IT Security Solutions
[/et_pb_text][et_pb_button button_text=”Talk With An Expert” module_class=”custom-chatra-button” _builder_version=”4.16″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#47d7ff” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(23,102,193,0.46)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://snappytechs.com/wp-content/uploads/2020/02/cyber-security-06-1.png” align=”right” _builder_version=”4.16″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”-10vw|0vw||” custom_margin_tablet=”-2vw|0vw||” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_6,1_6,1_6,1_6,1_6,1_6″ use_custom_gutter=”on” gutter_width=”2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_button button_text=”Threat Discovery” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_button button_text=”Endpoint Security” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_button button_text=”Vulnerabilities” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_button button_text=”Security Training” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_button button_text=”Incident Report” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_button button_text=”Intro Assessment ” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.16″ z_index=”0″ width=”100%” max_width=”none” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://snappytechs.com/wp-content/uploads/2020/02/cyber-security-13.png” show_bottom_space=”off” force_fullwidth=”on” _builder_version=”4.16″ custom_margin=”0vw||-2px” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Contact Form” _builder_version=”4.16″ background_color=”#f1fafe” z_index=”10″ bottom_divider_height=”26vw” bottom_divider_flip=”horizontal” locked=”off” global_colors_info=”{}”][et_pb_row column_structure=”1_3,1_3,1_3″ custom_padding_last_edited=”on|phone” _builder_version=”4.16″ background_color=”#ffffff” z_index=”1″ custom_margin=”-24vw|auto|-16vw|auto||” custom_padding=”60px|60px|60px|60px|true|true” custom_padding_tablet=”|40px||40px||true” custom_padding_phone=”|20px||20px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” locked=”off” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_blurb title=”Managed Security” image=”https://snappytechs.com/wp-content/uploads/2020/02/cyber-security-icon-29.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” text_orientation=”center” locked=”off” global_colors_info=”{}”]We assess the current threats and risks that your business faces, and design and implement future-proof solutions that will protect your business for the long term.
[/et_pb_blurb][et_pb_blurb title=” System Security Review” image=”https://snappytechs.com/wp-content/uploads/2020/02/cyber-security-icon-16.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” text_orientation=”center” locked=”off” global_colors_info=”{}”]A diminished trust from clients due to their data being exposed online, and hefty fines from potential lawsuits. We can help prevent a data breach. Get in touch to learn more about how our services can help you.
[/et_pb_blurb][et_pb_blurb title=”End Point Security” image=”https://snappytechs.com/wp-content/uploads/2020/02/cyber-security-icon-28.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” text_orientation=”center” locked=”off” global_colors_info=”{}”]We help setup systems to protect the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_blurb title=”Security Consulting” image=”https://snappytechs.com/wp-content/uploads/2020/02/cyber-security-icon-15.png” _builder_version=”4.17.4″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” text_orientation=”center” hover_enabled=”0″ locked=”off” global_colors_info=”{}” sticky_enabled=”0″]Do you have questions on how to improve the security of your data? Are you worried that there could be a data breach? Our security experts will help you find answers.
[/et_pb_blurb][et_pb_blurb title=”Biometrics Security” image=”https://snappytechs.com/wp-content/uploads/2020/02/cyber-security-icon-6.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” text_orientation=”center” locked=”off” global_colors_info=”{}”]Unauthorized access becomes more difficult when systems require multiple means of authentication. We use biometric data to help secure your systems and provide convenient authentication methods.
[/et_pb_blurb][et_pb_blurb title=” Vulnerability Management” image=”https://snappytechs.com/wp-content/uploads/2020/02/cyber-security-icon-21.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” text_orientation=”center” locked=”off” global_colors_info=”{}”]We assist you in the management of your security on a 24/7 basis, and we employ proactive measures to patch vulnerabilities before they are exploited.
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_blurb title=”Digital Forensics” image=”https://snappytechs.com/wp-content/uploads/2020/02/cyber-security-icon-14.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” text_orientation=”center” locked=”off” global_colors_info=”{}”]We work to retrieve data that were thought to be lost, corrupted, or deleted either accidentally or maliciously, and investigate potential criminal activities on a computer device or a network
[/et_pb_blurb][et_pb_blurb title=”Security Monitoring” image=”https://snappytechs.com/wp-content/uploads/2020/02/cyber-security-icon-10.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” text_orientation=”center” locked=”off” global_colors_info=”{}”]Our Security Monitoring solutions will help detect arising incidents and problems, keep records of events for troubleshooting, and can be consulted by an incident response team for all kinds of investigations.
[/et_pb_blurb][et_pb_blurb title=”Threat Detection & Response” image=”https://snappytechs.com/wp-content/uploads/2020/02/cyber-security-icon-13.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” text_orientation=”center” locked=”off” global_colors_info=”{}”]We monitor system events such as authentication, file system access and hardware failures, to network activity finding any vulnerabilities.
[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ prev_background_color=”#f1fafe” next_background_color=”#ffffff” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_stops=”#004183 0%|#001f4c 100%” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” custom_margin=”||22vw|||” custom_padding=”24vw||8vw||false|” top_divider_style=”slant” top_divider_height=”27vw” top_divider_flip=”horizontal” bottom_divider_style=”slant” bottom_divider_height=”27vw” bottom_divider_flip=”horizontal” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ max_width=”800px” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”Overpass|300|||||||” header_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Overpass|600|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” text_orientation=”center” background_layout=”dark” custom_margin=”||” custom_padding=”|||||” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]Industries
We Serve a Variety of Businesses & Industries
We offers a wide range of Information Security services to a wide range of clientele, ranging from small, medium and enterprise, health care, government other industries. Our services at aimed at protecting your business data assets and mitigating against security incidents. We partner with our clients from start to finish, focusing on areas of risk while proactively thinking outside the box by developing effective remediation strategies and security controls.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ _builder_version=”4.16″ locked=”off” global_colors_info=”{}”][et_pb_column type=”1_4″ _builder_version=”4.16″ background_color=”#ffffff” transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|240px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|tablet” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|tablet” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” global_colors_info=”{}”][et_pb_blurb title=”Online Stores” image=”https://snappytechs.com/wp-content/uploads/2020/02/cyber-security-icon-40.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” text_orientation=”center” global_colors_info=”{}”][/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ background_color=”#ffffff” transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|160px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|tablet” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|tablet” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” global_colors_info=”{}”][et_pb_blurb title=”Health Care” image=”https://snappytechs.com/wp-content/uploads/2020/02/cyber-security-icon-41.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_link_font=”|600|||||||” body_link_text_color=”#00b4ff” text_orientation=”center” locked=”off” global_colors_info=”{}”][/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ background_color=”#ffffff” transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|80px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|tablet” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|tablet” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” global_colors_info=”{}”][et_pb_blurb title=”Government” image=”https://snappytechs.com/wp-content/uploads/2020/02/cyber-security-icon-31.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_link_font=”|600|||||||” body_link_text_color=”#00b4ff” text_orientation=”center” locked=”off” global_colors_info=”{}”][/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ background_color=”#ffffff” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” global_colors_info=”{}”][et_pb_blurb title=”Software” image=”https://snappytechs.com/wp-content/uploads/2020/02/cyber-security-icon-13.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” text_orientation=”center” locked=”off” global_colors_info=”{}”][/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#3122b2 0%|#00ffd8 100%” background_color_gradient_start=”#3122b2″ background_color_gradient_end=”#00ffd8″ background_image=”https://snappytechs.com/wp-content/uploads/2020/02/cyber-security-17.png” z_index=”10″ overflow-x=”visible” overflow-y=”visible” custom_padding=”||10vw|||” locked=”off” global_colors_info=”{}”][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”4.16″ background_color=”#ffffff” custom_margin=”-146px|auto|-2px|auto||” custom_padding=”0px||0px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”40px” box_shadow_blur=”60px” box_shadow_spread=”-8px” box_shadow_color=”rgba(10,45,97,0.48)” locked=”off” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ custom_padding=”60px|40px|60px|40px|true|true” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]Contact Us
[/et_pb_text][et_pb_blurb title=”(613) 606-8881″ use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”][/et_pb_blurb][et_pb_blurb title=”428 Rideau St, Ottawa, ON, K1N5Z1″ use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”]Monday-Friday: 10:30am – 7pm
[/et_pb_blurb][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00f6ff 0%|#00ffbf 100%” background_color_gradient_start=”#00f6ff” background_color_gradient_end=”#00ffbf” background_image=”https://snappytechs.com/wp-content/uploads/2020/02/cyber-security-010-1.png” background_size=”contain” background_position=”bottom_left” transform_translate_linked=”off” custom_padding=”60px|40px|60px|20%|true” custom_padding_tablet=”80px|||40px” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” background_last_edited=”on|desktop” background_image_tablet=”http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-11.png” background_enable_image_tablet=”on” background_position_tablet=”top_left” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” text_orientation=”center” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” text_text_align=”center” locked=”off” global_colors_info=”{}”]Get Started
[/et_pb_text][et_pb_text _builder_version=”4.16″ text_font=”Overpass|300|||||||” text_text_color=”#0a2d61″ text_orientation=”center” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]Get in touch with us for all your security needs.
[/et_pb_text][et_pb_button button_text=”Book Appointment” button_alignment=”center” module_class=”custom-chatra-button” _builder_version=”4.16″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]