-webkit-mask-position:center;mask-position:center;-webkit-mask-repeat:no-repeat;mask-repeat:no-repeat;-webkit-mask-size:contain;mask-size:contain"></div></div></div></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">SD-WAN</p><div class="rich-text-block mx-auto" style="color:currentColor"><p class="small" style="text-align: justify;">Optimizes network performance, reduces costs, and improves security by integrating security services directly into the WAN.</p></div></div></div></div></div></div></div><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-700 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"><div class=""><div class="flex-shrink-0 relative transition-all duration-300 w-24 h-24 mx-auto"><div class="absolute w-full h-full" style="color:#000000;background-color:#cf0515;-webkit-mask-image:url(&quot;https://static.thenounproject.com/png/116760-200.png&quot;);mask-image:url(&quot;https://static.thenounproject.com/png/116760-200.png&quot;);-webkit-mask-position:center;mask-position:center;-webkit-mask-repeat:no-repeat;mask-repeat:no-repeat;-webkit-mask-size:contain;mask-size:contain"></div></div></div></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Network Solutions (Switching, Routing, Monitoring)</p><div class="rich-text-block mx-auto" style="color:currentColor"><p class="small" style="text-align: justify;">Ensures network integrity, performance, and security through robust infrastructure, proactive threat detection, and efficient data transmission.</p></div></div></div></div></div></div></div><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-800 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"><div class=""><div class="flex-shrink-0 relative transition-all duration-300 w-24 h-24 mx-auto"><div class="absolute w-full h-full" style="color:#000000;background-color:#cf0515;-webkit-mask-image:url(&quot;https://static.thenounproject.com/png/1140373-200.png&quot;);mask-image:url(&quot;https://static.thenounproject.com/png/1140373-200.png&quot;);-webkit-mask-position:center;mask-position:center;-webkit-mask-repeat:no-repeat;mask-repeat:no-repeat;-webkit-mask-size:contain;mask-size:contain"></div></div></div></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Technical Training</p><div class="rich-text-block mx-auto" style="color:currentColor"><p class="small" style="text-align: justify;">Personalized and automated training services to educate resources on security best practices, and internal industry and organizational standards.</p></div></div></div></div></div></div></div></div></div></div><svg class="absolute bottom-0 left-0" width="0" height="0" viewBox="0 0 0 0"><clipPath id="67be22eb643cc205b8d2389a-waveLeft"><rect width="0" height="0" fill="transparent"></rect><path d="M0 0C0 0 0 0 0 0C0 0 0 0 0 0C0 0 0 0 0 0V0H0Z" transform="translate(0, 0)" fill="transparent"></path></clipPath></svg></div></section><section class="relative"><div id="67be24de643cc205b8d2389f" class="relative flex flex-none flex-shrink-0 break-word items-center" style="min-height:calc(0px - 0px);z-index:28"><div class="relative z-10 container mx-auto pt-12 lg:pt-20 pb-12 lg:pb-20"><div><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500  opacity-0 translate-y-8 flex flex-col gap-4 mb-6 items-center text-center mx-auto"><h2 class="break-word heading-large block w-full mx-auto" style="color:#000000">Industry Focus</h2><pre class="body-normal block w-full mx-auto" style="color:#000000">We understand the reality and challenges faced by our industry, and we bring a strong track record supporting our client&#x27;s specific needs.
</pre></div><div class="flex flex-wrap relative justify-center"><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-100 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"><div class=""><div class="flex-shrink-0 relative transition-all duration-300 w-36 h-36 mx-auto"><div class="absolute w-full h-full" style="color:#000000;background-color:#cf0515;-webkit-mask-image:url(&quot;https://static.thenounproject.com/png/32342-200.png&quot;);mask-image:url(&quot;https://static.thenounproject.com/png/32342-200.png&quot;);-webkit-mask-position:center;mask-position:center;-webkit-mask-repeat:no-repeat;mask-repeat:no-repeat;-webkit-mask-size:contain;mask-size:contain"></div></div></div></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Financial Institutions</p><div class="rich-text-block mx-auto" style="color:currentColor"><p class="small" style="text-align: justify;">Fortifying financial institutions with cutting-edge security, fraud prevention, and seamless compliance.</p></div></div></div></div></div></div></div><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-200 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"><div class=""><div class="flex-shrink-0 relative transition-all duration-300 w-36 h-36 mx-auto"><div class="absolute w-full h-full" style="color:#000000;background-color:#cf0515;-webkit-mask-image:url(&quot;https://static.thenounproject.com/png/1534390-200.png&quot;);mask-image:url(&quot;https://static.thenounproject.com/png/1534390-200.png&quot;);-webkit-mask-position:center;mask-position:center;-webkit-mask-repeat:no-repeat;mask-repeat:no-repeat;-webkit-mask-size:contain;mask-size:contain"></div></div></div></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Manufacturing Organizations</p><div class="rich-text-block mx-auto" style="color:currentColor"><p class="small" style="text-align: justify;">Protecting industrial systems and processes with resilient cybersecurity and real-time threat defense.</p></div></div></div></div></div></div></div><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-300 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"><div class=""><div class="flex-shrink-0 relative transition-all duration-300 w-36 h-36 mx-auto"><div class="absolute w-full h-full" style="color:#000000;background-color:#cf0515;-webkit-mask-image:url(&quot;https://static.thenounproject.com/png/1254366-200.png&quot;);mask-image:url(&quot;https://static.thenounproject.com/png/1254366-200.png&quot;);-webkit-mask-position:center;mask-position:center;-webkit-mask-repeat:no-repeat;mask-repeat:no-repeat;-webkit-mask-size:contain;mask-size:contain"></div></div></div></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Engineering Services</p><div class="rich-text-block mx-auto" style="color:currentColor"><p class="small" style="text-align: justify;">Securing critical data and optimizing IT infrastructure to keep innovation moving forward.</p></div></div></div></div></div></div></div><div class="group w-full relative overflow-hidden rounded-2xl md:rounded-3xl lg:rounded-4xl"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500 delay-400 opacity-0 translate-y-8 h-full"><div class="flex flex-col h-full rounded-2xl md:rounded-3xl lg:rounded-4xl"><div><div class="flex flex-row items-center justify-center"><div class=""><div class="flex-shrink-0 relative transition-all duration-300 w-36 h-36 mx-auto"><div class="absolute w-full h-full" style="color:#000000;background-color:#cf0515;-webkit-mask-image:url(&quot;https://static.thenounproject.com/png/4321616-200.png&quot;);mask-image:url(&quot;https://static.thenounproject.com/png/4321616-200.png&quot;);-webkit-mask-position:center;mask-position:center;-webkit-mask-repeat:no-repeat;mask-repeat:no-repeat;-webkit-mask-size:contain;mask-size:contain"></div></div></div></div><div class="flex flex-col"><div class="flex flex-col items-center text-center mx-auto py-6" style="color:#000000"><p class="heading-medium mb-4 mx-auto" style="color:currentColor">Telecom Services</p><div class="rich-text-block mx-auto" style="color:currentColor"><p class="small" style="text-align: justify;">Safeguarding networks and communications with advanced threat detection and always-on reliability.</p></div></div></div></div></div></div></div></div></div></div><svg class="absolute bottom-0 left-0" width="0" height="0" viewBox="0 0 0 0"><clipPath id="67be24de643cc205b8d2389f-slantLeft"><rect width="0" height="0" fill="transparent"></rect><path d="M0 0L-0 0V0H0" transform="translate(0, 0)" fill="transparent"></path></clipPath></svg></div></section><section class="relative"><div id="677d65617bfc733936cecfba" class="flex flex-none flex-shrink-0 relative break-word items-center" style="min-height:calc(0px - 0px);z-index:27" data-version="2"><div class="relative z-10 container mx-auto pt-8 lg:pt-12 pb-8 lg:pb-12"><div class="absolute left-0 top-8 min-h-full min-w-full"></div><div class="transition-all transition-all ease-in-out duration-500  opacity-0 translate-y-8 flex flex-col w-full gap-10 lg:flex-row lg:gap-20"><div class="w-full lg:w-1/2"><div class="contact-form rich-text-block" style="color:#000000"><h3>Contact Us</h3>
<ul>
<li><strong>Request a Consultation</strong><br />Connect with our team for personalized guidance.<br /><br /></li>
<li><strong>Discuss Your Needs</strong><br />Explore your current security posture and challenges.</li>
</ul>
<ul>
<li><strong>Receive Tailored Solutions</strong><br />Get affordable and effective cybersecurity recommendations.</li>
</ul></div></div><div class="flex flex-col gap-10 w-full lg:w-1/2"><form class="block" novalidate=""><div class="flex flex-col lg:grid lg:grid-cols-2 gap-4 w-full mb-4"><div class=""><label class="mb-1 body-small" style="color:#000000">Name<!-- --> </label><input type="text" class="input border-none !shadow-none !placeholder-current" style="border-radius:8px;background-color:rgba(0,0,0,0.08);color:#000000" autoComplete="name"/></div><div class=""><label class="mb-1 body-small" style="color:#000000">Email<!-- --> </label><input type="text" class="input border-none !shadow-none !placeholder-current" style="border-radius:8px;background-color:rgba(0,0,0,0.08);color:#000000" autoComplete="email"/></div><div class="col-span-2"><label class="mb-1 body-small" style="color:#000000">Phone<!-- --> </label><input type="text" class="input border-none !shadow-none !placeholder-current" style="border-radius:8px;background-color:rgba(0,0,0,0.08);color:#000000" autoComplete="tel"/></div><div class="col-span-2"><label class="mb-1 body-small" style="color:#000000">Message<!-- --> </label><textarea class="input border-none !shadow-none !placeholder-current" rows="5" style="border-radius:8px;background-color:rgba(0,0,0,0.08);color:#000000"></textarea></div></div><div class="flex flex-col justify-between gap-4 md:pt-4 md:flex-row items-start text-right"><button type="submit" class="button min-w-36 mt-2 md:mt-0 md" style="border-width:2px;border-style:solid;box-shadow:none;font-family:var(--body-fontFamily);font-weight:var(--body-fontWeight, 500);font-style:var(--body-fontStyle)">Send</button><div class="text-xs max-w-sm text-gray-500" style="color:#000000">This site is protected by reCAPTCHA and the Google<a target="_blank" class="font-bold" style="color:#000000" href="https://policies.google.com/privacy"> <!-- -->Privacy Policy</a> <!-- -->and<a target="_blank" class="font-bold" style="color:#000000" href="https://policies.google.com/terms"> <!-- -->Terms of Service</a> <!-- -->apply<!-- -->.</div></div></form></div></div></div></div></section><div class="min-h-150 flex-shrink-0 flex-grow"></div><div class="min-h-150 flex-shrink-0 flex-grow"></div><div class="Toastify"></div></div></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"_nextI18Next":{"initialI18nStore":{"en":{"common":{"404":{"button":"Back to home page","subtitle":"The link may be broken, or the page may have been removed. Check to see if the link you're trying to open is correct.","title":"This page isn't available"},"500":{"button":"Back to home page","subtitle":"We are working on fixing the problem. Be back soon.","title":"Sorry, unexpected error"},"back":"Back","by":"By","contactUs":"Contact us","footer":{"madeWith":"Made with"},"home":"Home","loading":"Loading...","next":"Next","notFound":"Nothing found","previous":"Previous","search":"Search","weekdays":{"friday":"Friday","monday":"Monday","saturday":"Saturday","sunday":"Sunday","thursday":"Thursday","tuesday":"Tuesday","wednesday":"Wednesday"},"weekdaysShort":{"friday":"Fri","monday":"Mon","saturday":"Sat","sunday":"Sun","thursday":"Thu","tuesday":"Tue","wednesday":"Wed"},"months":{"january":"January","february":"February","march":"March","april":"April","may":"May","june":"June","july":"July","august":"August","september":"September","october":"October","november":"November","december":"December"},"hour":"Hour","minute":"Minute","hours":"Hours","minutes":"Minutes","and":"And"},"block_banner":{},"block_text":{},"block_hero":{},"block_logo-showcase":{},"block_list":{},"block_banner-carousel":{},"block_service-list":{},"block_contact":{"errors":{"email":"Provide a valid email","emailInvalid":"Provide a valid email","isRequired":"is required","message":"Provide a message","name":"Provide a name","sendFailed":"Error while sending your message. Try again later."},"label":{"address":"Address","fullAddress":"Full address","city":"City","country":"Country","line1":"Line 1","line2":"Line 2","postalCode":"Postal Code","province":"Province","state":"State","zipCode":"ZIP code","phone":"Phone","company":"Company"},"recaptcha":{"and":"and","apply":"apply","privacyPolicy":"Privacy Policy","termsOfService":"Terms of Service","title":"This site is protected by reCAPTCHA and the Google"},"success":{"subtitle":"We'll get in touch with you as soon as possible.","title":"Message sent!"}},"block_location":{}}},"initialLocale":"en","ns":["common","block_banner","block_text","block_hero","block_logo-showcase","block_list","block_list","block_banner-carousel","block_service-list","block_list","block_hero","block_list","block_list","block_contact","block_location"],"userConfig":{"i18n":{"defaultLocale":"en","locales":["de","en","es","fr","it","nl","pt"],"localeDetection":false},"localePath":"/home/Website/source/public/locales","default":{"i18n":{"defaultLocale":"en","locales":["de","en","es","fr","it","nl","pt"],"localeDetection":false},"localePath":"/home/Website/source/public/locales"}}},"page":{"_id":"677c503e42c10e3600b11c60","Website":"677c503e42c10e3600b11c4d","slug":null,"label":"HOME","showOnHeader":true,"showOnFooter":true,"default":true,"blocks":[{"_id":"677c50e9d1076c349f822b23","WebsiteBlock":{"_id":"629f98a1eb0b4972268051a1","type":"banner","name":"Banner","source":"durable","category":"section","order":1,"taxonomy":"section","categories":["banner"]},"logging":[],"type":"page-heading","idx":1,"headline":"Defend. Protect. Prevail.","content":"Affordable, Reliable, and High-End Cybersecurity Solutions to Protect What Matters Most.","layers":{"image":{"enabled":true,"positionX":"50%","positionY":"35%","opacity":70,"media":{"_id":"677c50c65b4cb19034a15d20","type":"getty","preview":"https://media.gettyimages.com/id/1435605327/photo/cybersecurity-concept-global-network-security-technology-business-people-protect-personal.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=sdnK5xej4zNdaCYqH6PUFegQ9rg4Ozv3vaHbuHVdvl0=","url":"https://cdn.durable.co/getty/clXrRKwTRAoNbJ4s8maKaI4QvOE2xMXsILw6GD5y6EOiQUGvl9wivlw4XTiVRXIT.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-06T21:53:10.568Z","download":"1435605327","description":"cybersecurity concept Global network security technology, business people protect personal information. Encryption with a padlock icon on the virtual interface.","brandingToWebsite":false,"__v":0,"id":"677c50c65b4cb19034a15d20"}},"palette":"custom","overlay":{"type":"solid","color1":"#670b0b","color2":"#FFFFFF"},"foreground":{"accent":"#161513"}},"spacing":{"minHeight":"min-h-screen","top":"none","bottom":"small"},"align":"left","combineWithHeader":true,"headingTextStyle":"xl","bodyTextStyle":"lg","image":{"enabled":false,"imageFit":"cover","cornerRadius":"default","align":"right","aspectRatio":"16:9","borderless":true,"media":{"_id":"677c503e42c10e3600b11c54","type":"getty","preview":"https://media.gettyimages.com/id/1552877787/photo/lock-hologram-tablet-and-woman-with-data-analysis-safety-software-overlay-and-cyber-security.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=42nDcyNNxCGMLNwb6O6Ho3px4_dl3pK-mpLrulC8JYs=","url":"https://cdn.durable.co/getty/a83PviSPlAJec7GVegRgFH4zUxyv6opqO3ZNcpongWhqVxrJmLU3Hj1mzfrN8gsL.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-06T21:50:54.306Z","download":"1552877787","description":"Lock hologram, tablet and woman with data analysis safety, software overlay and cyber security coding at night. Html, script and person reading with digital technology, gdpr and networking research","brandingToWebsite":false,"title":"Lock hologram, tablet and woman with data analysis safety, software overlay and cyber security coding at night. Html, script and person reading with digital technology, gdpr and networking research","caption":"Lock hologram, tablet and woman with data analysis safety, software overlay and cyber security coding at night. Html, script and indian person reading with digital technology and networking research","__v":0}},"buttons":{"enabled":false,"items":[{"label":"Secure Your Data","type":"section","link":"677c502fd1076c349f822b1e","style":{"name":"style1"}}]},"border":{"type":"solid","color":"#FFFFFF","width":"3"},"verticalAlign":"bottom"},{"_id":"677c502fd1076c349f822b1d","WebsiteBlock":{"_id":"629f98a1eb0b4972268051a7","type":"text","name":"Text","source":"durable","category":"section","order":6,"taxonomy":"section","categories":["content"]},"logging":[],"type":"about","idx":2,"content":"\u003ch2 style=\"white-space:pre-line\"\u003eOur Mission\u003c/h2\u003e\n\u003cp\u003eWe're security experts who take a hands-on, consultative approach with our clients. We design cutting-edge solutions to shield you from the latest threats, educating you every step of the way. Our custom-tailored architecture delivers rock-solid protection you can count on.\u003c/p\u003e\n\u003cp\u003eOur unparalleled expertise is your biggest advantage. We'll be by your side, ensuring you get the highest level of support and the best possible safeguards for your business.\u003c/p\u003e","layers":{"image":{"enabled":false},"palette":"custom","overlay":{"type":"gradient","color1":"#040404","color2":"#2d0102"},"foreground":{"accent":"#f00a0d"}},"spacing":{"top":"small","bottom":"none"},"divider":"swoopLeft","border":null},{"_id":"67bcd7d1ece7ac288296a5d6","WebsiteBlock":{"_id":"629f98a1eb0b4972268051a2","type":"hero","name":"Text + image","source":"durable","category":"section","order":5,"taxonomy":"section","categories":["content"]},"logging":[],"type":"about","idx":3,"content":"\u003cp style=\"text-align:left\"\u003e \u003c/p\u003e\n\u003ch2 style=\"white-space:pre-line;text-align:left\"\u003eOUR VALUES\u003c/h2\u003e","image":{"media":{"_id":"67bcda12d2938379e0b8561f","author":"","authorLink":"","type":"library","url":"https://cdn.durable.co/blocks/2mlgvybBz5VVOs1U4X7JwiMfe6qwXZ1nDwfjr7cuORHRwgqkDxHkJ6mDsx7TfC3F.jpg","key":"blocks/2mlgvybBz5VVOs1U4X7JwiMfe6qwXZ1nDwfjr7cuORHRwgqkDxHkJ6mDsx7TfC3F.jpg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-24T20:44:02.887Z","brandingToWebsite":false,"__v":0,"id":"67bcda12d2938379e0b8561f"},"altText":"","imageFit":"cover","align":"left","aspectRatio":"16:9","cornerRadius":"no-rounded","borderless":false},"layers":{"image":{"enabled":false},"overlay":{"type":"gradient","direction":null,"color1":"#070000","color2":"#070000"},"foreground":{"accent":"#3E990A"},"palette":"custom"},"spacing":{"minHeight":"min-h-60","top":"none","bottom":"small"},"align":"middle","mobile":{"reverseOrder":false},"divider":"slantLeft"},{"_id":"677c502bd1076c349f822b19","WebsiteBlock":{"_id":"65b2690ee5b5239723fc48c7","type":"logo-showcase","name":"Logo showcase","source":"durable","category":"section","order":11,"taxonomy":"section","categories":["clients"]},"logging":[],"type":"logo-showcase","idx":4,"layers":{"image":{"enabled":false},"overlay":{"type":"solid","direction":null,"color1":"#e9e9e9","color2":"#F5F6F4"},"palette":"custom","foreground":{"accent":"#FFFFFF"}},"spacing":{"minHeight":"min-h-60","top":"medium","bottom":"medium"},"align":"left","style":"carousel","fullWidth":true,"removeColor":false,"speed":"25","direction":"right","pictures":[{"media":{"_id":"677c54af42c10e3600b15b88","author":"","authorLink":"","type":"library","url":"https://cdn.durable.co/blocks/32m8unshYA5fqJfwrLp6V9DfBgD2HFuZSiyZZFQaQbfqiiYi28tEukOU9Bddvrs2.png","key":"blocks/32m8unshYA5fqJfwrLp6V9DfBgD2HFuZSiyZZFQaQbfqiiYi28tEukOU9Bddvrs2.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-06T22:09:51.550Z","brandingToWebsite":false,"__v":0,"id":"677c54af42c10e3600b15b88"},"idx":0,"altText":""},{"media":{"_id":"677c550f42c10e3600b160cf","author":"","authorLink":"","type":"library","url":"https://cdn.durable.co/blocks/1avXAMqKUeGDjeDJnMo90IgUj9jtDKzQloh0KNgeMTUwdIhLPL5HodTZIFCUg6WR.png","key":"blocks/1avXAMqKUeGDjeDJnMo90IgUj9jtDKzQloh0KNgeMTUwdIhLPL5HodTZIFCUg6WR.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-06T22:11:27.096Z","brandingToWebsite":false,"__v":0,"id":"677c550f42c10e3600b160cf"},"idx":1,"altText":""},{"media":{"_id":"677c555442c10e3600b16487","author":"","authorLink":"","type":"library","url":"https://cdn.durable.co/blocks/23DOO60P0zirjhHXt38zXcuFHhYCtqoHReYBMwZqaF6NyvQr84mLLhi58424liKI.png","key":"blocks/23DOO60P0zirjhHXt38zXcuFHhYCtqoHReYBMwZqaF6NyvQr84mLLhi58424liKI.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-06T22:12:36.055Z","brandingToWebsite":false,"__v":0,"id":"677c555442c10e3600b16487"},"idx":2,"altText":""},{"media":{"_id":"677c561f5b4cb19034a1b41a","author":"","authorLink":"","type":"library","url":"https://cdn.durable.co/blocks/3bl1QA9D1i0Vz4vKv2vpdIsUGp1dVZ1xOTno20xf6X2eBmmVFYCmDcZagrShheqa.png","key":"blocks/3bl1QA9D1i0Vz4vKv2vpdIsUGp1dVZ1xOTno20xf6X2eBmmVFYCmDcZagrShheqa.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-06T22:15:59.445Z","brandingToWebsite":false,"__v":0,"id":"677c561f5b4cb19034a1b41a"},"idx":3,"altText":""},{"media":{"_id":"677c566a9a3310846ffcc7c0","author":"","authorLink":"","type":"library","url":"https://cdn.durable.co/blocks/dOHC2EpEyYL3c6kPKOaMZz6VWEETLoey2uPkWoHP5Ol0bB1UKOXthSSRDzxwkAEu.png","key":"blocks/dOHC2EpEyYL3c6kPKOaMZz6VWEETLoey2uPkWoHP5Ol0bB1UKOXthSSRDzxwkAEu.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-06T22:17:14.340Z","brandingToWebsite":false,"__v":0,"id":"677c566a9a3310846ffcc7c0"},"idx":4,"altText":""},{"idx":5,"media":{"_id":"677c56fa650d4e77279e93d5","author":"","authorLink":"","type":"library","url":"https://cdn.durable.co/blocks/254Z0CBhxNxmL8AAsN2BMtoQfqlpZ7t7UinacoDCEvnKm12waLSrf0f1MydVyTVJ.png","key":"blocks/254Z0CBhxNxmL8AAsN2BMtoQfqlpZ7t7UinacoDCEvnKm12waLSrf0f1MydVyTVJ.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-06T22:19:38.248Z","brandingToWebsite":false,"__v":0,"id":"677c56fa650d4e77279e93d5"},"altText":""},{"idx":6,"media":{"_id":"677c57634079e9640ab780b6","author":"","authorLink":"","type":"library","url":"https://cdn.durable.co/blocks/16BIndYIcAsTBDVlRdMU2YXQ33K7540pY59qGo1fbeZoQxnHpDw4Xa73ePnQzH42.png","key":"blocks/16BIndYIcAsTBDVlRdMU2YXQ33K7540pY59qGo1fbeZoQxnHpDw4Xa73ePnQzH42.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-06T22:21:23.158Z","brandingToWebsite":false,"__v":0,"id":"677c57634079e9640ab780b6"},"altText":""},{"idx":7,"media":{"_id":"677c57e3acc86afa3f6e56fe","author":"","authorLink":"","type":"library","url":"https://cdn.durable.co/blocks/1fBI37DkbfGjtu6RgqRViCZaeCzZeVYAOVUGmeMNMcXbm3LFfZgXY8I1apcOWv8e.png","key":"blocks/1fBI37DkbfGjtu6RgqRViCZaeCzZeVYAOVUGmeMNMcXbm3LFfZgXY8I1apcOWv8e.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-06T22:23:31.718Z","brandingToWebsite":false,"__v":0,"id":"677c57e3acc86afa3f6e56fe"},"altText":""},{"idx":8,"media":{"_id":"677d47d94079e9640ac4021e","author":"","authorLink":"","type":"library","url":"https://cdn.durable.co/blocks/15pFWknfGBkx9q807d7djuToWyLd14yGqt1vw5F0MCiDx8b5GC7Unbgf3n6AzNFg.png","key":"blocks/15pFWknfGBkx9q807d7djuToWyLd14yGqt1vw5F0MCiDx8b5GC7Unbgf3n6AzNFg.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-07T15:27:21.372Z","brandingToWebsite":false,"__v":0,"id":"677d47d94079e9640ac4021e"},"altText":""},{"idx":9,"media":{"_id":"677d473c4079e9640ac3f61c","author":"","authorLink":"","type":"library","url":"https://cdn.durable.co/blocks/2cjD9ZOIhcpd75scDPnlRUoczRKsKJ9JhqjSRt0TUXYstwLSjcIFSPVo76ye4EIR.png","key":"blocks/2cjD9ZOIhcpd75scDPnlRUoczRKsKJ9JhqjSRt0TUXYstwLSjcIFSPVo76ye4EIR.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-07T15:24:44.851Z","brandingToWebsite":false,"__v":0,"id":"677d473c4079e9640ac3f61c"},"altText":""},{"idx":10,"media":{"_id":"677d5cdd9a3310846f0bae7d","author":"","authorLink":"","type":"library","url":"https://cdn.durable.co/blocks/0cTzByOfsQlhAdPqcn5XV3X11iUYlcvNaWaRd70fCR67FD8fO712FmsieXYlGOVp.png","key":"blocks/0cTzByOfsQlhAdPqcn5XV3X11iUYlcvNaWaRd70fCR67FD8fO712FmsieXYlGOVp.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-07T16:57:01.275Z","brandingToWebsite":false,"__v":0,"id":"677d5cdd9a3310846f0bae7d"},"altText":""},{"idx":11,"media":{"_id":"677d5cf342c10e3600c148f8","author":"","authorLink":"","type":"library","url":"https://cdn.durable.co/blocks/16mN3VPVZHHwDnC8rbIVm09rZBGDQQHodySV997Wd7LCDgGldI98ilGT3tWPIAjR.png","key":"blocks/16mN3VPVZHHwDnC8rbIVm09rZBGDQQHodySV997Wd7LCDgGldI98ilGT3tWPIAjR.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-07T16:57:23.174Z","brandingToWebsite":false,"__v":0,"id":"677d5cf342c10e3600c148f8"},"altText":""}],"divider":"swoopRight","border":null},{"_id":"67bcdf18ece7ac288296a5e7","WebsiteBlock":{"_id":"629f98a1eb0b4972268051a6","type":"list","name":"List","source":"durable","category":"section","order":10,"taxonomy":"section","categories":["services"]},"logging":[],"type":"service-list","idx":5,"items":[{"title":"Comprehensive Security Assessments","content":"\u003cp\u003eOur team of cybersecurity experts conduct thorough evaluations to uncover vulnerabilities and analyze risks. We'll develop customized strategies to fortify your defenses and keep you resilient against evolving threats.\u003c/p\u003e","idx":0,"button":{"label":"More info","type":"section","link":"677d65617bfc733936cecfba"},"image":{"_id":"67bcdccdd2938379e0b87311","type":"getty","preview":"https://media.gettyimages.com/id/1382912667/photo/secure-internet-conceptual-backgrounds.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=luiiQcVONewq7xJNGGZa9kqtTlwqstHO6FTIljeKKGo=","url":"https://cdn.durable.co/getty/2b7McVyPoPmd2Ms4cM5swOr0cnyHCPImLjekJY86x78IgOJBDY4BAhM4oKblLMXb.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-24T20:55:41.699Z","download":"1382912667","description":"Secure internet conceptual backgrounds","brandingToWebsite":false,"__v":0,"id":"67bcdccdd2938379e0b87311"},"imageAltText":"Secure internet conceptual backgrounds","icon":{"media":{"_id":"67bcde93d2938379e0b8856b","author":"Arthur Shlain","authorLink":"https://thenounproject.com/term/security/126839?utm_source=Durable.co\u0026utm_medium=referral","type":"icon","preview":"https://static.thenounproject.com/png/126839-200.png","url":"https://static.thenounproject.com/png/126839-200.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-24T21:03:15.980Z","description":"Security","brandingToWebsite":false,"__v":0,"id":"67bcde93d2938379e0b8856b"},"color":"#960000"}},{"title":"Regulatory Compliance Support","content":"\u003cp\u003eNavigating complex compliance requirements like ITAR and SOX can be challenging. We'll guide you every step of the way, ensuring your organization meets all necessary standards.\u003c/p\u003e","idx":1,"button":{"label":"More info","type":"section","link":"677d65617bfc733936cecfba"},"image":{"_id":"67bcdad45d09e9badf705f65","type":"getty","preview":"https://media.gettyimages.com/id/1186648738/photo/businessman-and-internet-security-concept.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=Z7nsdWfQAET5P-XfuEG1M8n6heOqBHSrY4-BPykoEag=","url":"https://cdn.durable.co/getty/12rrTo1lCk48N6pw5htKszChgFHU6teApT8xKRPWVqEsFyldDrZl6GcJ1IXIUX1o.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-24T20:47:16.589Z","download":"1186648738","description":"Businessman and Internet Security concept","brandingToWebsite":false,"__v":0,"id":"67bcdad45d09e9badf705f65"},"imageAltText":"Businessman and Internet Security concept","icon":{"media":{"_id":"67bcde6bd2938379e0b88397","author":"Gregor Cresnar","authorLink":"https://thenounproject.com/term/guide/805835?utm_source=Durable.co\u0026utm_medium=referral","type":"icon","preview":"https://static.thenounproject.com/png/805835-200.png","url":"https://static.thenounproject.com/png/805835-200.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-24T21:02:35.691Z","description":"guide","brandingToWebsite":false,"__v":0,"id":"67bcde6bd2938379e0b88397"},"color":"#960000"}},{"title":"Strategic Security Leadership","content":"\u003cp\u003eOur virtual CISO service provides the high-level security expertise you need to align your cybersecurity initiatives with your broader business goals. Let us help you maximize the value of your security investments.\u003c/p\u003e","idx":2,"button":{"label":"More info","type":"section","link":"677d65617bfc733936cecfba"},"image":{"_id":"67bcdada5d09e9badf705f70","type":"getty","preview":"https://media.gettyimages.com/id/1677375105/photo/cloud-computing-security-cloud-security-email-phishing-ransomware-malware-hacker-attack-cyber.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=8Lhqw3lE6jvB2az4IxOc0hJhQaJfoh7bLKcHRs7puC4=","url":"https://cdn.durable.co/getty/18xSTyIrvb9NO32rwqlRYmSkC5VvOTIw6V6Q0xT4B3tKE512cvOlrHeRmXNGqWoj.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-24T20:47:22.588Z","download":"1677375105","description":"Cloud Computing Security, Cloud Security, Email Phishing Ransomware Malware Hacker Attack Cyber Security Lock","brandingToWebsite":false,"__v":0,"id":"67bcdada5d09e9badf705f70"},"imageAltText":"Cloud Computing Security, Cloud Security, Email Phishing Ransomware Malware Hacker Attack Cyber Security Lock","icon":{"media":{"_id":"67bcdedc3ee40435f9251e6b","author":"John T. Garcia","authorLink":"https://thenounproject.com/term/security/153546?utm_source=Durable.co\u0026utm_medium=referral","type":"icon","preview":"https://static.thenounproject.com/png/153546-200.png","url":"https://static.thenounproject.com/png/153546-200.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-24T21:04:28.449Z","description":"Security","brandingToWebsite":false,"__v":0,"id":"67bcdedc3ee40435f9251e6b"},"color":"#960000"}}],"showImage":false,"showIcon":true,"showHeading":true,"showContent":true,"showButton":false,"headline":"Strategic Services","cornerRadius":"default","layers":{"image":{"enabled":false},"overlay":{"type":"gradient","direction":null,"color2":"#040404","color1":"#2d0102"},"foreground":{"accent":"#990a0c"},"palette":"custom"},"spacing":{"minHeight":"min-h-60","top":"medium","bottom":"medium"},"align":"center","imageFit":"cover","aspectRatio":"16:9","itemsSize":"medium","textSettings":{"position":"below","background":{"color":"#000000","amount":80}},"button":{"label":"Contact","type":"url","link":"#","style":{"name":"style1"}},"content":"Proactively defending your business with tailored security strategies, advanced threat intelligence, and risk-driven solutions to stay ahead of cyber threats.\n","fullContentLink":false,"divider":"pointUp"},{"_id":"67bcdbdeece7ac288296a5e5","WebsiteBlock":{"_id":"629f98a1eb0b4972268051a6","type":"list","name":"List","source":"durable","category":"section","order":10,"taxonomy":"section","categories":["services"]},"logging":[],"type":"service-list","idx":6,"items":[{"title":"Security Architecture","content":"\u003cp style=\"text-align: left;\"\u003eRobust security infrastructure solutions designed to meet your unique needs.\u003cbr /\u003e\u003cbr /\u003e•Security Architecture \u0026amp; Design: We craft custom security blueprints tailored to your specific environment and threat landscape.\u003cbr /\u003e\u003cbr /\u003e•Security Assessments \u0026amp; Audits: Proactive identification of vulnerabilities and weaknesses before they can be exploited.\u003c/p\u003e","idx":0,"button":{"label":"More info","type":"section","link":"677d65617bfc733936cecfba"},"image":{"_id":"67bcdccdd2938379e0b87311","type":"getty","preview":"https://media.gettyimages.com/id/1382912667/photo/secure-internet-conceptual-backgrounds.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=luiiQcVONewq7xJNGGZa9kqtTlwqstHO6FTIljeKKGo=","url":"https://cdn.durable.co/getty/2b7McVyPoPmd2Ms4cM5swOr0cnyHCPImLjekJY86x78IgOJBDY4BAhM4oKblLMXb.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-24T20:55:41.699Z","download":"1382912667","description":"Secure internet conceptual backgrounds","brandingToWebsite":false,"__v":0,"id":"67bcdccdd2938379e0b87311"},"imageAltText":"Secure internet conceptual backgrounds","icon":{"color":"#960000"}},{"title":"Project Implementation","content":"\u003cp style=\"text-align: left;\"\u003eSeamless deployment of your customized security solutions.\u003cbr /\u003e\u003cbr /\u003e•Expert Deployment: Our skilled professionals ensure smooth integration with minimal disruption.\u003cbr /\u003e\u003cbr /\u003e•Efficient Execution: We prioritize effective delivery and optimal performance.\u003cbr /\u003e\u003cbr /\u003e•Enhanced Confidence: Empowering your organization with a stronger, more resilient cybersecurity posture.\u003c/p\u003e","idx":1,"button":{"label":"More info","type":"section","link":"677d65617bfc733936cecfba"},"image":{"_id":"67bcdad45d09e9badf705f65","type":"getty","preview":"https://media.gettyimages.com/id/1186648738/photo/businessman-and-internet-security-concept.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=Z7nsdWfQAET5P-XfuEG1M8n6heOqBHSrY4-BPykoEag=","url":"https://cdn.durable.co/getty/12rrTo1lCk48N6pw5htKszChgFHU6teApT8xKRPWVqEsFyldDrZl6GcJ1IXIUX1o.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-24T20:47:16.589Z","download":"1186648738","description":"Businessman and Internet Security concept","brandingToWebsite":false,"__v":0,"id":"67bcdad45d09e9badf705f65"},"imageAltText":"Businessman and Internet Security concept","icon":{"color":"#960000"}},{"title":"Post Implementation Support","content":"\u003cp\u003eOngoing maintenance and expert assistance.\u003cbr /\u003e\u003cbr /\u003e•Proactive Monitoring: Continuous vigilance against emerging threats.\u003cbr /\u003e\u003cbr /\u003e•Responsive Support: Timely resolution of issues and quick response to incidents.\u003c/p\u003e","idx":2,"button":{"label":"More info","type":"section","link":"677d65617bfc733936cecfba"},"image":{"_id":"67bcdada5d09e9badf705f70","type":"getty","preview":"https://media.gettyimages.com/id/1677375105/photo/cloud-computing-security-cloud-security-email-phishing-ransomware-malware-hacker-attack-cyber.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=8Lhqw3lE6jvB2az4IxOc0hJhQaJfoh7bLKcHRs7puC4=","url":"https://cdn.durable.co/getty/18xSTyIrvb9NO32rwqlRYmSkC5VvOTIw6V6Q0xT4B3tKE512cvOlrHeRmXNGqWoj.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-24T20:47:22.588Z","download":"1677375105","description":"Cloud Computing Security, Cloud Security, Email Phishing Ransomware Malware Hacker Attack Cyber Security Lock","brandingToWebsite":false,"__v":0,"id":"67bcdada5d09e9badf705f70"},"imageAltText":"Cloud Computing Security, Cloud Security, Email Phishing Ransomware Malware Hacker Attack Cyber Security Lock","icon":{"color":"#960000"}}],"showImage":false,"showIcon":true,"showHeading":true,"showContent":true,"showButton":false,"headline":"Security thought leadership, every step of the way","cornerRadius":"default","layers":{"image":{"enabled":false},"overlay":{"type":"gradient","direction":null,"color2":"#040404","color1":"#2d0102"},"foreground":{"accent":"#990a0c"},"palette":"custom"},"spacing":{"minHeight":"min-h-60","top":"medium","bottom":"medium"},"align":"center","imageFit":"cover","aspectRatio":"16:9","itemsSize":"medium","textSettings":{"position":"below","background":{"color":"#000000","amount":80}},"button":{"label":"Contact","type":"url","link":"#","style":{"name":"style1"}},"content":"Delivering end-to-end solutions—from strategy to execution—to design, implement, and sustain secure, high-performance IT environments.\n\n","fullContentLink":false},{"_id":"67bce2f9ece7ac288296a5e8","WebsiteBlock":{"_id":"66155a719953bfb9a624a39c","type":"banner-carousel","name":"Banner carousel full","source":"durable","category":"section","order":2,"taxonomy":"section","categories":["banner"]},"logging":[],"type":"banner-carousel","idx":7,"headline":"","content":"","layers":{"image":{"enabled":true,"opacity":66,"blur":"none"},"overlay":{"type":"solid","direction":null,"color2":"#DEE8D9","color1":"#080000"},"foreground":{"accent":"#990a0c"},"palette":"custom","fade":{"palette":"color1","opacity":44,"color":"#000000","direction":"top-down","enabled":false}},"spacing":{"minHeight":"min-h-60","top":"large","bottom":"large"},"align":"right","combineWithHeader":false,"verticalAlign":"top","pictures":[{"idx":0,"media":{"_id":"67bca12d6860395085e01675","type":"getty","preview":"https://media.gettyimages.com/id/1351571961/photo/looking-directly-up-at-the-skyline-of-the-financial-district-in-central-london.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=c_C_ZmLgktSooUdImOdFNFUMnO9flWUcTxppAXbB0I0=","url":"https://cdn.durable.co/getty/14kkJ0DZTSCE6WKysAUOeyKyUYgYNbmrSDLRkSXrC1KiGWmclhJbutF6jEnPEVi9.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-24T16:41:17.325Z","download":"1351571961","description":"Looking directly up at the skyline of the financial district in central London","brandingToWebsite":false,"__v":0},"altText":"","positionX":"55%","positionY":"40%"}],"buttons":{"enabled":false,"items":[{"label":"Secure Your Network","type":"section","link":"677d65617bfc733936cecfba","style":{"name":"style2"}}]},"headingTextStyle":"sm","bodyTextStyle":"sm","animation":{"type":"none","speed":"medium"}},{"_id":"67be267dfe79b99307a1f7d8","WebsiteBlock":{"_id":"6570a3062a78964a11c2157f","type":"service-list","name":"Services","source":"durable","category":"section","order":4,"taxonomy":"section","categories":["services"]},"logging":[],"type":"service-list","idx":8,"items":[{"title":"Security Operations","content":"\u003cp class=\"small\" style=\"text-align: center;\"\u003eComprehensive support for your daily security needs.\u003cbr /\u003e\u003cbr /\u003e•Maintenance \u0026amp; Updates: Regular maintenance and timely updates to keep your systems secure.\u003cbr /\u003e•Proactive Threat Mitigation: We actively work to prevent breaches and attacks.\u003cbr /\u003e•System Overhauls: We provide comprehensive overhauls to modernize and enhance your security infrastructure when needed.\u003c/p\u003e","idx":0,"button":{"label":"More info","type":"url","link":"#"},"image":{"_id":"67bc9679d7a13772bb57bff9","type":"getty","preview":"https://media.gettyimages.com/id/1343499203/photo/lock-data-concept.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=EZ2DLMTkcAQbaXw7bMAUWhPlGxlHrLzgq7WXO3m_wx0=","url":"https://cdn.durable.co/getty/276qykSPKLwOo9pcI2CZIrWhogaTX647lL1NB1cPzyPVNat4LvXZi93Le5dDrMjC.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-24T15:55:37.759Z","download":"1343499203","description":"Lock. Data  Concept","brandingToWebsite":false,"__v":0},"imageAltText":"Lock. Data  Concept"},{"title":"Break-Fix","content":"\u003cp class=\"small\"\u003eRapid response to security incidents and system malfunctions.\u003cbr /\u003e\u003cbr /\u003e•Swift Diagnosis: Quick identification and resolution of issues.\u003cbr /\u003e•Effective Repairs: Reliable and efficient repair services for systems and vulnerabilities.\u003cbr /\u003e•Fortified Defenses: Strengthening your defenses to protect against future threats.\u003c/p\u003e","idx":1,"button":{"label":"More info","type":"url","link":"#"},"image":{"_id":"67bf6b57ff51c556a2a078c5","type":"getty","preview":"https://media.gettyimages.com/id/1343553378/photo/shot-of-two-technicians-using-a-digital-tablet-while-working-in-a-server-room.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=Hg7om-jz4IG-DGjgV0-YgweUWXCPMJzIjchvYELEVlg=","url":"https://cdn.durable.co/getty/1atyukw0odVDS5Ga6dvjuwJnqsBDiKD7uqMtT3pIpdPsJhBvr0qM96p4f5a1cOEW.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-26T19:28:23.741Z","download":"1343553378","description":"Shot of two technicians using a digital tablet while working in a server room","brandingToWebsite":false,"__v":0,"id":"67bf6b57ff51c556a2a078c5"},"imageAltText":"Shot of two technicians using a digital tablet while working in a server room"},{"title":"Upgrades \u0026 Enhancements","content":"\u003cp class=\"small\"\u003eKeeping your security solutions current and effective.\u003cbr /\u003e\u003cbr /\u003e•Technology Updates: We ensure your systems are always utilizing the latest technologies.\u003cbr /\u003e•Feature Enhancements: Regularly upgrade features to address evolving threats.\u003cbr /\u003e•Strategic Improvements: Continuously improve security posture through strategic upgrades.\u003c/p\u003e","idx":2,"button":{"label":"More info","type":"url","link":"#"},"image":{"_id":"67bf6b79a72ea34973bba84f","type":"getty","preview":"https://media.gettyimages.com/id/1597039529/photo/software-development-technology-and-innovation-gears-on-smartphone-screen.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=RKAkIUjZhYip532U6EVZskL0AcGkswI2hMc614g1pOc=","url":"https://cdn.durable.co/getty/3bmGQwrscyi4Eu5aOGB3nkwnjayV1gM3Li8XK240MM0cfyunnbLhWhXA3UJc6fFy.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-26T19:28:57.706Z","download":"1597039529","description":"Software development. Technology and innovation. Gears on smartphone screen","brandingToWebsite":false,"__v":0,"id":"67bf6b79a72ea34973bba84f"},"imageAltText":"Software development. Technology and innovation. Gears on smartphone screen"}],"showImage":true,"showIcon":false,"showHeading":true,"showContent":true,"showButton":false,"headline":"Operate Securely","cornerRadius":"default","layers":{"image":{"enabled":false},"overlay":{"type":"gradient","direction":null,"color2":"#2d0102","color1":"#040404"},"foreground":{"accent":"#3E990A"},"palette":"custom"},"spacing":{"minHeight":"min-h-60","top":"small","bottom":"small"},"align":"center","imageFit":"cover","aspectRatio":"16:9","itemsSize":"medium","textSettings":{"position":"covering","background":{"color":"#000000","amount":80}},"content":"Ensuring continuous threat detection, rapid response, and resilience for your business.\n"},{"_id":"67bde979203fa054c0195d86","WebsiteBlock":{"_id":"629f98a1eb0b4972268051a6","type":"list","name":"List","source":"durable","category":"section","order":10,"taxonomy":"section","categories":["services"]},"logging":[],"type":"service-list","idx":9,"items":[{"title":"Managed Security Service Provider (MSSP)","content":"\u003cp\u003eNext-gen Managed Security Services (MSSP) to safeguard your business against evolving cyber threats. Our 24/7 monitoring, proactive threat intelligence, and rapid response ensure your critical assets stay protected. \u003c/p\u003e","idx":0,"button":{"label":"More info","type":"section","link":"677d65617bfc733936cecfba"},"image":{"_id":"67bcbf69b7c1fee3e31964b4","type":"getty","preview":"https://media.gettyimages.com/id/540611944/photo/abstract-concept-internet-cyber-security-network-with-lock.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=rvGc52Xewx-WlTeXj303FHGvVvIa36EOv1xHf-M0rPo=","url":"https://cdn.durable.co/getty/12Kd7YPSZ3JdjCZtSjQoU8PVyHlzBMWwaL5I1TdDZDM3sNmZjOKIm8ABmtlforN0.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-24T18:50:17.242Z","download":"540611944","description":"Abstract concept Internet Cyber Security network with lock","brandingToWebsite":false,"__v":0},"imageAltText":"Abstract concept Internet Cyber Security network with lock"},{"title":"Infrastructure Managed Services","content":"\u003cp\u003eEnd-to-end Infrastructure Managed Services to keep your IT environment optimized, resilient, and future-ready. Our proactive monitoring, automation, and expert support ensure maximum uptime, security, and performance.\u003c/p\u003e","idx":1,"button":{"label":"More info","type":"section","link":"677d65617bfc733936cecfba"},"image":{"_id":"67bcbf10d0ec793a21d752cb","type":"getty","preview":"https://media.gettyimages.com/id/2108385037/photo/a-business-person-is-searching-chart-indexes-on-a-computer-screen.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=sA88WleuAAz5RQoQctnYyoTXCGFLbdSkVSAcdydwYNM=","url":"https://cdn.durable.co/getty/31PpplKq9Yny8QkmCODFu4YTjveDeDdskrZIiBFvFgQe3CIvsWblBjvOIkleUQk6.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-24T18:48:48.031Z","download":"2108385037","description":"A business person is searching chart indexes on a computer screen.","brandingToWebsite":false,"__v":0},"imageAltText":"A business person is searching chart indexes on a computer screen."}],"showImage":true,"showIcon":false,"showHeading":true,"showContent":true,"showButton":false,"headline":"Managed Services","cornerRadius":"default","layers":{"image":{"enabled":false},"overlay":{"type":"gradient","direction":null,"color1":"#040404","color2":"#2d0102"},"foreground":{"accent":"#3E990A"},"palette":"custom"},"spacing":{"minHeight":"min-h-60","top":"small","bottom":"none"},"align":"center","imageFit":"cover","aspectRatio":"16:9","itemsSize":"medium","textSettings":{"position":"below","background":{"color":"#000000","amount":80}},"button":{"label":"Contact","type":"url","link":"#","style":{"name":"style1"}},"content":"Get stronger security, seamless compliance, and reduced risk—so you can focus on growth with confidence.\n","fullContentLink":false,"divider":"slantLeft"},{"_id":"67bdeb8a203fa054c0195d8c","WebsiteBlock":{"_id":"629f98a1eb0b4972268051a2","type":"hero","name":"Text + image","source":"durable","category":"section","order":5,"taxonomy":"section","categories":["content"]},"logging":[],"type":"about","idx":10,"content":"\u003ch2 style=\"white-space:pre-line\"\u003eHardware \u0026amp; Software Sales\u003c/h2\u003e\n\u003cp\u003eProviding cutting-edge technology solutions with expert guidance to optimize performance, security, and scalability for your business.\u003c/p\u003e","image":{"media":{"_id":"67bcb05bd0ec793a21d6a551","url":"https://cdn.durable.co/blocks/2d2sU4kSYVf2hGT0ED93liOqteCVL81ilin6oLVRsu4zdRuNljATQyFI2HBw8hYc.jpg","author":"","authorLink":"","type":"library"},"altText":"","imageFit":"cover","align":"right","aspectRatio":"16:9","cornerRadius":"default","borderless":false},"layers":{"image":{"enabled":false},"overlay":{"type":"solid","direction":null,"color1":"#000000","color2":"#DEE8D9"},"foreground":{"accent":"#990a0c"},"palette":"custom"},"spacing":{"minHeight":"min-h-60","top":"none","bottom":"none"},"align":"middle","divider":"pointUp"},{"_id":"67be22eb643cc205b8d2389a","WebsiteBlock":{"_id":"629f98a1eb0b4972268051a6","type":"list","name":"List","source":"durable","category":"section","order":10,"taxonomy":"section","categories":["services"]},"logging":[],"type":"service-list","idx":11,"items":[{"title":"Next Gen Firewall \u0026 SASE","content":"\u003cp class=\"small\" style=\"text-align: justify;\"\u003eAdvanced threat detection and prevention, secure access to applications and data from any location, deep packet inspection, intrusion prevention, and application control.\u003c/p\u003e","idx":0,"button":{"label":"More info","type":"url","link":"#"},"image":{"_id":"67bc90d41de8d3a64ea9ee31","type":"getty","preview":"https://media.gettyimages.com/id/1918338945/photo/ai-artificial-intelligence-security-sentinel-password-cyber-security-ransomware-email.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=fp2nxh8A7jw6T1_HzQ_0gMyT_WYJZhOg-YacsFOa7dA=","url":"https://cdn.durable.co/getty/23hFOgjKDDzZhnv0j8socjQdTtomkTVXJa0W9gLxNSlvM8KbAigVbT1LY7bgjvgi.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-24T15:31:32.888Z","download":"1918338945","description":"AI Artificial Intelligence Security Sentinel Password Cyber Security Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured Lock","brandingToWebsite":false,"__v":0},"imageAltText":"AI Artificial Intelligence Security Sentinel Password Cyber Security Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured Lock","icon":{"media":{"_id":"67be198985d6b8f9daaa8280","author":"lastspark","authorLink":"https://thenounproject.com/term/wall-fire/1104749?utm_source=Durable.co\u0026utm_medium=referral","type":"icon","preview":"https://static.thenounproject.com/png/1104749-200.png","url":"https://static.thenounproject.com/png/1104749-200.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-25T19:27:05.693Z","description":"wall fire","brandingToWebsite":false,"__v":0,"id":"67be198985d6b8f9daaa8280"},"color":"#cf0515"}},{"title":"Email Security","content":"\u003cp class=\"small\" style=\"text-align: justify;\"\u003eProtection against phishing, malware, and spam, ensuring data confidentiality and compliance with data protection regulations.\u003c/p\u003e","idx":1,"button":{"label":"More info","type":"url","link":"#"},"image":{"_id":"67be1840894d64205a0ff4cc","type":"getty","preview":"https://media.gettyimages.com/id/1927794335/photo/password-cyber-security-ransomware-email-phishing-encrypted-technology-digital-information.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=rrXx9a1Tmyy2J0kx2RggiHMv8oQkuYvYf5VnRxyZFNQ=","url":"https://cdn.durable.co/getty/26OfS9dhfamEbi85gGw1HZjEcLO64Fkn2zrjMEzm0ff9sDOWWKBEOiLC7sODs7AH.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-25T19:21:36.952Z","download":"1927794335","description":"Password Cyber Security Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured Lock","brandingToWebsite":false,"__v":0,"id":"67be1840894d64205a0ff4cc"},"imageAltText":"Password Cyber Security Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured Lock","icon":{"media":{"_id":"67be19e9ad10c929ad6a4e34","author":"Creative Stall","authorLink":"https://thenounproject.com/term/email-security/995807?utm_source=Durable.co\u0026utm_medium=referral","type":"icon","preview":"https://static.thenounproject.com/png/995807-200.png","url":"https://static.thenounproject.com/png/995807-200.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-25T19:28:41.038Z","description":"Email Security","brandingToWebsite":false,"__v":0,"id":"67be19e9ad10c929ad6a4e34"},"color":"#cf0515"}},{"title":"Multi-Factor Authentication","content":"\u003cp class=\"small\" style=\"text-align: justify;\"\u003eExtra layer of security, significantly reducing the risk of unauthorized access, enhancing user authentication.\u003c/p\u003e","idx":2,"button":{"label":"More info","type":"url","link":"#"},"image":{"_id":"677d6a8dacc86afa3f7d613b","type":"getty","preview":"https://media.gettyimages.com/id/1777088857/photo/digital-security-concept.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=U5aOUckEJ0Tg4IEmWbosxTYSB2P3FVvTpdLYbMPfYUE=","url":"https://cdn.durable.co/getty/1bP3hxhMlWIXH3uYePBweyPQQz7ka16Gei51AnSukxD3SXgIjI3E6Q69QPv8ashY.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-07T17:55:25.514Z","download":"1777088857","description":"Digital security concept","brandingToWebsite":false,"__v":0},"imageAltText":"Digital security concept","icon":{"media":{"_id":"67be1b94894d64205a101857","author":"Arthur Shlain","authorLink":"https://thenounproject.com/term/shield/79511?utm_source=Durable.co\u0026utm_medium=referral","type":"icon","preview":"https://static.thenounproject.com/png/79511-200.png","url":"https://static.thenounproject.com/png/79511-200.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-25T19:35:48.561Z","description":"Shield","brandingToWebsite":false,"__v":0,"id":"67be1b94894d64205a101857"},"color":"#cf0515"}},{"image":null,"imageAltText":"","title":"Web Application Firewalls (WAF)","content":"\u003cp class=\"small\" style=\"text-align: justify;\"\u003eShields web applications from common exploits, maintaining the integrity and availability of web services, protecting against data leaks and service disruptions.\u003c/p\u003e","icon":{"media":{"_id":"67be1c2a931dd6fe68ca3009","author":"Kokota","authorLink":"https://thenounproject.com/term/web/926896?utm_source=Durable.co\u0026utm_medium=referral","type":"icon","preview":"https://static.thenounproject.com/png/926896-200.png","url":"https://static.thenounproject.com/png/926896-200.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-25T19:38:18.499Z","description":"web","brandingToWebsite":false,"__v":0,"id":"67be1c2a931dd6fe68ca3009"},"color":"#cf0515"},"button":null},{"image":null,"imageAltText":"","title":"Next-Gen Endpoint Protection","content":"\u003cp class=\"small\" style=\"text-align: justify;\"\u003eReal-time protection against malware, ransomware, and zero-day threats at the endpoint level, reducing the attack surface.\u003c/p\u003e","icon":{"media":{"_id":"67be1cb1894d64205a10250f","author":"artworkbean","authorLink":"https://thenounproject.com/term/devices/124255?utm_source=Durable.co\u0026utm_medium=referral","type":"icon","preview":"https://static.thenounproject.com/png/124255-200.png","url":"https://static.thenounproject.com/png/124255-200.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-25T19:40:33.423Z","description":"devices","brandingToWebsite":false,"__v":0,"id":"67be1cb1894d64205a10250f"},"color":"#cf0515"},"button":null},{"image":null,"imageAltText":"","title":"SD-WAN","content":"\u003cp class=\"small\" style=\"text-align: justify;\"\u003eOptimizes network performance, reduces costs, and improves security by integrating security services directly into the WAN.\u003c/p\u003e","icon":{"media":{"_id":"67be1cf2ad10c929ad6a6e9b","author":"Mourad Mokrane","authorLink":"https://thenounproject.com/term/wifi/31072?utm_source=Durable.co\u0026utm_medium=referral","type":"icon","preview":"https://static.thenounproject.com/png/31072-200.png","url":"https://static.thenounproject.com/png/31072-200.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-25T19:41:38.182Z","description":"wifi","brandingToWebsite":false,"__v":0,"id":"67be1cf2ad10c929ad6a6e9b"},"color":"#cf0515"},"button":null},{"image":null,"imageAltText":"","title":"Network Solutions (Switching, Routing, Monitoring)","content":"\u003cp class=\"small\" style=\"text-align: justify;\"\u003eEnsures network integrity, performance, and security through robust infrastructure, proactive threat detection, and efficient data transmission.\u003c/p\u003e","icon":{"media":{"_id":"67be1db9894d64205a102dd0","author":"Joel Avery","authorLink":"https://thenounproject.com/term/network/116760?utm_source=Durable.co\u0026utm_medium=referral","type":"icon","preview":"https://static.thenounproject.com/png/116760-200.png","url":"https://static.thenounproject.com/png/116760-200.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-25T19:44:57.172Z","description":"Network","brandingToWebsite":false,"__v":0,"id":"67be1db9894d64205a102dd0"},"color":"#cf0515"},"button":null},{"image":null,"imageAltText":"","title":"Technical Training","content":"\u003cp class=\"small\" style=\"text-align: justify;\"\u003ePersonalized and automated training services to educate resources on security best practices, and internal industry and organizational standards.\u003c/p\u003e","icon":{"media":{"_id":"67be1df9931dd6fe68ca42a6","author":"Creative Stall","authorLink":"https://thenounproject.com/term/training/1140373?utm_source=Durable.co\u0026utm_medium=referral","type":"icon","preview":"https://static.thenounproject.com/png/1140373-200.png","url":"https://static.thenounproject.com/png/1140373-200.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-25T19:46:01.544Z","description":"training","brandingToWebsite":false,"__v":0,"id":"67be1df9931dd6fe68ca42a6"},"color":"#cf0515"},"button":null}],"showImage":false,"showIcon":true,"showHeading":true,"showContent":true,"showButton":false,"headline":"Our Expertise \u0026 Capabilities","cornerRadius":"default","layers":{"image":{"enabled":false},"overlay":{"type":"gradient","direction":null,"color2":"#040404","color1":"#2d0102"},"foreground":{"accent":"#3E990A"},"palette":"custom"},"spacing":{"minHeight":"min-h-60","top":"medium","bottom":"medium"},"align":"center","imageFit":"cover","aspectRatio":"1:1","itemsSize":"large","textSettings":{"position":"below","background":{"color":"#000000","amount":80}},"content":"Leveraging deep industry knowledge and cutting-edge technology to deliver tailored, resilient, and future-ready security and infrastructure solutions.","iconSize":"w-24 h-24","listStyleType":"default","taglineStyle":"text","showSteps":false,"headingTextStyle":"lg","bodyTextStyle":"md","divider":"waveLeft"},{"_id":"67be24de643cc205b8d2389f","WebsiteBlock":{"_id":"629f98a1eb0b4972268051a6","type":"list","name":"List","source":"durable","category":"section","order":10,"taxonomy":"section","categories":["services"]},"logging":[],"type":"service-list","idx":12,"items":[{"title":"Financial Institutions","content":"\u003cp class=\"small\" style=\"text-align: justify;\"\u003eFortifying financial institutions with cutting-edge security, fraud prevention, and seamless compliance.\u003c/p\u003e","idx":0,"button":{"label":"More info","type":"url","link":"#"},"image":{"_id":"67bc90d41de8d3a64ea9ee31","type":"getty","preview":"https://media.gettyimages.com/id/1918338945/photo/ai-artificial-intelligence-security-sentinel-password-cyber-security-ransomware-email.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=fp2nxh8A7jw6T1_HzQ_0gMyT_WYJZhOg-YacsFOa7dA=","url":"https://cdn.durable.co/getty/23hFOgjKDDzZhnv0j8socjQdTtomkTVXJa0W9gLxNSlvM8KbAigVbT1LY7bgjvgi.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-24T15:31:32.888Z","download":"1918338945","description":"AI Artificial Intelligence Security Sentinel Password Cyber Security Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured Lock","brandingToWebsite":false,"__v":0},"imageAltText":"AI Artificial Intelligence Security Sentinel Password Cyber Security Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured Lock","icon":{"media":{"_id":"67be240593909b4d10a435e9","author":"Lorena Salagre","authorLink":"https://thenounproject.com/term/institution/32342?utm_source=Durable.co\u0026utm_medium=referral","type":"icon","preview":"https://static.thenounproject.com/png/32342-200.png","url":"https://static.thenounproject.com/png/32342-200.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-25T20:11:49.283Z","description":"Institution","brandingToWebsite":false,"__v":0,"id":"67be240593909b4d10a435e9"},"color":"#cf0515"}},{"title":"Manufacturing Organizations","content":"\u003cp class=\"small\" style=\"text-align: justify;\"\u003eProtecting industrial systems and processes with resilient cybersecurity and real-time threat defense.\u003c/p\u003e","idx":1,"button":{"label":"More info","type":"url","link":"#"},"image":{"_id":"67be1840894d64205a0ff4cc","type":"getty","preview":"https://media.gettyimages.com/id/1927794335/photo/password-cyber-security-ransomware-email-phishing-encrypted-technology-digital-information.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=rrXx9a1Tmyy2J0kx2RggiHMv8oQkuYvYf5VnRxyZFNQ=","url":"https://cdn.durable.co/getty/26OfS9dhfamEbi85gGw1HZjEcLO64Fkn2zrjMEzm0ff9sDOWWKBEOiLC7sODs7AH.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-25T19:21:36.952Z","download":"1927794335","description":"Password Cyber Security Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured Lock","brandingToWebsite":false,"__v":0,"id":"67be1840894d64205a0ff4cc"},"imageAltText":"Password Cyber Security Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured Lock","icon":{"media":{"_id":"67be242a96ad9a095152bfe3","author":"Trevor Dsouza","authorLink":"https://thenounproject.com/term/manufacturing/1534390?utm_source=Durable.co\u0026utm_medium=referral","type":"icon","preview":"https://static.thenounproject.com/png/1534390-200.png","url":"https://static.thenounproject.com/png/1534390-200.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-25T20:12:26.062Z","description":"manufacturing","brandingToWebsite":false,"__v":0,"id":"67be242a96ad9a095152bfe3"},"color":"#cf0515"}},{"title":"Engineering Services","content":"\u003cp class=\"small\" style=\"text-align: justify;\"\u003eSecuring critical data and optimizing IT infrastructure to keep innovation moving forward.\u003c/p\u003e","idx":2,"button":{"label":"More info","type":"url","link":"#"},"image":{"_id":"677d6a8dacc86afa3f7d613b","type":"getty","preview":"https://media.gettyimages.com/id/1777088857/photo/digital-security-concept.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=U5aOUckEJ0Tg4IEmWbosxTYSB2P3FVvTpdLYbMPfYUE=","url":"https://cdn.durable.co/getty/1bP3hxhMlWIXH3uYePBweyPQQz7ka16Gei51AnSukxD3SXgIjI3E6Q69QPv8ashY.jpeg","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-07T17:55:25.514Z","download":"1777088857","description":"Digital security concept","brandingToWebsite":false,"__v":0},"imageAltText":"Digital security concept","icon":{"media":{"_id":"67be248196ad9a095152c506","author":"DinosoftLabs","authorLink":"https://thenounproject.com/term/engineering/1254366?utm_source=Durable.co\u0026utm_medium=referral","type":"icon","preview":"https://static.thenounproject.com/png/1254366-200.png","url":"https://static.thenounproject.com/png/1254366-200.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-25T20:13:53.402Z","description":"Engineering","brandingToWebsite":false,"__v":0,"id":"67be248196ad9a095152c506"},"color":"#cf0515"}},{"image":null,"imageAltText":"","title":"Telecom Services","content":"\u003cp class=\"small\" style=\"text-align: justify;\"\u003eSafeguarding networks and communications with advanced threat detection and always-on reliability.\u003c/p\u003e","icon":{"media":{"_id":"67be24a304d0bccc9e185f85","author":"iconnut","authorLink":"https://thenounproject.com/term/telecom/4321616?utm_source=Durable.co\u0026utm_medium=referral","type":"icon","preview":"https://static.thenounproject.com/png/4321616-200.png","url":"https://static.thenounproject.com/png/4321616-200.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-02-25T20:14:27.845Z","description":"telecom","brandingToWebsite":false,"__v":0,"id":"67be24a304d0bccc9e185f85"},"color":"#cf0515"},"button":null}],"showImage":false,"showIcon":true,"showHeading":true,"showContent":true,"showButton":false,"headline":"Industry Focus","cornerRadius":"default","layers":{"image":{"enabled":false},"overlay":{"type":"gradient","direction":null,"color1":"#2d0102","color2":"#040404"},"foreground":{"accent":"#FFFFFF"},"palette":"custom"},"spacing":{"minHeight":"min-h-60","top":"medium","bottom":"medium"},"align":"center","imageFit":"cover","aspectRatio":"16:9","itemsSize":"small","textSettings":{"position":"below","background":{"color":"#000000","amount":80}},"content":"We understand the reality and challenges faced by our industry, and we bring a strong track record supporting our client's specific needs.\n","iconSize":"w-36 h-36","listStyleType":"default","taglineStyle":"text","showSteps":false,"headingTextStyle":"lg","bodyTextStyle":"md","divider":"slantLeft"},{"_id":"677d65617bfc733936cecfba","WebsiteBlock":{"_id":"629f98a1eb0b4972268051a9","type":"contact","name":"Contact form","source":"durable","category":"section","order":17,"taxonomy":"section","categories":["contact"]},"logging":[],"type":"contact","idx":13,"content":"\u003ch3\u003eContact Us\u003c/h3\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cstrong\u003eRequest a Consultation\u003c/strong\u003e\u003cbr /\u003eConnect with our team for personalized guidance.\u003cbr /\u003e\u003cbr /\u003e\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eDiscuss Your Needs\u003c/strong\u003e\u003cbr /\u003eExplore your current security posture and challenges.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cstrong\u003eReceive Tailored Solutions\u003c/strong\u003e\u003cbr /\u003eGet affordable and effective cybersecurity recommendations.\u003c/li\u003e\n\u003c/ul\u003e","sendButtonLabel":"Send","fields":[{"_id":"name","type":"text","name":"name","required":true,"label":"Name"},{"_id":"email","type":"text","name":"email","required":true,"label":"Email"},{"_id":"phone","name":"phone","fieldName":"phone","fieldType":"standard","type":"text","label":"Phone"},{"_id":"message","type":"textarea","name":"message","required":true,"label":"Message"}],"version":2,"button":{"style":{"name":"style2"}},"successMessage":"\u003ch3\u003eMessage sent!\u003c/h3\u003e\u003cp\u003eWe will get in touch with you as soon as possible.\u003c/p\u003e","layers":{"image":{"enabled":false},"overlay":{"type":"solid","direction":null,"color1":"#F5F6F4","color2":"#3E990A"},"palette":"custom","foreground":{"accent":"#0f0f0f"}},"spacing":{"minHeight":"min-h-60","top":"small","bottom":"small"},"align":"right","fieldStyle":{"opacity":8}},{"_id":"677d66747bfc733936cecfc5","WebsiteBlock":{"_id":"629f98a1eb0b4972268051a8","type":"location","name":"Location","source":"durable","category":"section","order":16,"taxonomy":"section","categories":["location"]},"logging":[],"type":"location","idx":14,"headline":"RDSEC LLC","address":"118 Vintage Park Blvd. Ste. W179 Houston, Texas, 77070","latLng":{"lat":29.99458389999999,"lng":-95.5736246},"cornerRadius":"medium","layers":{"image":{"enabled":false},"overlay":{"type":"gradient","direction":null,"color2":"#090909","color1":"#2d0102"},"foreground":{"accent":"#161513"},"palette":"custom"},"spacing":{"minHeight":"min-h-60","top":"small","bottom":"small"},"align":"left","style":"inline","theme":"dark","marker":"#FFFFFF","content":"","additional":[{"type":null,"link":"","content":"\u003cp\u003ePhone: +1 281-626-0009\u003c/p\u003e"},{"type":null,"link":"","content":"\u003cp\[email protected]\u003c/p\u003e"},{"type":null,"link":"","content":"\u003cp\u003ewww.rdsec.com\u003c/p\u003e"}],"headingTextStyle":"md","bodyTextStyle":"sm","animation":{"type":"slideFromBottom","speed":"slow"},"divider":"slantLeft"}],"order":0,"createdAt":"2025-01-06T21:50:54.309Z","seo":{"title":"RD Sec: Premier Cyber Security Solutions in Houston, TX","description":"RD Sec provides leading cyber security solutions in Houston, TX. Protect your business with our advanced security services. Contact us today to secure your data.","keywords":"cyber security,cybersecurity solutions,Houston cyber security,RD Sec,RD Sec Houston,cyber security business Texas,IT security solutions Houston,network security Houston,cyber protection Houston,cyber threat management Houston,cybersecurity services Texas,Houston IT security,cybersecurity company Houston,cybersecurity experts TX,cyber risk assessment Houston","headCode":"","footerCode":"","Image":{"_id":"677c504042c10e3600b11caf","type":"getty","preview":"https://media.gettyimages.com/id/1695598546/photo/businessman-using-tablet-to-transfer-data-on-cloud-computing-seamless-data-transfer-and.jpg?b=1\u0026s=2048x2048\u0026w=0\u0026k=20\u0026c=NvvaIiWqdESajZMH0tpDT6Xmu-ObA9rqY23rRFuYVpQ=","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-06T21:50:56.151Z","download":"1695598546","description":"Businessman using tablet to transfer data on cloud computing, seamless data transfer and strong internet security, server based communication on social networks, servers and storage.","brandingToWebsite":false,"url":"https://cdn.durable.co/getty/3aDiexJ6oh3QwQZI7EG5E7dKuTkDyetrv9u9bRU8QQce1Djguh3M4ix1AmR3FpYU.jpeg","__v":0}},"forceRender":false,"hideFromSitemap":false,"isCanonical":false,"__v":74,"updatedAt":"2025-01-14T21:38:41.336Z"},"website":{"_id":"677c503e42c10e3600b11c4d","isTemplate":false,"logo":null,"favicon":null,"primaryColor":"#FFFFFF","secondaryColor":"#DEE8D9","colorPalette":{"Palette":null,"colors":[{"color":"#FFFFFF","accent":"#3E990A"},{"color":"#DEE8D9","accent":"#161513"},{"color":"#F5F6F4","accent":"#3E990A"},{"color":"#3E990A","accent":"#FFFFFF"}]},"cornerRadius":"large","fonts":{"source":"custom","head":{"_id":"629f98a1eb0b4972268051ae","name":"Poppins","weight":300,"family":"'Poppins', sans-serif","active":true,"source":"google"},"body":{"_id":"629f98a1eb0b4972268051bd","name":"PT Serif","weight":400,"family":"'PT Serif', serif","active":true,"source":"google"},"custom":{"head":{"name":"Anybody","family":"'Anybody', display","weight":"700","style":"normal","variants":["100","200","300","400","500","600","700","800","900","100italic","200italic","300italic","400italic","500italic","600italic","700italic","800italic","900italic"],"id":"Anybody"},"body":{"name":"Inter","family":"'Inter', sans-serif","weight":"400","style":"normal","variants":["100","200","300","400","500","600","700","800","900","100italic","200italic","300italic","400italic","500italic","600italic","700italic","800italic","900italic"],"id":"Inter"}}},"button":null,"buttons":{"style1":{"cornerRadius":40,"type":"solid","size":"md"},"style2":{"cornerRadius":40,"type":"outline","size":"md"}},"status":"public","redirect":"to-root","widgets":[],"searchIndexing":true,"domain":"rdsec.co","subdomain":"rdsec","externalDomain":"rdsec.co","customDomain":"","durableDomain":"durablesites.com","Business":{"_id":"677c503d42c10e3600b11c41","name":"RD Sec","type":{"Type":"615f610338d3cef456b5a678","name":"cyber security solutions"},"stripeDetails":{"subscriptionStatus":"active","paymentsEnabled":false},"settings":{"ai":{"language":"en"}},"language":"en"},"seo":{"title":"","description":"","keywords":"","headCode":"","footerCode":"","Image":null},"emailProvider":null,"paletteMigratedAt":null,"social":[{"type":"linkedin","link":"company/rd-sec","idx":0}],"socialSettings":{"size":"medium","shape":"rounded","style":"solid"},"animation":{"type":"slideFromBottom","speed":"medium"},"embedContactConfig":{"fontSize":16,"font":"628fe251e7a2152e12ee4d53","button":{"label":"Send","padding":"medium","style":"solid","borderRadius":6,"backgroundColor":"#4338C9"},"field":{"borderRadius":6,"padding":"medium","backgroundColor":"#ffffff","showPhone":false,"showCompany":false},"customFields":[],"backgroundColor":"#ffffff"},"header":{"siteName":"RD Sec","logo":{"type":"image","showText":true,"showIcon":false,"source":"upload","media":{"_id":"67800ce2ff514caa36181de6","author":"","authorLink":"","type":"library","url":"https://cdn.durable.co/blocks/21OzaldofBx9itzs9x5F5oCduanVxV0GM6tu1VHGVW7dkhJ9Rr5PKTntTgj7zDum.png","key":"blocks/21OzaldofBx9itzs9x5F5oCduanVxV0GM6tu1VHGVW7dkhJ9Rr5PKTntTgj7zDum.png","Business":"677c503d42c10e3600b11c41","createdAt":"2025-01-09T17:52:34.211Z","brandingToWebsite":false,"__v":0},"height":{"desktop":97,"mobile":41}},"showSocial":true,"style":"full-center","navStyle":"default","fullWidth":false,"sticky":false,"buttons":{"enabled":true,"items":[{"label":"Get in Touch","link":"[email protected]","type":"email","style":{"name":"style2"}}]},"spacing":{"top":"small","bottom":"small","minHeight":"min-h-60"},"menu":{"collapse":false,"placement":"left","icon":"default"},"layers":{"palette":"color2","overlay":{"type":"solid","color1":"#be0303","color2":"#F5F6F4"},"foreground":{"accent":"#FFFFFF"},"image":{"enabled":false}}},"footer":{"siteName":"RD Sec","logoFrom":"header","logo":{"type":"image","showText":true,"showIcon":false,"source":"upload","height":{"desktop":80,"mobile":40},"variant":"secondary"},"style":"simple-center","showSocial":true,"madeWithDurable":false,"button":null,"spacing":{"top":"small","bottom":"small","minHeight":"min-h-60"},"layers":{"palette":"custom","image":{"enabled":false},"overlay":{"type":"gradient","color1":"#484848","color2":"#aa0204","direction":null},"foreground":{"accent":"#070707"}},"showAddress":false},"onboardingSurveyCompleted":false,"version":4,"generate":false,"generatedAt":"2025-01-06T21:50:54.232Z","domainSetAt":null,"allowRendering":true,"showLogo":false,"globalKeywords":{"primaryKeywords":["cyber security solutions","cybersecurity services","IT security","data protection"],"secondaryKeywords":["network security","cloud security","endpoint protection","threat detection"],"longtailKeywords":["best cybersecurity solutions in Houston","affordable IT security services Houston","customized cyber protection plans Houston","comprehensive data protection strategies"],"geoSpecificKeywords":["cybersecurity services Houston TX","IT security solutions in Houston Texas","Houston network security specialists"],"seasonalAndEventKeywords":["holiday cyber safety tips for businesses","back to school cybersecurity measures"],"relatedServiceKeywords":["managed IT services Houston","Houston data recovery solutions"],"competitiveKeywords":["advanced threat protection systems","enterprise cybersecurity consulting"],"competitorKeywords":["cyber defense companies in Houston","top cybersecurity firms Texas"],"trendBasedKeywords":["AI-driven cybersecurity solutions","zero trust architecture implementation"],"contentAndFAQKeywords":["how to choose a cyber security provider in Houston?","what are the benefits of endpoint protection?"]},"language":"en","pages":[{"_id":"677c503e42c10e3600b11c60","label":"HOME","showOnHeader":true,"showOnFooter":true,"slug":null,"forceRender":false},{"_id":"677e93e608f5b93de996d7f6","label":"PARTNERS","showOnHeader":true,"showOnFooter":true,"slug":"partners-2","forceRender":false}],"rawDomain":"rdsec.co"},"apiUrl":"https://api.durable.co","captchaKey":"6Leu0w4eAAAAAN0DPcebVt2LMLmRMOIocTcPheC0","ipAddress":"2a01:4f9:4b:3f5f::2","pt":null},"__N_SSP":true},"page":"/[[...slug]]","query":{},"buildId":"ZEoysBzbQXY3XeUfn60yS","isFallback":false,"dynamicIds":[82258,50866,76383,40925,29910,32289,71552],"gssp":true,"locale":"en","locales":["en","de","es","fr","it","nl","pt"],"defaultLocale":"en","scriptLoader":[]}</script></body></html>                               

Whois info of domain

Domain Name: RDSEC.COM
Registry Domain ID: 1985353464_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Updated Date: 2024-12-20T04:18:38Z
Creation Date: 2015-12-03T08:47:55Z
Registry Expiry Date: 2025-12-03T08:47:55Z
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrar Abuse Contact Email: [email protected]
Registrar Abuse Contact Phone: 480-624-2505
Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
Name Server: MARIA.NS.CLOUDFLARE.COM
Name Server: MATT.NS.CLOUDFLARE.COM
DNSSEC: unsigned
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of whois database: 2025-05-09T12:30:07Z <<<
For more information on Whois status codes, please visit https://icann.org/epp
NOTICE: The expiration date displayed in this record is the date the
TERMS OF USE: You are not authorized to access or query our Whois
by the following terms of use: You agree that you may use this Data only
to: (1) allow, enable, or otherwise support the transmission of mass