[vc_row css=”.vc_custom_1451198507230{padding-top: 40px !important;}”][vc_column width=”1/4″][/vc_column][vc_column overlap_index=”50″ width=”2/3″ animation=”slideInDown”][vc_custom_heading text=”Just need to secure yourself digitally, here we are! Desktop, laptop, Mobile, or Cloud, on every front we got you backed up! As a comprehensive Managed Service Provider, we are safeguarding you. Our 24/7 RMM keeps you informed as well as let our NOC and SOC Team respond, in case of a Breach.” font_container=”tag:p|font_size:22px|text_align:center|line_height:36px” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal”][/vc_column][/vc_row][vc_row padding_size=”xl-padding” background_position=”center bottom” parallax=”parallax” bg_image_url=”http://wydethemes.com/overlap/wp-content/uploads/2015/12/overlap-bg-027-2-150×150.jpg” background_image=”3046″][vc_column][vc_row_inner overlap=”top” overlap_distance=”80px” overlap_index=”50″][vc_column_inner width=”1/4″ background_color=”#f9f9f9″][wyde_info_box icon_set=”simple_line” icon_size=”large” color=”#8accff” icon_simple_line=”sl-rocket” title=”CSIRT” link=”||”]Computer Security Incident Response Team, is our dedicated trained professional available to be dispatched in moment in event of a breach[/wyde_info_box][/vc_column_inner][vc_column_inner width=”1/4″ background_color=”#ffffff”][wyde_info_box icon_set=”simple_line” icon_size=”large” color=”#619187″ icon_simple_line=”sl-diamond” title=”Forensic” link=”||”]Our forensic team can be on the site by our CSIRT request to collect evidence or recover effort of your precious data and help you back to normal.[/wyde_info_box][/vc_column_inner][vc_column_inner width=”1/4″ background_color=”#f9f9f9″][wyde_info_box icon_set=”simple_line” icon_size=”large” color=”#ffa6a3″ icon_simple_line=”sl-chemistry” title=”Web Security” link=”||”]Our Web security gives you the comfort on being online without being nuked. We shield your system and allow you users to interact seamlessly![/wyde_info_box][/vc_column_inner][vc_column_inner width=”1/4″ background_color=”#ffffff”][wyde_info_box icon_set=”simple_line” icon_size=”large” color=”#9a8767″ icon_simple_line=”sl-cup” title=”Digital Defence” link=”||”]Our Digital defense lets be sanguine with all your interconnected devices and get connected securely. We use state of the art RMM monitoring your system 24X7x365 ![/wyde_info_box][/vc_column_inner][vc_column_inner width=”1/4″ background_color=”#ffffff”][wyde_info_box icon_set=”simple_line” icon_size=”large” color=”#be9cc1″ icon_simple_line=”sl-bag” title=”E-Commerce” link=”||”]Your E-Commerce is covered by our stringent PCI DSS and GDPR compliance on you digital storefront and customer interaction system.[/wyde_info_box][/vc_column_inner][vc_column_inner width=”1/4″ background_color=”#f9f9f9″][wyde_info_box icon_set=”simple_line” icon_size=”large” color=”#f6c178″ icon_simple_line=”sl-eyeglasses” title=”Secure Analytics” link=”||”]Our real time dashboard allows you to keep an eye on your business from a birds eye view for you comfort.[/wyde_info_box][/vc_column_inner][vc_column_inner width=”1/4″ background_color=”#ffffff”][wyde_info_box icon_set=”simple_line” icon_size=”large” color=”#99c4cb” icon_simple_line=”sl-cloud-upload” title=”Cloud Security” link=”||”]Our Cloud security helps you seamless transition into the cloud and maintain your security in hybrid platform and complicated multi vendor and premises or shared environment.[/wyde_info_box][/vc_column_inner][vc_column_inner width=”1/4″ background_color=”#f9f9f9″][wyde_info_box icon_set=”simple_line” icon_size=”large” color=”#93afd6″ icon_simple_line=”sl-bell” title=”Penetration Testing” link=”||”]To ensure bulletproof enterprise security standard our security experts perform penetration testing and ensure your system are future-proof.[/wyde_info_box][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner overlap=”top” overlap_distance=”180px” overlap_index=”50″][wyde_heading style=”4″ title=”Cyber and Information Security Services”][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner overlap=”top” overlap_distance=”180px” overlap_index=”50″ offset=”vc_hidden-lg vc_hidden-md”][vc_empty_space height=”60px”][/vc_column_inner][/vc_row_inner][vc_empty_space][/vc_column][/vc_row][vc_row row_style=”full-width” equal_height=”true” vertical_align=”middle” padding_size=”no-padding” background_color=”#2f496a”][vc_column text_align=”center” padding_size=”l-padding” width=”1/2″][vc_empty_space height=”20px”][vc_custom_heading text=”How Can We Help You?” font_container=”tag:h2|text_align:center|color:%23ffffff” google_fonts=”font_family:Playfair%20Display%3Aregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” link=”url:https%3A%2F%2Fwww.cyberinfosecurity.ca%2Fcontact-us%2F|title:Contact%20Us||”][wyde_separator text_align=”center” color=”#ffffff”][vc_column_text]Integer mattis justo tellus, ut gravida dui tempor vel. Ut ipsum nisl, euismod ac egestas non, tincidunt a arcu. Duis nec tortor sit amet nunc suscipit bibendum.[/vc_column_text][vc_empty_space height=”40px”][wyde_link_button icon_set=”simple_line” style=”outline” size=”large” icon_simple_line=”sl-mouse” title=”Let’s get started” link=”url:https%3A%2F%2Fwww.cyberinfosecurity.ca%2Fcontact-us%2F|title:Contact%20Us||” color=”#ffffff” hover_color=”#000000″][vc_empty_space height=”20px”][/vc_column][vc_column padding_size=”no-padding” background_style=”cover” width=”1/2″ bg_image_url=”http://wydethemes.com/overlap/wp-content/uploads/2015/12/overlap-pic-025-1-250×150.jpg” background_image=”2672″][vc_empty_space height=”400px”][/vc_column][/vc_row]