Managed Security

[av_section min_height=’50’ min_height_pc=’25’ min_height_px=’500px’ padding=’default’ custom_margin=’0px’ custom_margin_sync=’true’ color=’main_color’ background=’bg_color’ custom_bg=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=’https://insitenetworks.wpengine.com/wp-content/uploads/2020/02/managed-security.jpg’ attachment=’3908′ attachment_size=’full’ attach=’scroll’ position=’top left’ repeat=’stretch’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” shadow=’no-border-styling’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_arrow_bg=” id=” custom_class=’hero’ aria_label=” av_element_hidden_in_editor=’0′ av_uid=’av-k4cvu6u2′]
[av_three_fourth first min_height=’av-equal-height-column’ vertical_alignment=’av-align-middle’ space=” margin=’0px’ margin_sync=’true’ row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ padding_sync=’true’ highlight_size=’1.1′ border=” border_color=” radius=’0px’ radius_sync=’true’ column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-k4cvz2wn’ custom_class=”]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-k4cvqrff’ custom_class=’white-text white-heading’ admin_preview_bg=”]

Managed Security

How important is your business data to you?
[/av_textblock]

[/av_three_fourth][av_one_fourth min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ padding_sync=’true’ highlight_size=’1.1′ border=” border_color=” radius=’0px’ radius_sync=’true’ column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’pop-up’ mobile_breaking=” mobile_display=” av_uid=’av-eftf3e’ custom_class=”]

[av_codeblock wrapper_element=” wrapper_element_attributes=” codeblock_type=” alb_description=” id=” custom_class=” av_uid=’av-k4cvuuf2′]


WATCH VIDEO


[/av_codeblock][/av_one_fourth]
[/av_section]

[av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-border-styling’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_margin=’0px’ custom_margin_sync=’true’ custom_arrow_bg=” id=” color=’main_color’ background=’bg_color’ custom_bg=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” attach=’scroll’ position=’top left’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” av_element_hidden_in_editor=’0′ av_uid=’av-cjhaa2′ custom_class=’secondary-background-color’]
[av_one_half first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-aav6yy’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-k4cwdgd0′ custom_class=” admin_preview_bg=”]

How Secure
Are You?

[/av_textblock]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-k4cwdgd0′ custom_class=” admin_preview_bg=”]
Are you confident enough in the state of your technology security, threat identification and prevention status not to worry about a breach, ransomware or cyberattack?

You simply cannot establish a value for your data – but you can take measures to protect yourself from risk.

Our clients turn to our managed security services to identify and shore up weaknesses, gain security expertise and train their staff to improve security awareness, preventing intrusion.
[/av_textblock]

[/av_one_half][av_one_half min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-90nba2′]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-k4cwdgd0′ custom_class=” admin_preview_bg=”]

Possibilities

  • Secure your business, employee and customer data
  • Monitor for and Identify potential threats before they escalate
  • Benefit from ongoing penetration and vulnerability testing to ensure maximum security
  • Sleep better at night knowing your business is secure

[/av_textblock]

[/av_one_half]
[/av_section]

[av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-border-styling’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=’scroll’ bottom_border_style=’scroll’ margin=” custom_margin=’0px’ scroll_down=” custom_arrow_bg=” id=” color=’main_color’ background=’bg_color’ custom_bg=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attach=’scroll’ position=’top left’ repeat=’no-repeat’ video=” video_ratio=’16:9′ video_mobile_disabled=” overlay_enable=” overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” av-desktop-hide=” av-medium-hide=” av-small-hide=” av-mini-hide=” av_element_hidden_in_editor=’0′ av_uid=’av-79506i’]
[av_one_full first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-6fs4ca’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-k4cwdgd0′ custom_class=’centered-text’ admin_preview_bg=”]

Continuous Security
Oversight

[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’centered-text compressed-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]
Our managed security services offer continuous oversight, 24/7/365. Attempting to handle your critical security needs yourself requires a large investment in money, manpower and security expertise.

We conduct regular vulnerability and penetration testing, perform security scans routinely, and take care of other security management functions for your organization, as well as deliver security awareness training to you and your staff, your biggest security vulnerability.
[/av_textblock]

[/av_one_full]
[/av_section]

[av_layout_row border=” min_height_percent=” min_height=’0′ color=’main_color’ mobile=’av-flex-cells’ id=” av_element_hidden_in_editor=’0′ mobile_breaking=” av_uid=’av-k4cwo4vx’ custom_class=’testimonial-grid’]
[av_cell_two_fifth vertical_align=’top’ padding=’30px’ padding_sync=’true’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=’https://insitenetworks.wpengine.com/wp-content/uploads/2020/02/ransomeware.jpg’ attachment=’3911′ attachment_size=’full’ background_attachment=’scroll’ background_position=’center center’ background_repeat=’stretch’ link=” linktarget=” link_hover=” mobile_display=” av_uid=’av-k4cwxbmp’ custom_class=’grid-cell-image’]

[/av_cell_two_fifth][av_cell_three_fifth vertical_align=’top’ padding=’3%,5%,3%,5%’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_attachment=’scroll’ background_position=’top left’ background_repeat=’no-repeat’ link=” linktarget=” link_hover=” mobile_display=” av_uid=’av-k4cwm5uc’ custom_class=’primary-background-color’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’white-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

1 to 5
The number of SMBs that fell victim to a ransomware attack in 2019.
– Bitdefender

[/av_textblock]

[/av_cell_three_fifth]
[/av_layout_row]

[av_section min_height=” min_height_pc=’25’ min_height_px=’500px’ padding=’default’ custom_margin=’0px’ custom_margin_sync=’true’ color=’main_color’ background=’bg_color’ custom_bg=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” attach=’scroll’ position=’top left’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” shadow=’no-border-styling’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_arrow_bg=” id=” custom_class=’secondary-background-color how-it-works-section’ aria_label=” av_element_hidden_in_editor=’0′ av_uid=’av-3xvga2′]
[av_one_full first min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ padding_sync=’true’ highlight_size=’1.1′ border=” border_color=” radius=’0px’ radius_sync=’true’ column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-2u3hcq’ custom_class=’timeline-content’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’centered-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

How it Works

[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’centered-text compressed-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]
We’ll conduct a discovery meeting to understand your particular business security requirements and concerns. We’ll next schedule a technical specialist to visit your location(s) and conduct a security assessment and conduct scans and penetration testing with our non-invasive tools and processes to identify internal and external vulnerabilities that should be addressed; and data that should be encrypted.

We’ll also identify if any of your business data, email accounts or passwords have been compromised and are available on the Dark Web.

Once we’ve collected this threat intelligence, we’ll analyze it to develop a strategy to harden and secure your infrastructure, devices, platforms and services from external attack, and continually monitor your systems for rapid threat detection. From there, we’ll put together an ongoing security awareness training and testing program to educate your staff in ways to identify and avoid electronic and socially-engineered security threats.
[/av_textblock]

[/av_one_full][av_one_third first min_height=” vertical_alignment=’av-align-middle’ space=” margin=’0px’ margin_sync=’true’ row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ padding_sync=’true’ highlight_size=’1.1′ border=” border_color=” radius=’0px’ radius_sync=’true’ column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’pop-up’ mobile_breaking=” mobile_display=” av_uid=’av-k4cxcf6a’ custom_class=’service-container circle-color-1′]

[av_codeblock wrapper_element=” wrapper_element_attributes=” codeblock_type=” av_uid=’av-k4cx708c’ custom_class=’centered-text’]

[/av_codeblock]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-k4cwdgd0′ custom_class=’white-text centered-text’ admin_preview_bg=”]
Discovery Meeting
[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ padding_sync=’true’ highlight_size=’1.1′ border=” border_color=” radius=’0px’ radius_sync=’true’ column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’pop-up’ mobile_breaking=” mobile_display=” av_uid=’av-k4cxchyt’ custom_class=’service-container circle-color-2′]

[av_codeblock wrapper_element=” wrapper_element_attributes=” codeblock_type=” av_uid=’av-k4cx708c’ custom_class=’centered-text’]

[/av_codeblock]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-k4cwdgd0′ custom_class=’white-text centered-text’ admin_preview_bg=”]
Security Assessment
[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ padding_sync=’true’ highlight_size=’1.1′ border=” border_color=” radius=’0px’ radius_sync=’true’ column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’pop-up’ mobile_breaking=” mobile_display=” av_uid=’av-k4cxck3g’ custom_class=’service-container circle-color-3′]

[av_codeblock wrapper_element=” wrapper_element_attributes=” codeblock_type=” av_uid=’av-k4cx708c’ custom_class=’centered-text’]

[/av_codeblock]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-k4cwdgd0′ custom_class=’white-text centered-text’ admin_preview_bg=”]
Analysis, Remediation and Training Plan
[/av_textblock]

[/av_one_third]
[/av_section]

[av_section min_height=” min_height_pc=’25’ min_height_px=’500px’ padding=’default’ custom_margin=’0px’ custom_margin_sync=’true’ color=’main_color’ background=’bg_color’ custom_bg=’#0936bc’ background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” attach=’scroll’ position=’top left’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” shadow=’no-border-styling’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_arrow_bg=” id=” custom_class=’pain-points-section’ aria_label=” av_element_hidden_in_editor=’0′ av_uid=’av-dhlmyi’]
[av_one_full first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-cle34q’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’white-heading’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

Pain Points Solved

[/av_textblock]

[/av_one_full][av_one_half first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-14fty2′]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’white-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

  • Protect Against Electronic Security Risks
    Secure your infrastructure, devices, platforms and services against security threats.
  • Meet Regulatory Compliance Standards
    Achieve regulatory and industry security compliance with hardened security.
  • Increase Staff Security Awareness
    Employees are the weakest link in your business security, ongoing security awareness training and testing will strengthen your defenses.
  • Increase Productivity and Innovation
    A strong security posture increases business productivity and accelerates innovation.

[/av_textblock]

[/av_one_half][av_one_half min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-9ghvei’]

[av_image src=’https://insitenetworks.wpengine.com/wp-content/uploads/2021/02/Image-1.png’ attachment=’3953′ attachment_size=’full’ copyright=” caption=” styling=” align=’center’ font_size=” overlay_opacity=’0.4′ overlay_color=’#000000′ overlay_text_color=’#ffffff’ animation=’no-animation’ hover=” appearance=” link=” target=” title_attr=” alt_attr=” lazy_loading=’disabled’ id=” custom_class=’quote-image’ av_element_hidden_in_editor=’0′ av_uid=’av-k4kax337′ admin_preview_bg=”][/av_image]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’white-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

I have been working with INsite Networks for over 20 years. As our IT demands have grown, INsite has been on the ball, providing unparalleled service and support through every need and demand.​”
– ERIC R. ANDRESEN, CPM®, PRESIDENT

[/av_textblock]

[/av_one_half]
[/av_section]

[av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-border-styling’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=’scroll’ bottom_border_style=’scroll’ margin=” custom_margin=’0px’ scroll_down=” custom_arrow_bg=” id=” color=’main_color’ background=’bg_color’ custom_bg=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attach=’scroll’ position=’top left’ repeat=’no-repeat’ video=” video_ratio=’16:9′ video_mobile_disabled=” overlay_enable=” overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” av-desktop-hide=” av-medium-hide=” av-small-hide=” av-mini-hide=” av_element_hidden_in_editor=’0′ av_uid=’av-3xvga2′]

[av_one_full first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-2u3hcq’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’centered-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

Implementation Timeline

[/av_textblock]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-k4cwdgd0′ custom_class=’centered-text compressed-text’ admin_preview_bg=”]
Once we’ve agreed to engage, a security discovery meeting can be scheduled within 2 weeks. Following our discovery meeting, we’ll be able to schedule an onsite security assessment within the following week.

For a typical small office location, our onsite security assessments can usually be completed in 2 days.
It will take us approximately a week to analyze the information gathered during the discovery meeting and the technology assessment. We’ll be able to meet with you the following week to deliver our findings and recommendations.
[/av_textblock]

[av_hr class=’invisible’ height=’30’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ av_uid=’av-k4kbtqo7′ custom_class=” admin_preview_bg=”]

[/av_one_full][av_one_third first min_height=’av-equal-height-column’ vertical_alignment=’av-align-top’ space=’no_margin’ margin=’0px’ margin_sync=’true’ row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ padding_sync=’true’ highlight_size=’1.1′ border=” border_color=” radius=’0px’ radius_sync=’true’ column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-k4d0whmd’ custom_class=”]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’centered-text step-container time-line-color-2′ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]
Discovery Meeting
[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’timeline-steps centered-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

Week 1

[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-65pgsa’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’centered-text step-container time-line-color-1′ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]
Security Assessment
[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’timeline-steps centered-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

Week 2

[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-4tgpmy’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’centered-text step-container time-line-color-4′ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]
Analysis, Remediation and Training Plan
[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’timeline-steps centered-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

Week 3

[/av_textblock]

[/av_one_third][/av_section][av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-border-styling’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_margin=’0px’ custom_margin_sync=’true’ custom_arrow_bg=” id=” color=’main_color’ background=’bg_color’ custom_bg=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” attach=’scroll’ position=’top left’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” av_element_hidden_in_editor=’0′ av_uid=’av-k4kb1iey’ custom_class=’form-section’]
[av_one_half first min_height=” vertical_alignment=’av-align-top’ space=” row_boxshadow_color=” row_boxshadow_width=’10’ margin=’0px’ margin_sync=’true’ mobile_breaking=” border=” border_color=” radius=’0px’ radius_sync=’true’ padding=’0px’ padding_sync=’true’ column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ highlight_size=’1.1′ animation=” link=” linktarget=” link_hover=” title_attr=” alt_attr=” mobile_display=” id=” custom_class=” aria_label=” av_uid=’av-3awjre’]

[av_image src=’https://insitenetworks.wpengine.com/wp-content/uploads/2021/08/Whtepaper-placeholder-11.png’ attachment=’4021′ attachment_size=’full’ copyright=” caption=” styling=” align=’center’ font_size=” overlay_opacity=’0.4′ overlay_color=’#000000′ overlay_text_color=’#ffffff’ animation=’no-animation’ hover=” appearance=” link=’manually,https://fs.honeycrmapp.net/e5150bc3d5434181b933a98e40c16ab4/pw1-managed-security.pdf’ target=’_blank’ title_attr=” alt_attr=” lazy_loading=’disabled’ id=” custom_class=” av_element_hidden_in_editor=’0′ av_uid=’av-k4kax337′ admin_preview_bg=”][/av_image]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’centered-text wp-heading’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

Whitepaper

6 Ways to Improve Your
IT Security Architecture

[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’centered-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]
Read Whitepaper
[/av_textblock]

[/av_one_half][av_one_half min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ padding_sync=’true’ highlight_size=’1.1′ border=” border_color=” radius=’0px’ radius_sync=’true’ column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’bottom-to-top’ mobile_breaking=” mobile_display=” av_uid=’av-k4kaw0zd’ custom_class=’form-column’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’white-heading centered-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

Questions about
Managed Security


[/av_textblock]

[/av_one_half]
[/av_section]