{"id":245211,"date":"2024-05-24T17:51:08","date_gmt":"2024-05-24T17:51:08","guid":{"rendered":"https:\/\/wordpress.prominic.net\/?page_id=245211"},"modified":"2024-06-20T21:47:12","modified_gmt":"2024-06-20T21:47:12","slug":"endpoint-management-security-package","status":"publish","type":"page","link":"https:\/\/wordpress.prominic.net\/endpoint-management-security-package\/","title":{"rendered":"Comprehensive Endpoint Management and Security Package"},"content":{"rendered":"
[et_pb_section fb_built=”1″ custom_padding_last_edited=”on|tablet” admin_label=”Hero” _builder_version=”4.25.1″ _module_preset=”e68aa8c9-06e1-48cb-b82b-29ec720aed4c” use_background_color_gradient=”on” background_color_gradient_direction=”90deg” background_color_gradient_stops=”#ffffff 50%|rgba(255,255,255,0) 50%” background_color_gradient_overlays_image=”on” background_color_gradient_start=”rgba(0,0,0,0.5)” background_color_gradient_end=”rgba(0,0,0,0.75)” background_enable_image=”off” background_size=”contain” background_position=”center_right” custom_padding=”62px||62px||true|false” custom_padding_tablet=”10vw||10vw||true|false” custom_padding_phone=”10vw||10vw||true|false” background_last_edited=”on|tablet” use_background_color_gradient_tablet=”on” background_color_gradient_direction_tablet=”180deg” background_color_gradient_stops_tablet=”#ffffff 70%|rgba(255,255,255,0) 70%” locked=”off” collapsed=”on” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.25.1″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ background_enable_image=”off” width=”100%” min_height=”410.4px” custom_margin=”|116px||auto||” custom_padding=”43px|||||” locked=”off” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.23.1″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_heading title=”Comprehensive Endpoint Protection and Management” _builder_version=”4.25.1″ _module_preset=”f0c675ea-2574-4d0e-b725-30f8550a8550″ title_level=”h4″ title_font=”Lato|Lato_weight||on|||||” title_text_color=”#00208A” title_font_size=”14px” title_letter_spacing=”1px” title_line_height=”1.4em” custom_margin=”||10px||false|false” custom_padding=”0px||||false|false” title_font_size_tablet=”13px” title_font_size_phone=”13px” title_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{%22#1E5F4B%22:%91%22title_text_color%22%93}”][\/et_pb_heading][et_pb_heading title=”Prominic TotalProtect” _builder_version=”4.24.2″ _module_preset=”ddeb8c09-9078-4424-bc15-2efb6572e28e” title_font=”Lato|Lato_weight|||||||” title_text_color=”#0e0c19″ title_font_size=”72px” title_line_height=”1.15em” custom_margin=”||-8px|||” title_font_size_tablet=”40px” title_font_size_phone=”24px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][et_pb_heading title=”MANAGE | SECURE | BACKUP| TRAIN” _builder_version=”4.25.1″ _module_preset=”f0c675ea-2574-4d0e-b725-30f8550a8550″ title_level=”h4″ title_font=”Lato|Lato_weight||on|||||” title_text_color=”#811937″ title_font_size=”22px” title_letter_spacing=”1px” title_line_height=”1.4em” custom_margin=”||10px||false|false” custom_padding=”12px||||false|false” title_font_size_tablet=”13px” title_font_size_phone=”13px” title_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{%22#1E5F4B%22:%91%22title_text_color%22%93}”][\/et_pb_heading][et_pb_text quote_border_color=”#811937″ _builder_version=”4.24.2″ _module_preset=”2c55a9c4-feed-423b-9edb-ae0b5b365cac” text_font=”Lato|Lato_weight|||||||” text_text_color=”#3c3a47″ text_line_height=”1.75em” link_font=”|Lato_weight|||||||” link_text_color=”#1E5F4B” quote_font=”Lato|Lato_weight|||||||” quote_text_color=”#0e0c19″ header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”72px” header_line_height=”1.15em” header_2_font=”Lato|Lato_weight|||||||” header_2_text_color=”#0e0c19″ header_2_font_size=”50px” header_2_line_height=”1.2em” header_3_font=”Lato|Lato_weight|||||||” header_3_text_color=”#0e0c19″ header_3_font_size=”32px” header_3_line_height=”1.3em” header_4_font=”Lato|Lato_weight|||||||” header_4_text_color=”#0e0c19″ header_4_font_size=”24px” header_4_line_height=”1.4em” header_5_font=”Lato|Lato_weight|||||||” header_5_text_color=”#0e0c19″ header_5_font_size=”18px” header_5_line_height=”1.4em” header_6_font=”Lato|Lato_weight|||||||” header_6_text_color=”#0e0c19″ header_6_line_height=”1.5em” custom_margin=”||||false|false” text_font_size_tablet=”15px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”40px” header_font_size_phone=”24px” header_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”28px” header_2_font_size_phone=”20px” header_2_font_size_last_edited=”on|phone” header_3_font_size_tablet=”22px” header_3_font_size_phone=”17px” header_3_font_size_last_edited=”on|phone” header_4_font_size_tablet=”18px” header_4_font_size_phone=”15px” header_4_font_size_last_edited=”on|tablet” header_5_font_size_tablet=”15px” header_5_font_size_phone=”14px” header_5_font_size_last_edited=”on|desktop” header_6_font_size_tablet=”13px” header_6_font_size_phone=”13px” header_6_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]<\/p>\n
Ensure the security and efficiency of your business’s endpoints with our all-in-one solution.<\/p>\n
[\/et_pb_text][et_pb_button button_url=”https:\/\/prominic.net\/prominic-sales\/” button_text=”Get Started Today” _builder_version=”4.25.1″ _module_preset=”1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206″ custom_button=”on” button_text_size=”14px” button_text_color=”#FFFFFF” button_bg_color=”#811937″ button_border_width=”0px” button_border_radius=”100px” button_font=”Lato|700|||||||” custom_padding=”12px|24px|12px|24px|true|true” locked=”off” global_colors_info=”{}” custom_padding__hover_enabled=”off|desktop” custom_padding__hover=”|28px||20px|true|false”][\/et_pb_button][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.25.1″ _module_preset=”default” background_enable_image=”off” global_colors_info=”{}”][et_pb_image src=”https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2024\/05\/DALL\u00b7E-2024-05-22-12.17.20-A-professional-IT-technician-managing-a-network-of-secure-endpoints-including-desktops-laptops-and-servers-in-a-modern-office-environment.-The-tech-scaled.webp” title_text=”DALL\u00b7E 2024-05-22 12.17.20 – A professional IT technician managing a network of secure endpoints including desktops, laptops, and servers, in a modern office environment. The tech” _builder_version=”4.25.1″ _module_preset=”default” custom_margin=”||-3px|-43px||” custom_padding=”1px|||92px||” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Text” _builder_version=”4.18.0″ _module_preset=”default” locked=”off” collapsed=”on” global_colors_info=”{}”][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” custom_padding_last_edited=”on|desktop” _builder_version=”4.25.1″ _module_preset=”333b8a65-5730-490d-b80e-51611171c668″ background_color=”#00274c” custom_padding=”23px|60px|23px|60px|true|true” custom_padding_tablet=”30px|30px|30px|30px|true|true” custom_padding_phone=”20px|20px|20px|20px|true|true” border_radii=”on|6px|6px|6px|6px” global_colors_info=”{%22gcid-7cadd8b3-5228-48e4-90c4-212d09232f7b%22:%91%22color%22,%22color%22,%22header_text_color%22,%22color%22%93,%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22color%22%93,%22gcid-9a15b43a-75da-4015-a522-d0ef1179ded7%22:%91%22body_text_color%22%93}”][et_pb_column type=”2_5″ _builder_version=”4.18.0″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_heading title=”SECURE AND MANAGE YOUR ENDPOINTS WITH TOTALPROTECT” _builder_version=”4.25.1″ _module_preset=”c33f07d9-41e0-421a-8799-5799df695cce” title_level=”h2″ title_font=”Lato|Lato_weight|||||||” title_text_color=”#FFFFFF” title_font_size=”31px” title_line_height=”1.2em” custom_margin=”||10px||false|false” custom_padding=”20px|||||” title_font_size_tablet=”28px” title_font_size_phone=”20px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][\/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.18.0″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_text quote_border_color=”#FFFFFF” _builder_version=”4.24.3″ _module_preset=”0504de1e-f5ff-4281-ba60-cbbe4edf98bc” text_font=”Lato|Lato_weight|||||||” text_text_color=”#FFFFFF” text_line_height=”1.75em” link_font=”||||on||||” link_text_color=”#FFFFFF” quote_font=”Lato|Lato_weight|||||||” quote_text_color=”#FFFFFF” header_font=”Lato|Lato_weight|||||||” header_text_color=”#FFFFFF” header_font_size=”72px” header_line_height=”1.15em” header_2_font=”Lato|Lato_weight|||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”50px” header_2_line_height=”1.2em” header_3_font=”Lato|Lato_weight|||||||” header_3_text_color=”#FFFFFF” header_3_font_size=”32px” header_3_line_height=”1.3em” header_4_font=”Lato|Lato_weight|||||||” header_4_text_color=”#FFFFFF” header_4_font_size=”24px” header_4_line_height=”1.4em” header_5_font=”Lato|Lato_weight|||||||” header_5_text_color=”#FFFFFF” header_5_font_size=”18px” header_5_line_height=”1.4em” header_6_font=”Lato|Lato_weight|||||||” header_6_text_color=”#FFFFFF” header_6_line_height=”1.5em” custom_margin=”||||false|false” custom_padding=”18px|||||” text_font_size_tablet=”15px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”40px” header_font_size_phone=”24px” header_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”28px” header_2_font_size_phone=”20px” header_2_font_size_last_edited=”on|phone” header_3_font_size_tablet=”22px” header_3_font_size_phone=”17px” header_3_font_size_last_edited=”on|phone” header_4_font_size_tablet=”18px” header_4_font_size_phone=”15px” header_4_font_size_last_edited=”on|tablet” header_5_font_size_tablet=”15px” header_5_font_size_phone=”14px” header_5_font_size_last_edited=”on|desktop” header_6_font_size_tablet=”13px” header_6_font_size_phone=”13px” header_6_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]<\/p>\n
Our package combines robust management and advanced security features to protect and optimize your desktops, laptops, and servers.<\/p>\n
Experience seamless integration and unparalleled protection with Prominic’s comprehensive solution.<\/p>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ make_equal=”on” custom_padding_last_edited=”on|desktop” _builder_version=”4.25.1″ _module_preset=”333b8a65-5730-490d-b80e-51611171c668″ background_color=”#00274c” custom_padding=”44px|60px|44px|60px|true|true” custom_padding_tablet=”30px|30px|30px|30px|true|true” custom_padding_phone=”20px|20px|20px|20px|true|true” border_radii=”on|6px|6px|6px|6px” global_colors_info=”{%22gcid-7cadd8b3-5228-48e4-90c4-212d09232f7b%22:%91%22color%22,%22color%22,%22header_text_color%22,%22color%22%93,%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22color%22%93,%22gcid-9a15b43a-75da-4015-a522-d0ef1179ded7%22:%91%22body_text_color%22%93}”][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”MANAGE” use_icon=”on” font_icon=”||fa||900″ icon_color=”#eabe0e” icon_placement=”left” image_icon_width=”24px” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”1ea53d41-9439-472c-8d8b-7bddb3bf9444″ header_font=”Lato|900|||||||” header_text_color=”#FFFFFF” header_font_size=”21px” header_line_height=”1.5em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#ffffff” body_font_size=”14px” body_line_height=”1.75em” body_link_text_color=”#004b23″ header_font_size_tablet=”13px” header_font_size_phone=”13px” header_font_size_last_edited=”off|desktop” body_text_color_tablet=”#ffffff” body_text_color_phone=”#ffffff” body_text_color_last_edited=”on|desktop” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”off|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Manage all endpoints from a single platform. Integrates remote management, monitoring, inventory management, and automated patch deployment for optimal system performance.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”SECURE” use_icon=”on” font_icon=”||fa||900″ icon_color=”#eabe0e” icon_placement=”left” image_icon_width=”24px” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”1ea53d41-9439-472c-8d8b-7bddb3bf9444″ header_font=”Lato|900|||||||” header_text_color=”#FFFFFF” header_font_size=”21px” header_line_height=”1.5em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#ffffff” body_font_size=”14px” body_line_height=”1.75em” body_link_text_color=”#004b23″ header_font_size_tablet=”13px” header_font_size_phone=”13px” header_font_size_last_edited=”off|desktop” body_text_color_tablet=”#ffffff” body_text_color_phone=”#ffffff” body_text_color_last_edited=”on|desktop” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”off|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Real-time detection, analysis, and response to cyber threats. Stay secure with cutting-edge technology that keeps your business protected.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”BACKUP” use_icon=”on” font_icon=”||fa||900″ icon_color=”#eabe0e” icon_placement=”left” image_icon_width=”24px” content_max_width=”100%” _builder_version=”4.25.0″ _module_preset=”1ea53d41-9439-472c-8d8b-7bddb3bf9444″ header_font=”Lato|900|||||||” header_text_color=”#FFFFFF” header_font_size=”21px” header_line_height=”1.5em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#ffffff” body_font_size=”14px” body_line_height=”1.75em” body_link_text_color=”#004b23″ header_font_size_tablet=”13px” header_font_size_phone=”13px” header_font_size_last_edited=”off|desktop” body_text_color_tablet=”#ffffff” body_text_color_phone=”#ffffff” body_text_color_last_edited=”on|desktop” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”off|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Reliable cloud backup solutions and multi-factor authentication safeguard your critical data. Ensure security and easy recovery in case of incidents.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.18.0″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”TRAIN” use_icon=”on” font_icon=”||fa||900″ icon_color=”#eabe0e” icon_placement=”left” image_icon_width=”24px” content_max_width=”100%” _builder_version=”4.25.0″ _module_preset=”1ea53d41-9439-472c-8d8b-7bddb3bf9444″ header_font=”Lato|900|||||||” header_text_color=”#FFFFFF” header_font_size=”21px” header_line_height=”1.5em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#ffffff” body_font_size=”14px” body_line_height=”1.75em” body_link_text_color=”#004b23″ header_font_size_tablet=”13px” header_font_size_phone=”13px” header_font_size_last_edited=”off|desktop” body_text_color_tablet=”#ffffff” body_text_color_phone=”#ffffff” body_text_color_last_edited=”on|desktop” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”off|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Employee mistakes are a major factor in many security breaches, often due to a lack of awareness. Engaging training and proactive monitoring help ensure that employees are well-prepared to handle potential threats.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Features” _builder_version=”4.17.6″ _module_preset=”default” custom_padding=”0px||0px|||” locked=”off” collapsed=”on” global_colors_info=”{}”][et_pb_row _builder_version=”4.17.6″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ custom_padding=”||0px|||” locked=”off” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_heading title=”Unified Endpoint Management ” _builder_version=”4.25.1″ _module_preset=”f0c675ea-2574-4d0e-b725-30f8550a8550″ title_level=”h4″ title_font=”Lato|Lato_weight||on|||||” title_text_color=”#811937″ title_font_size=”14px” title_letter_spacing=”1px” title_line_height=”1.4em” custom_margin=”||10px||false|false” custom_padding=”0px|||||” title_font_size_tablet=”13px” title_font_size_phone=”13px” title_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{%22#1E5F4B%22:%91%22title_text_color%22%93}”][\/et_pb_heading][et_pb_heading title=”Manage All Your Endpoints From a Single Platform ” _builder_version=”4.25.1″ _module_preset=”c33f07d9-41e0-421a-8799-5799df695cce” title_level=”h2″ title_font=”Lato|Lato_weight|||||||” title_text_color=”#0e0c19″ title_font_size=”48px” title_line_height=”1.2em” custom_margin=”||10px||false|false” title_font_size_tablet=”28px” title_font_size_phone=”20px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.25.1″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”Comprehensive Endpoint Management” use_icon=”on” font_icon=”||fa||900″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#004b23″ body_link_font_size=”14px” background_mask_style=”chevrons” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”Advanced Automation and Real-Time Monitoring” use_icon=”on” font_icon=”Y||divi||400″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.24.3″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#004b23″ body_link_font_size=”14px” background_mask_style=”chevrons” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”Scalable Solutions and Detailed Reporting” use_icon=”on” font_icon=”||fa||900″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.24.3″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#004b23″ body_link_font_size=”14px” background_mask_style=”chevrons” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Features” _builder_version=”4.17.6″ _module_preset=”default” custom_padding=”0px||0px|||” locked=”off” collapsed=”on” global_colors_info=”{}”][et_pb_row _builder_version=”4.17.6″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ custom_padding=”||0px|||” locked=”off” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_heading title=”Real-time detection and response to cyber threats” _builder_version=”4.25.1″ _module_preset=”f0c675ea-2574-4d0e-b725-30f8550a8550″ title_level=”h4″ title_font=”Lato|Lato_weight||on|||||” title_text_color=”#811937″ title_font_size=”14px” title_letter_spacing=”1px” title_line_height=”1.4em” custom_margin=”||10px||false|false” custom_padding=”0px|||||” title_font_size_tablet=”13px” title_font_size_phone=”13px” title_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{%22#1E5F4B%22:%91%22title_text_color%22%93}”][\/et_pb_heading][et_pb_heading title=”Secure Your Environment with Advanced Threat Detection and Response” _builder_version=”4.24.3″ _module_preset=”c33f07d9-41e0-421a-8799-5799df695cce” title_level=”h2″ title_font=”Lato|Lato_weight|||||||” title_text_color=”#0e0c19″ title_font_size=”50px” title_line_height=”1.2em” custom_margin=”||10px||false|false” title_font_size_tablet=”28px” title_font_size_phone=”20px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.17.6″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”Advanced Antivirus and EDR” use_icon=”on” font_icon=”||fa||900″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.24.3″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#004b23″ body_link_font_size=”14px” background_mask_style=”chevrons” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Combines advanced antivirus protection with Endpoint Detection and Response (EDR) to detect and mitigate threats efficiently.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”AI-Powered Threat Detection” use_icon=”on” font_icon=”||fa||900″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” body_link_font_size=”14px” background_mask_style=”diagonal” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Utilizes AI and deep learning for real-time threat detection, providing robust protection against malware and ransomware.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.25.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”24\/7 Monitoring by Security Experts” use_icon=”on” font_icon=”||fa||900″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#004b23″ body_link_font_size=”14px” background_mask_style=”chevrons” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Continuous monitoring and real-time threat response through Managed Detection and Response (MDR) services.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.17.6″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”Automated Threat Response” use_icon=”on” font_icon=”||fa||900″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” body_link_font_size=”14px” background_mask_style=”diagonal” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Includes automated threat mitigation actions, such as ransomware rollback, to minimize manual intervention and accelerate response times.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”Live Response Tools” use_icon=”on” font_icon=”||fa||900″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.24.3″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” body_link_font_size=”14px” background_mask_style=”diagonal” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Remote investigation and remediation tools for swift threat resolution without disrupting end-users.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.25.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Multi-Platform Support” use_icon=”on” font_icon=”||divi||400″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” body_link_font_size=”14px” background_mask_style=”diagonal” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Protects a wide range of devices, including Windows, macOS, Linux, iOS, and Android, ensuring comprehensive security coverage.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Features” _builder_version=”4.17.6″ _module_preset=”default” custom_padding=”14px||1px|||” locked=”off” collapsed=”on” global_colors_info=”{}”][et_pb_row _builder_version=”4.17.6″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ locked=”off” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_heading title=”Secure cloud data backups ” _builder_version=”4.25.1″ _module_preset=”f0c675ea-2574-4d0e-b725-30f8550a8550″ title_level=”h4″ title_font=”Lato|Lato_weight||on|||||” title_text_color=”#811937″ title_font_size=”14px” title_letter_spacing=”1px” title_line_height=”1.4em” custom_margin=”||10px||false|false” custom_padding=”0px|||||” title_font_size_tablet=”13px” title_font_size_phone=”13px” title_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{%22#1E5F4B%22:%91%22title_text_color%22%93}”][\/et_pb_heading][et_pb_heading title=”Data Protection and Recovery” _builder_version=”4.24.3″ _module_preset=”c33f07d9-41e0-421a-8799-5799df695cce” title_level=”h2″ title_font=”Lato|Lato_weight|||||||” title_text_color=”#0e0c19″ title_font_size=”50px” title_line_height=”1.2em” custom_margin=”||10px||false|false” title_font_size_tablet=”28px” title_font_size_phone=”20px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.17.6″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”Comprehensive Data Protection” use_icon=”on” font_icon=”||divi||400″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#004b23″ body_link_font_size=”14px” background_mask_style=”chevrons” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Robust backup solutions for workstations, desktops, and servers, covering over 20 platforms.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”Fast and Reliable Recovery” use_icon=”on” font_icon=”||fa||900″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” body_link_font_size=”14px” background_mask_style=”diagonal” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Industry-leading recovery speeds ensure quick restoration of data, minimizing downtime.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.25.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Military-Grade Encryption” use_icon=”on” font_icon=”||divi||400″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” body_link_font_size=”14px” background_mask_style=”diagonal” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
AES-256 encryption secures data in transit and at rest, providing top-level protection.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.17.6″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”Hybrid Cloud Architecture” use_icon=”on” font_icon=”||divi||400″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#004b23″ body_link_font_size=”14px” background_mask_style=”chevrons” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Flexible backup options, including cloud and local destinations, to suit diverse business needs.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”Centralized Management” use_icon=”on” font_icon=”||divi||400″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” body_link_font_size=”14px” background_mask_style=”diagonal” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Single, user-friendly dashboard for efficient oversight of all backup activities.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.25.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Redundant Backup Solutions” use_icon=”on” font_icon=”||fa||900″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” body_link_font_size=”14px” background_mask_style=”diagonal” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Redundant backups enhance reliability and data availability, surpassing traditional RAID setups.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Features” _builder_version=”4.17.6″ _module_preset=”default” custom_padding=”14px||1px|||” locked=”off” collapsed=”on” global_colors_info=”{}”][et_pb_row _builder_version=”4.17.6″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ custom_padding=”||0px|||” locked=”off” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_heading title=”Ensure Compliance and Boost Engagement with Interactive Training Programs” _builder_version=”4.25.1″ _module_preset=”f0c675ea-2574-4d0e-b725-30f8550a8550″ title_level=”h4″ title_font=”Lato|Lato_weight||on|||||” title_text_color=”#811937″ title_font_size=”14px” title_letter_spacing=”1px” title_line_height=”1.4em” custom_margin=”||10px||false|false” custom_padding=”0px|||||” title_font_size_tablet=”13px” title_font_size_phone=”13px” title_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{%22#1E5F4B%22:%91%22title_text_color%22%93}”][\/et_pb_heading][et_pb_heading title=”Empower Your Team with Comprehensive Security Training” _builder_version=”4.24.3″ _module_preset=”c33f07d9-41e0-421a-8799-5799df695cce” title_level=”h2″ title_font=”Lato|Lato_weight|||||||” title_text_color=”#0e0c19″ title_font_size=”50px” title_line_height=”1.2em” custom_margin=”||10px||false|false” title_font_size_tablet=”28px” title_font_size_phone=”20px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.17.6″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”Employee Vulnerability Assessment” use_icon=”on” font_icon=”||fa||400″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#004b23″ body_link_font_size=”14px” background_mask_style=”chevrons” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Monitors and quantifies employee security posture to identify and address weaknesses.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”Automated Phishing Simulations” use_icon=”on” font_icon=”||divi||400″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” body_link_font_size=”14px” background_mask_style=”diagonal” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Conducts unlimited phishing simulation campaigns to test and improve employee awareness.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.25.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Ongoing Training Programs” use_icon=”on” font_icon=”||fa||900″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” body_link_font_size=”14px” background_mask_style=”diagonal” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Offers weekly micro-training videos, annual courses, and monthly security newsletters.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.17.6″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”Interactive Learning Elements” use_icon=”on” font_icon=”||fa||900″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#004b23″ body_link_font_size=”14px” background_mask_style=”chevrons” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Includes leaderboards and policy acknowledgment tracking to engage employees and encourage participation.<\/p>\n
[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”Easy Implementation & Onboarding” use_icon=”on” font_icon=”||divi||400″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” body_link_font_size=”14px” background_mask_style=”diagonal” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n
Easy setup and management makes adding new employees a breeze and automates the entire learning and simulations.<\/span><\/p>\n [\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.25.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Continuous Dark Web Monitoring” use_icon=”on” font_icon=”||fa||900″ icon_color=”#eabe0e” image_icon_width=”32px” icon_alignment=”left” content_max_width=”100%” _builder_version=”4.25.1″ _module_preset=”212b201d-2c34-41bd-936c-851b7357d08b” header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” body_link_font_size=”14px” background_mask_style=”diagonal” image_icon_custom_margin=”||||false|false” image_icon_custom_padding=”||||false|false” header_font_size_tablet=”15px” header_font_size_phone=”13px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”]<\/p>\n Scans for compromised account data to protect against breaches.<\/p>\n [\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Call to Action” _builder_version=”4.18.0″ _module_preset=”default” locked=”off” collapsed=”on” global_colors_info=”{}”][et_pb_row _builder_version=”4.25.0″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ background_color=”#811937″ custom_padding=”6vw|8%|6vw|8%|true|true” border_radii=”on|6px|6px|6px|6px” global_colors_info=”{%22#38b000%22:%91%22background_color%22%93}”][et_pb_column type=”4_4″ _builder_version=”4.18.0″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_heading title=”Protect and Manage Your Endpoints Today” _builder_version=”4.24.3″ _module_preset=”ba4a6336-701f-47b8-bf5c-09da0ce28016″ title_level=”h3″ title_font=”Lato|Lato_weight|||||||” title_text_align=”center” title_text_color=”#FFFFFF” title_font_size=”32px” title_line_height=”1.3em” custom_margin=”||10px||false|false” title_font_size_tablet=”22px” title_font_size_phone=”17px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][et_pb_button button_url=”https:\/\/prominic.net\/prominic-sales\/” url_new_window=”on” button_text=”Get Started with Prominic” button_alignment=”center” _builder_version=”4.25.1″ _module_preset=”ab15fb74-61a3-43aa-96b3-41e09aeef654″ custom_button=”on” button_text_size=”14px” button_text_color=”#004b23″ button_bg_color=”#FFFFFF” button_border_width=”0px” button_border_radius=”100px” button_font=”Lato|700|||||||” custom_padding=”12px|24px|12px|24px|true|true” global_colors_info=”{}”][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Features” _builder_version=”4.19.0″ _module_preset=”default” collapsed=”on” global_colors_info=”{}”][et_pb_row _builder_version=”4.17.6″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.17.6″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_heading title=”Key Benefits: Why use Prominic TotalProtect” _builder_version=”4.24.3″ _module_preset=”c33f07d9-41e0-421a-8799-5799df695cce” title_level=”h2″ title_font=”Lato|Lato_weight|||||||” title_text_color=”#0e0c19″ title_font_size=”50px” title_line_height=”1.2em” custom_margin=”||10px||false|false” title_font_size_tablet=”28px” title_font_size_phone=”20px” title_font_size_last_edited=”on|phone” global_colors_info=”{}”][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” _builder_version=”4.25.1″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.25.1″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ background_color=”#811937″ use_background_color_gradient=”on” background_color_gradient_direction=”0deg” background_color_gradient_stops=”#000000 15%|rgba(255,255,255,0) 85%” background_color_gradient_overlays_image=”on” background_enable_image=”off” custom_padding=”60px|30px|30px|30px|false|true” custom_padding_tablet=”130px|30px|30px|30px|false|true” custom_padding_phone=”100px|20px|20px|20px|false|true” custom_padding_last_edited=”on|desktop” border_radii=”on|6px|6px|6px|6px” global_colors_info=”{}”][et_pb_heading title=”Manage” _builder_version=”4.25.1″ _module_preset=”f0c675ea-2574-4d0e-b725-30f8550a8550″ title_level=”h4″ title_font=”Lato|Lato_weight||on|||||” title_text_color=”#FFFFFF” title_font_size=”14px” title_letter_spacing=”1px” title_line_height=”1.4em” custom_margin=”||10px||false|false” custom_padding=”0px|||||” title_font_size_tablet=”13px” title_font_size_phone=”13px” title_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{%22#1E5F4B%22:%91%22title_text_color%22%93}”][\/et_pb_heading][et_pb_heading title=”Streamlined IT Operations” _builder_version=”4.24.3″ _module_preset=”ba4a6336-701f-47b8-bf5c-09da0ce28016″ title_level=”h3″ title_font=”Lato|Lato_weight|||||||” title_text_color=”#FFFFFF” title_font_size=”32px” title_line_height=”1.3em” custom_margin=”||10px||false|false” title_font_size_tablet=”22px” title_font_size_phone=”17px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][et_pb_text quote_border_color=”#FFFFFF” _builder_version=”4.25.1″ _module_preset=”0504de1e-f5ff-4281-ba60-cbbe4edf98bc” text_font=”Lato|Lato_weight|||||||” text_text_color=”#FFFFFF” text_line_height=”1.75em” link_font=”||||on||||” link_text_color=”#FFFFFF” quote_font=”Lato|Lato_weight|||||||” quote_text_color=”#FFFFFF” header_font=”Lato|Lato_weight|||||||” header_text_color=”#FFFFFF” header_font_size=”72px” header_line_height=”1.15em” header_2_font=”Lato|Lato_weight|||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”50px” header_2_line_height=”1.2em” header_3_font=”Lato|Lato_weight|||||||” header_3_text_color=”#FFFFFF” header_3_font_size=”32px” header_3_line_height=”1.3em” header_4_font=”Lato|Lato_weight|||||||” header_4_text_color=”#FFFFFF” header_4_font_size=”24px” header_4_line_height=”1.4em” header_5_font=”Lato|Lato_weight|||||||” header_5_text_color=”#FFFFFF” header_5_font_size=”18px” header_5_line_height=”1.4em” header_6_font=”Lato|Lato_weight|||||||” header_6_text_color=”#FFFFFF” header_6_line_height=”1.5em” custom_margin=”||||false|false” text_font_size_tablet=”15px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”40px” header_font_size_phone=”24px” header_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”28px” header_2_font_size_phone=”20px” header_2_font_size_last_edited=”on|phone” header_3_font_size_tablet=”22px” header_3_font_size_phone=”17px” header_3_font_size_last_edited=”on|phone” header_4_font_size_tablet=”18px” header_4_font_size_phone=”15px” header_4_font_size_last_edited=”on|tablet” header_5_font_size_tablet=”15px” header_5_font_size_phone=”14px” header_5_font_size_last_edited=”on|desktop” header_6_font_size_tablet=”13px” header_6_font_size_phone=”13px” header_6_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22link_text_color%22%93}”]<\/p>\n Handling a large number of endpoints can result in operational challenges, increased labor costs, and potential compliance issues. Advanced management solutions address these pain points by optimizing IT operations and ensuring thorough oversight.<\/span><\/p>\n <\/p>\n <\/p>\n <\/p>\n [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.25.1″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ background_color=”#811937″ use_background_color_gradient=”on” background_color_gradient_direction=”0deg” background_color_gradient_stops=”#000000 15%|rgba(255,255,255,0) 85%” background_color_gradient_overlays_image=”on” background_enable_image=”off” custom_padding=”60px|30px|30px|30px|false|true” custom_padding_tablet=”130px|30px|30px|30px|false|true” custom_padding_phone=”100px|20px|20px|20px|false|true” custom_padding_last_edited=”on|phone” border_radii=”on|6px|6px|6px|6px” global_colors_info=”{}”][et_pb_heading title=”Secure” _builder_version=”4.25.1″ _module_preset=”f0c675ea-2574-4d0e-b725-30f8550a8550″ title_level=”h4″ title_font=”Lato|Lato_weight||on|||||” title_text_color=”#FFFFFF” title_font_size=”14px” title_letter_spacing=”1px” title_line_height=”1.4em” custom_margin=”||10px||false|false” custom_padding=”0px|||||” title_font_size_tablet=”13px” title_font_size_phone=”13px” title_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{%22#1E5F4B%22:%91%22title_text_color%22%93}”][\/et_pb_heading][et_pb_heading title=”Proactive Threat Defense” _builder_version=”4.24.3″ _module_preset=”ba4a6336-701f-47b8-bf5c-09da0ce28016″ title_level=”h3″ title_font=”Lato|Lato_weight|||||||” title_text_color=”#FFFFFF” title_font_size=”32px” title_line_height=”1.3em” custom_margin=”||10px||false|false” title_font_size_tablet=”22px” title_font_size_phone=”17px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][et_pb_text quote_border_color=”#FFFFFF” _builder_version=”4.25.1″ _module_preset=”0504de1e-f5ff-4281-ba60-cbbe4edf98bc” text_font=”Lato|Lato_weight|||||||” text_text_color=”#FFFFFF” text_line_height=”1.75em” link_font=”||||on||||” link_text_color=”#FFFFFF” quote_font=”Lato|Lato_weight|||||||” quote_text_color=”#FFFFFF” header_font=”Lato|Lato_weight|||||||” header_text_color=”#FFFFFF” header_font_size=”72px” header_line_height=”1.15em” header_2_font=”Lato|Lato_weight|||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”50px” header_2_line_height=”1.2em” header_3_font=”Lato|Lato_weight|||||||” header_3_text_color=”#FFFFFF” header_3_font_size=”32px” header_3_line_height=”1.3em” header_4_font=”Lato|Lato_weight|||||||” header_4_text_color=”#FFFFFF” header_4_font_size=”24px” header_4_line_height=”1.4em” header_5_font=”Lato|Lato_weight|||||||” header_5_text_color=”#FFFFFF” header_5_font_size=”18px” header_5_line_height=”1.4em” header_6_font=”Lato|Lato_weight|||||||” header_6_text_color=”#FFFFFF” header_6_line_height=”1.5em” custom_margin=”||||false|false” text_font_size_tablet=”15px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”40px” header_font_size_phone=”24px” header_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”28px” header_2_font_size_phone=”20px” header_2_font_size_last_edited=”on|phone” header_3_font_size_tablet=”22px” header_3_font_size_phone=”17px” header_3_font_size_last_edited=”on|phone” header_4_font_size_tablet=”18px” header_4_font_size_phone=”15px” header_4_font_size_last_edited=”on|tablet” header_5_font_size_tablet=”15px” header_5_font_size_phone=”14px” header_5_font_size_last_edited=”on|desktop” header_6_font_size_tablet=”13px” header_6_font_size_phone=”13px” header_6_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22link_text_color%22%93}”]<\/p>\n Cyber threats are increasingly sophisticated, and a security breach can have devastating consequences for any business. Comprehensive security solutions address these pain points by providing proactive threat detection, continuous monitoring, and rapid response.<\/span><\/p>\n <\/span><\/p>\n <\/p>\n <\/p>\n <\/p>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” _builder_version=”4.25.1″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.25.1″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ background_color=”#811937″ use_background_color_gradient=”on” background_color_gradient_direction=”0deg” background_color_gradient_stops=”#000000 15%|rgba(255,255,255,0) 85%” background_color_gradient_overlays_image=”on” background_enable_image=”off” custom_padding=”60px|30px|30px|30px|false|true” custom_padding_tablet=”130px|30px|30px|30px|false|true” custom_padding_phone=”100px|20px|20px|20px|false|true” custom_padding_last_edited=”on|desktop” border_radii=”on|6px|6px|6px|6px” global_colors_info=”{}”][et_pb_heading title=”Backup” _builder_version=”4.25.1″ _module_preset=”f0c675ea-2574-4d0e-b725-30f8550a8550″ title_level=”h4″ title_font=”Lato|Lato_weight||on|||||” title_text_color=”#FFFFFF” title_font_size=”14px” title_letter_spacing=”1px” title_line_height=”1.4em” custom_margin=”||10px||false|false” custom_padding=”0px|||||” title_font_size_tablet=”13px” title_font_size_phone=”13px” title_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{%22#1E5F4B%22:%91%22title_text_color%22%93}”][\/et_pb_heading][et_pb_heading title=”Reliable Data Protection” _builder_version=”4.24.3″ _module_preset=”ba4a6336-701f-47b8-bf5c-09da0ce28016″ title_level=”h3″ title_font=”Lato|Lato_weight|||||||” title_text_color=”#FFFFFF” title_font_size=”32px” title_line_height=”1.3em” custom_margin=”||10px||false|false” title_font_size_tablet=”22px” title_font_size_phone=”17px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][et_pb_text quote_border_color=”#FFFFFF” _builder_version=”4.25.1″ _module_preset=”0504de1e-f5ff-4281-ba60-cbbe4edf98bc” text_font=”Lato|Lato_weight|||||||” text_text_color=”#FFFFFF” text_line_height=”1.75em” link_font=”||||on||||” link_text_color=”#FFFFFF” quote_font=”Lato|Lato_weight|||||||” quote_text_color=”#FFFFFF” header_font=”Lato|Lato_weight|||||||” header_text_color=”#FFFFFF” header_font_size=”72px” header_line_height=”1.15em” header_2_font=”Lato|Lato_weight|||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”50px” header_2_line_height=”1.2em” header_3_font=”Lato|Lato_weight|||||||” header_3_text_color=”#FFFFFF” header_3_font_size=”32px” header_3_line_height=”1.3em” header_4_font=”Lato|Lato_weight|||||||” header_4_text_color=”#FFFFFF” header_4_font_size=”24px” header_4_line_height=”1.4em” header_5_font=”Lato|Lato_weight|||||||” header_5_text_color=”#FFFFFF” header_5_font_size=”18px” header_5_line_height=”1.4em” header_6_font=”Lato|Lato_weight|||||||” header_6_text_color=”#FFFFFF” header_6_line_height=”1.5em” custom_margin=”||||false|false” text_font_size_tablet=”15px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”40px” header_font_size_phone=”24px” header_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”28px” header_2_font_size_phone=”20px” header_2_font_size_last_edited=”on|phone” header_3_font_size_tablet=”22px” header_3_font_size_phone=”17px” header_3_font_size_last_edited=”on|phone” header_4_font_size_tablet=”18px” header_4_font_size_phone=”15px” header_4_font_size_last_edited=”on|tablet” header_5_font_size_tablet=”15px” header_5_font_size_phone=”14px” header_5_font_size_last_edited=”on|desktop” header_6_font_size_tablet=”13px” header_6_font_size_phone=”13px” header_6_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22link_text_color%22%93}”]<\/p>\n Data protection is vital for maintaining business continuity. Reliable backup solutions ensure quick recovery, data security, and centralized management, allowing businesses to operate smoothly even in the face of data loss.<\/p>\n <\/span><\/p>\n <\/p>\n <\/p>\n <\/p>\n [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.25.1″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ background_color=”#811937″ use_background_color_gradient=”on” background_color_gradient_direction=”0deg” background_color_gradient_stops=”#000000 15%|rgba(255,255,255,0) 85%” background_color_gradient_overlays_image=”on” background_enable_image=”off” custom_padding=”60px|30px|30px|30px|false|true” custom_padding_tablet=”130px|30px|30px|30px|false|true” custom_padding_phone=”100px|20px|20px|20px|false|true” custom_padding_last_edited=”on|phone” border_radii=”on|6px|6px|6px|6px” global_colors_info=”{}”][et_pb_heading title=”Train” _builder_version=”4.25.1″ _module_preset=”f0c675ea-2574-4d0e-b725-30f8550a8550″ title_level=”h4″ title_font=”Lato|Lato_weight||on|||||” title_text_color=”#FFFFFF” title_font_size=”14px” title_letter_spacing=”1px” title_line_height=”1.4em” custom_margin=”||10px||false|false” custom_padding=”0px|||||” title_font_size_tablet=”13px” title_font_size_phone=”13px” title_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{%22#1E5F4B%22:%91%22title_text_color%22%93}”][\/et_pb_heading][et_pb_heading title=”Enhanced Security Awareness” _builder_version=”4.24.3″ _module_preset=”ba4a6336-701f-47b8-bf5c-09da0ce28016″ title_level=”h3″ title_font=”Lato|Lato_weight|||||||” title_text_color=”#FFFFFF” title_font_size=”32px” title_line_height=”1.3em” custom_margin=”||10px||false|false” title_font_size_tablet=”22px” title_font_size_phone=”17px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][et_pb_text quote_border_color=”#FFFFFF” _builder_version=”4.25.1″ _module_preset=”0504de1e-f5ff-4281-ba60-cbbe4edf98bc” text_font=”Lato|Lato_weight|||||||” text_text_color=”#FFFFFF” text_line_height=”1.75em” link_font=”||||on||||” link_text_color=”#FFFFFF” quote_font=”Lato|Lato_weight|||||||” quote_text_color=”#FFFFFF” header_font=”Lato|Lato_weight|||||||” header_text_color=”#FFFFFF” header_font_size=”72px” header_line_height=”1.15em” header_2_font=”Lato|Lato_weight|||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”50px” header_2_line_height=”1.2em” header_3_font=”Lato|Lato_weight|||||||” header_3_text_color=”#FFFFFF” header_3_font_size=”32px” header_3_line_height=”1.3em” header_4_font=”Lato|Lato_weight|||||||” header_4_text_color=”#FFFFFF” header_4_font_size=”24px” header_4_line_height=”1.4em” header_5_font=”Lato|Lato_weight|||||||” header_5_text_color=”#FFFFFF” header_5_font_size=”18px” header_5_line_height=”1.4em” header_6_font=”Lato|Lato_weight|||||||” header_6_text_color=”#FFFFFF” header_6_line_height=”1.5em” custom_margin=”||||false|false” text_font_size_tablet=”15px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”40px” header_font_size_phone=”24px” header_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”28px” header_2_font_size_phone=”20px” header_2_font_size_last_edited=”on|phone” header_3_font_size_tablet=”22px” header_3_font_size_phone=”17px” header_3_font_size_last_edited=”on|phone” header_4_font_size_tablet=”18px” header_4_font_size_phone=”15px” header_4_font_size_last_edited=”on|tablet” header_5_font_size_tablet=”15px” header_5_font_size_phone=”14px” header_5_font_size_last_edited=”on|desktop” header_6_font_size_tablet=”13px” header_6_font_size_phone=”13px” header_6_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22link_text_color%22%93}”]<\/p>\n Employee errors are a leading cause of security breaches, often due to a lack of awareness and training. Comprehensive training solutions address these issues by educating employees on best practices, ensuring they are prepared to handle potential threats.<\/p>\n <\/span><\/p>\n <\/p>\n <\/p>\n <\/p>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”on|on|on” admin_label=”Text & Image” _builder_version=”4.18.0″ _module_preset=”default” disabled=”on” locked=”off” collapsed=”on” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.18.0″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.18.0″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_image src=”data:image\/svg+xml;base64,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” title_text=”1080×600″ _builder_version=”4.23.1″ _module_preset=”6ed8fd5c-62c5-4100-98c3-7b8b6d2c2ee6″ border_radii=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.18.0″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ custom_padding=”5%||5%||true|false” custom_padding_tablet=”0%||0%||true|false” custom_padding_phone=”0%||0%||true|false” custom_padding_last_edited=”on|desktop” global_colors_info=”{}”][et_pb_heading title=”Secure and Manage Your Endpoints” _builder_version=”4.24.2″ _module_preset=”c33f07d9-41e0-421a-8799-5799df695cce” title_level=”h2″ title_font=”Lato|Lato_weight|||||||” title_text_color=”#0e0c19″ title_font_size=”50px” title_line_height=”1.2em” custom_margin=”||10px||false|false” title_font_size_tablet=”28px” title_font_size_phone=”20px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][et_pb_text quote_border_color=”#811937″ _builder_version=”4.24.2″ _module_preset=”2c55a9c4-feed-423b-9edb-ae0b5b365cac” text_font=”Lato|Lato_weight|||||||” text_text_color=”#3c3a47″ text_line_height=”1.75em” link_font=”|Lato_weight|||||||” link_text_color=”#1E5F4B” quote_font=”Lato|Lato_weight|||||||” quote_text_color=”#0e0c19″ header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”72px” header_line_height=”1.15em” header_2_font=”Lato|Lato_weight|||||||” header_2_text_color=”#0e0c19″ header_2_font_size=”50px” header_2_line_height=”1.2em” header_3_font=”Lato|Lato_weight|||||||” header_3_text_color=”#0e0c19″ header_3_font_size=”32px” header_3_line_height=”1.3em” header_4_font=”Lato|Lato_weight|||||||” header_4_text_color=”#0e0c19″ header_4_font_size=”24px” header_4_line_height=”1.4em” header_5_font=”Lato|Lato_weight|||||||” header_5_text_color=”#0e0c19″ header_5_font_size=”18px” header_5_line_height=”1.4em” header_6_font=”Lato|Lato_weight|||||||” header_6_text_color=”#0e0c19″ header_6_line_height=”1.5em” custom_margin=”||||false|false” text_font_size_tablet=”15px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”40px” header_font_size_phone=”24px” header_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”28px” header_2_font_size_phone=”20px” header_2_font_size_last_edited=”on|phone” header_3_font_size_tablet=”22px” header_3_font_size_phone=”17px” header_3_font_size_last_edited=”on|phone” header_4_font_size_tablet=”18px” header_4_font_size_phone=”15px” header_4_font_size_last_edited=”on|tablet” header_5_font_size_tablet=”15px” header_5_font_size_phone=”14px” header_5_font_size_last_edited=”on|desktop” header_6_font_size_tablet=”13px” header_6_font_size_phone=”13px” header_6_font_size_last_edited=”on|desktop” global_colors_info=”{}”]<\/p>\n Prominic\u2019s Core Computer Management and Security Package offers a robust solution for protecting and managing your business’s desktops, laptops, and servers. Our package integrates advanced threat detection, real-time mitigation, and robust data protection to ensure your endpoints are secure and efficiently managed.<\/p>\n [\/et_pb_text][et_pb_button button_text=”Learn More” _builder_version=”4.23.1″ _module_preset=”1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206″ custom_button=”on” button_text_size=”14px” button_text_color=”#FFFFFF” button_bg_color=”#1E5F4B” button_border_width=”0px” button_border_radius=”100px” button_font=”Lato|700|||||||” custom_padding=”12px|24px|12px|24px|true|true” global_colors_info=”{}” custom_padding__hover_enabled=”off|desktop” custom_padding__hover=”|28px||20px|true|false”][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.23.1″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.18.0″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ custom_padding=”5%||5%||true|false” custom_padding_tablet=”0%||0%||true|false” custom_padding_phone=”0%||0%||true|false” custom_padding_last_edited=”on|desktop” global_colors_info=”{}”][et_pb_heading title=”Advanced Threat Detection and Response” _builder_version=”4.24.3″ _module_preset=”c33f07d9-41e0-421a-8799-5799df695cce” title_level=”h2″ title_font=”Lato|Lato_weight|||||||” title_text_color=”#0e0c19″ title_font_size=”50px” title_line_height=”1.2em” custom_margin=”||10px||false|false” title_font_size_tablet=”28px” title_font_size_phone=”20px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][et_pb_text quote_border_color=”#811937″ _builder_version=”4.24.2″ _module_preset=”2c55a9c4-feed-423b-9edb-ae0b5b365cac” text_font=”Lato|Lato_weight|||||||” text_text_color=”#3c3a47″ text_line_height=”1.75em” link_font=”|Lato_weight|||||||” link_text_color=”#1E5F4B” quote_font=”Lato|Lato_weight|||||||” quote_text_color=”#0e0c19″ header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”72px” header_line_height=”1.15em” header_2_font=”Lato|Lato_weight|||||||” header_2_text_color=”#0e0c19″ header_2_font_size=”50px” header_2_line_height=”1.2em” header_3_font=”Lato|Lato_weight|||||||” header_3_text_color=”#0e0c19″ header_3_font_size=”32px” header_3_line_height=”1.3em” header_4_font=”Lato|Lato_weight|||||||” header_4_text_color=”#0e0c19″ header_4_font_size=”24px” header_4_line_height=”1.4em” header_5_font=”Lato|Lato_weight|||||||” header_5_text_color=”#0e0c19″ header_5_font_size=”18px” header_5_line_height=”1.4em” header_6_font=”Lato|Lato_weight|||||||” header_6_text_color=”#0e0c19″ header_6_line_height=”1.5em” custom_margin=”||||false|false” text_font_size_tablet=”15px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”40px” header_font_size_phone=”24px” header_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”28px” header_2_font_size_phone=”20px” header_2_font_size_last_edited=”on|phone” header_3_font_size_tablet=”22px” header_3_font_size_phone=”17px” header_3_font_size_last_edited=”on|phone” header_4_font_size_tablet=”18px” header_4_font_size_phone=”15px” header_4_font_size_last_edited=”on|tablet” header_5_font_size_tablet=”15px” header_5_font_size_phone=”14px” header_5_font_size_last_edited=”on|desktop” header_6_font_size_tablet=”13px” header_6_font_size_phone=”13px” header_6_font_size_last_edited=”on|desktop” global_colors_info=”{}”]<\/p>\n Stay ahead of cyber threats with real-time detection, analysis, and response. Our cutting-edge technology ensures your business remains protected against the latest threats.<\/p>\n [\/et_pb_text][et_pb_button button_text=”Discover More” _builder_version=”4.23.1″ _module_preset=”1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206″ custom_button=”on” button_text_size=”14px” button_text_color=”#FFFFFF” button_bg_color=”#1E5F4B” button_border_width=”0px” button_border_radius=”100px” button_font=”Lato|700|||||||” custom_padding=”12px|24px|12px|24px|true|true” global_colors_info=”{}” custom_padding__hover_enabled=”off|desktop” custom_padding__hover=”|28px||20px|true|false”][\/et_pb_button][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.18.0″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_image src=”data:image\/svg+xml;base64,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” title_text=”1080×600″ _builder_version=”4.23.1″ _module_preset=”6ed8fd5c-62c5-4100-98c3-7b8b6d2c2ee6″ border_radii=”on|6px|6px|6px|6px” locked=”off” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Frequently Asked Questions” _builder_version=”4.23.1″ _module_preset=”default” locked=”off” collapsed=”on” global_colors_info=”{}”][et_pb_row _builder_version=”4.17.3″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.17.3″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_heading title=”Your Questions Answered” _builder_version=”4.24.3″ _module_preset=”c33f07d9-41e0-421a-8799-5799df695cce” title_level=”h2″ title_font=”Lato|Lato_weight|||||||” title_text_color=”#0e0c19″ title_font_size=”50px” title_line_height=”1.2em” custom_margin=”||10px||false|false” title_font_size_tablet=”28px” title_font_size_phone=”20px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.24.2″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ locked=”off” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”What is included in the Core Computer Management and Security Package?” use_icon=”on” font_icon=”u||divi||400″ icon_color=”#eabe0e” image_icon_background_color=”#811937″ icon_placement=”left” image_icon_width=”24px” content_max_width=”100%” module_class=”ai_ignore_font_icon” _builder_version=”4.24.2″ _module_preset=”c4be762d-d134-408e-b49a-ae764af14c39″ header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” image_icon_custom_margin=”||||false” image_icon_custom_padding=”14px|14px|14px|14px|true|true” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|40px|40px|40px|40px” global_colors_info=”{%22#0e0c19%22:%91%22header_text_color%22%93,%22#3c3a47%22:%91%22body_text_color%22%93,%22#811937%22:%91%22image_icon_background_color%22%93}”]<\/p>\n The package includes unified endpoint management, advanced threat detection and response, cloud backup solutions, multi-factor authentication, real-time monitoring, and automated patch deployment.<\/p>\n [\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”How does real-time threat detection work?” use_icon=”on” font_icon=”u||divi||400″ icon_color=”#eabe0e” image_icon_background_color=”#811937″ icon_placement=”left” image_icon_width=”24px” content_max_width=”100%” module_class=”ai_ignore_font_icon” _builder_version=”4.24.2″ _module_preset=”c4be762d-d134-408e-b49a-ae764af14c39″ header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” image_icon_custom_margin=”||||false” image_icon_custom_padding=”14px|14px|14px|14px|true|true” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|40px|40px|40px|40px” global_colors_info=”{%22#0e0c19%22:%91%22header_text_color%22%93,%22#3c3a47%22:%91%22body_text_color%22%93,%22#811937%22:%91%22image_icon_background_color%22%93}”]<\/p>\n Real-time threat detection continuously monitors your endpoints for suspicious activity. When a potential threat is identified, it is analyzed, and a response is initiated immediately to mitigate the risk.<\/p>\n [\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”What kind of support does Prominic offer?” use_icon=”on” font_icon=”u||divi||400″ icon_color=”#eabe0e” image_icon_background_color=”#811937″ icon_placement=”left” image_icon_width=”24px” content_max_width=”100%” module_class=”ai_ignore_font_icon” _builder_version=”4.24.2″ _module_preset=”c4be762d-d134-408e-b49a-ae764af14c39″ header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” image_icon_custom_margin=”||||false” image_icon_custom_padding=”14px|14px|14px|14px|true|true” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|40px|40px|40px|40px” global_colors_info=”{%22#0e0c19%22:%91%22header_text_color%22%93,%22#3c3a47%22:%91%22body_text_color%22%93,%22#811937%22:%91%22image_icon_background_color%22%93}”]<\/p>\n Prominic offers 24\/7 monitoring and support. Our expert technical team is available around the clock to assist with any issues or concerns, ensuring that your systems are always protected and running smoothly.<\/p>\n [\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.24.2″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ locked=”off” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”How secure are the cloud backups?” use_icon=”on” font_icon=”u||divi||400″ icon_color=”#eabe0e” image_icon_background_color=”#811937″ icon_placement=”left” image_icon_width=”24px” content_max_width=”100%” module_class=”ai_ignore_font_icon” _builder_version=”4.24.2″ _module_preset=”c4be762d-d134-408e-b49a-ae764af14c39″ header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” image_icon_custom_margin=”||||false” image_icon_custom_padding=”14px|14px|14px|14px|true|true” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|40px|40px|40px|40px” global_colors_info=”{%22#0e0c19%22:%91%22header_text_color%22%93,%22#3c3a47%22:%91%22body_text_color%22%93,%22#811937%22:%91%22image_icon_background_color%22%93}”]<\/p>\n Our cloud backup solutions use advanced encryption to ensure that your data is secure during transmission and while stored in the cloud. Regular backups are performed to maintain data integrity and availability.<\/p>\n [\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”Can the package be customized to fit our specific needs?” use_icon=”on” font_icon=”u||divi||400″ icon_color=”#eabe0e” image_icon_background_color=”#811937″ icon_placement=”left” image_icon_width=”24px” content_max_width=”100%” module_class=”ai_ignore_font_icon” _builder_version=”4.24.2″ _module_preset=”c4be762d-d134-408e-b49a-ae764af14c39″ header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” image_icon_custom_margin=”||||false” image_icon_custom_padding=”14px|14px|14px|14px|true|true” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|40px|40px|40px|40px” global_colors_info=”{%22#0e0c19%22:%91%22header_text_color%22%93,%22#3c3a47%22:%91%22body_text_color%22%93,%22#811937%22:%91%22image_icon_background_color%22%93}”]<\/p>\n Yes, the Core Computer Management and Security Package is designed to be flexible and scalable. We can customize the features to align with your specific requirements and grow with your business as your needs evolve.<\/p>\n [\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”How quickly can we deploy this solution?” use_icon=”on” font_icon=”u||divi||400″ icon_color=”#eabe0e” image_icon_background_color=”#811937″ icon_placement=”left” image_icon_width=”24px” content_max_width=”100%” module_class=”ai_ignore_font_icon” _builder_version=”4.24.2″ _module_preset=”c4be762d-d134-408e-b49a-ae764af14c39″ header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” image_icon_custom_margin=”||||false” image_icon_custom_padding=”14px|14px|14px|14px|true|true” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|40px|40px|40px|40px” global_colors_info=”{%22#0e0c19%22:%91%22header_text_color%22%93,%22#3c3a47%22:%91%22body_text_color%22%93,%22#811937%22:%91%22image_icon_background_color%22%93}”]<\/p>\n The deployment process is streamlined to minimize disruption to your operations. Depending on the size and complexity of your IT infrastructure, the deployment can be completed swiftly, with most setups taking just a few days.<\/p>\n [\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.24.2″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ locked=”off” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”How does automated patch deployment benefit our business?” use_icon=”on” font_icon=”u||divi||400″ icon_color=”#eabe0e” image_icon_background_color=”#811937″ icon_placement=”left” image_icon_width=”24px” content_max_width=”100%” module_class=”ai_ignore_font_icon” _builder_version=”4.24.2″ _module_preset=”c4be762d-d134-408e-b49a-ae764af14c39″ header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” image_icon_custom_margin=”||||false” image_icon_custom_padding=”14px|14px|14px|14px|true|true” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|40px|40px|40px|40px” global_colors_info=”{%22#0e0c19%22:%91%22header_text_color%22%93,%22#3c3a47%22:%91%22body_text_color%22%93,%22#811937%22:%91%22image_icon_background_color%22%93}”]<\/p>\n Automated patch deployment ensures that all your systems are kept up-to-date with the latest security patches and updates. This reduces the risk of vulnerabilities and helps maintain optimal performance across all endpoints.<\/p>\n [\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”What industries can benefit from this package?” use_icon=”on” font_icon=”u||divi||400″ icon_color=”#eabe0e” image_icon_background_color=”#811937″ icon_placement=”left” image_icon_width=”24px” content_max_width=”100%” module_class=”ai_ignore_font_icon” _builder_version=”4.24.2″ _module_preset=”c4be762d-d134-408e-b49a-ae764af14c39″ header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” image_icon_custom_margin=”||||false” image_icon_custom_padding=”14px|14px|14px|14px|true|true” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|40px|40px|40px|40px” global_colors_info=”{%22#0e0c19%22:%91%22header_text_color%22%93,%22#3c3a47%22:%91%22body_text_color%22%93,%22#811937%22:%91%22image_icon_background_color%22%93}”]<\/p>\n The Core Computer Management and Security Package is suitable for a wide range of industries, including healthcare, finance, technology, and more. Any business that relies on secure and efficient endpoint management can benefit from our comprehensive solution.<\/p>\n [\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_blurb title=”What is the cost of the Core Computer Management and Security Package?” use_icon=”on” font_icon=”u||divi||400″ icon_color=”#eabe0e” image_icon_background_color=”#811937″ icon_placement=”left” image_icon_width=”24px” content_max_width=”100%” module_class=”ai_ignore_font_icon” _builder_version=”4.24.2″ _module_preset=”c4be762d-d134-408e-b49a-ae764af14c39″ header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” body_link_text_color=”#1E5F4B” image_icon_custom_margin=”||||false” image_icon_custom_padding=”14px|14px|14px|14px|true|true” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” border_radii_image=”on|40px|40px|40px|40px” global_colors_info=”{%22#0e0c19%22:%91%22header_text_color%22%93,%22#3c3a47%22:%91%22body_text_color%22%93,%22#811937%22:%91%22image_icon_background_color%22%93}”]<\/p>\n The cost varies depending on the plan you choose and the specific needs of your business. Contact us for a detailed quote tailored to your requirements.<\/p>\n [\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”on|on|on” admin_label=”Text & Image” _builder_version=”4.18.0″ _module_preset=”default” disabled=”on” locked=”off” collapsed=”on” global_colors_info=”{}”][et_pb_row _builder_version=”4.18.0″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16.0″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_image src=”data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMTA4MCIgaGVpZ2h0PSI1NDAiIHZpZXdCb3g9IjAgMCAxMDgwIDU0MCIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIj4KICAgIDxnIGZpbGw9Im5vbmUiIGZpbGwtcnVsZT0iZXZlbm9kZCI+CiAgICAgICAgPHBhdGggZmlsbD0iI0VCRUJFQiIgZD0iTTAgMGgxMDgwdjU0MEgweiIvPgogICAgICAgIDxwYXRoIGQ9Ik00NDUuNjQ5IDU0MGgtOTguOTk1TDE0NC42NDkgMzM3Ljk5NSAwIDQ4Mi42NDR2LTk4Ljk5NWwxMTYuMzY1LTExNi4zNjVjMTUuNjItMTUuNjIgNDAuOTQ3LTE1LjYyIDU2LjU2OCAwTDQ0NS42NSA1NDB6IiBmaWxsLW9wYWNpdHk9Ii4xIiBmaWxsPSIjMDAwIiBmaWxsLXJ1bGU9Im5vbnplcm8iLz4KICAgICAgICA8Y2lyY2xlIGZpbGwtb3BhY2l0eT0iLjA1IiBmaWxsPSIjMDAwIiBjeD0iMzMxIiBjeT0iMTQ4IiByPSI3MCIvPgogICAgICAgIDxwYXRoIGQ9Ik0xMDgwIDM3OXYxMTMuMTM3TDcyOC4xNjIgMTQwLjMgMzI4LjQ2MiA1NDBIMjE1LjMyNEw2OTkuODc4IDU1LjQ0NmMxNS42Mi0xNS42MiA0MC45NDgtMTUuNjIgNTYuNTY4IDBMMTA4MCAzNzl6IiBmaWxsLW9wYWNpdHk9Ii4yIiBmaWxsPSIjMDAwIiBmaWxsLXJ1bGU9Im5vbnplcm8iLz4KICAgIDwvZz4KPC9zdmc+Cg==” title_text=”1080×600″ _builder_version=”4.24.3″ _module_preset=”6ed8fd5c-62c5-4100-98c3-7b8b6d2c2ee6″ border_radii=”on|6px|6px|6px|6px” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.18.0″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ locked=”off” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16.0″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_heading title=”Comprehensive Endpoint Management” _builder_version=”4.24.3″ _module_preset=”ba4a6336-701f-47b8-bf5c-09da0ce28016″ title_level=”h3″ title_font=”Lato|Lato_weight|||||||” title_text_color=”#0e0c19″ title_font_size=”32px” title_line_height=”1.3em” custom_margin=”||10px||false|false” title_font_size_tablet=”22px” title_font_size_phone=”17px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16.0″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_text quote_border_color=”#811937″ _builder_version=”4.24.3″ _module_preset=”2c55a9c4-feed-423b-9edb-ae0b5b365cac” text_font=”Lato|Lato_weight|||||||” text_text_color=”#3c3a47″ text_line_height=”1.75em” link_font=”|Lato_weight|||||||” link_text_color=”#1E5F4B” quote_font=”Lato|Lato_weight|||||||” quote_text_color=”#0e0c19″ header_font=”Lato|Lato_weight|||||||” header_text_color=”#0e0c19″ header_font_size=”72px” header_line_height=”1.15em” header_2_font=”Lato|Lato_weight|||||||” header_2_text_color=”#0e0c19″ header_2_font_size=”50px” header_2_line_height=”1.2em” header_3_font=”Lato|Lato_weight|||||||” header_3_text_color=”#0e0c19″ header_3_font_size=”32px” header_3_line_height=”1.3em” header_4_font=”Lato|Lato_weight|||||||” header_4_text_color=”#0e0c19″ header_4_font_size=”24px” header_4_line_height=”1.4em” header_5_font=”Lato|Lato_weight|||||||” header_5_text_color=”#0e0c19″ header_5_font_size=”18px” header_5_line_height=”1.4em” header_6_font=”Lato|Lato_weight|||||||” header_6_text_color=”#0e0c19″ header_6_line_height=”1.5em” custom_margin=”||||false|false” text_font_size_tablet=”15px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”40px” header_font_size_phone=”24px” header_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”28px” header_2_font_size_phone=”20px” header_2_font_size_last_edited=”on|phone” header_3_font_size_tablet=”22px” header_3_font_size_phone=”17px” header_3_font_size_last_edited=”on|phone” header_4_font_size_tablet=”18px” header_4_font_size_phone=”15px” header_4_font_size_last_edited=”on|tablet” header_5_font_size_tablet=”15px” header_5_font_size_phone=”14px” header_5_font_size_last_edited=”on|desktop” header_6_font_size_tablet=”13px” header_6_font_size_phone=”13px” header_6_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]<\/p>\n Prominic.NET offers a robust solution for managing and securing your business’s endpoints. Our Core Computer Management and Security Package ensures that your desktops, laptops, and servers are protected and efficiently managed, allowing you to focus on your core business activities.<\/p>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Pricing” _builder_version=”4.23.1″ _module_preset=”default” locked=”off” collapsed=”on” global_colors_info=”{}” disabled_on=”on|on|on” disabled=”on”][et_pb_row _builder_version=”4.17.6″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ custom_padding=”||0px|||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_heading title=”Choose Your Plan” _builder_version=”4.24.2″ _module_preset=”c33f07d9-41e0-421a-8799-5799df695cce” title_level=”h2″ title_font=”Lato|Lato_weight|||||||” title_text_align=”center” title_text_color=”#0e0c19″ title_font_size=”50px” title_line_height=”1.2em” custom_margin=”||10px||false|false” title_font_size_tablet=”28px” title_font_size_phone=”20px” title_font_size_last_edited=”on|phone” global_colors_info=”{}”][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.24.3″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.24.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_pricing_tables featured_table_header_background_color=”RGBA(255,255,255,0)” header_background_color=”RGBA(255,255,255,0)” show_bullet=”off” _builder_version=”4.24.3″ _module_preset=”f617932d-b118-450d-b70f-fe25c50ea349″ currency_frequency_text_color=”#3c3a47″ price_text_color=”#1E5F4B” subheader_text_color=”#3c3a47″ body_text_color=”#3c3a47″ header_text_color=”#0e0c19″ header_level=”h3″ header_font=”Lato|Lato_weight|||||||” header_font_size=”18px” header_line_height=”1.4em” body_font=”Lato|Lato_weight|||||||” body_text_align=”center” body_line_height=”1.75em” subheader_font=”Lato|Lato_weight|||||||” subheader_font_size=”16px” subheader_line_height=”1.75em” price_font=”Lato|700|||||||” price_font_size=”60px” currency_frequency_font=”Lato|Lato_weight|||||||” excluded_font=”||||||on||” body_link_text_color=”#1E5F4B” background_color=”#FFFFFF” custom_button=”on” button_text_size=”14px” button_text_color=”#FFFFFF” button_bg_color=”#1E5F4B” button_border_width=”0px” button_border_radius=”100px” button_font=”Lato|700|||||||” button_custom_margin=”||12px||false|false” button_custom_padding=”12px|24px|12px|24px|true|true” custom_padding=”20px|20px|20px|20px|true|true” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|desktop” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” subheader_font_size_tablet=”15px” subheader_font_size_phone=”14px” subheader_font_size_last_edited=”on|tablet” custom_css_pricing_top=”border: none;” custom_css_pricing_item=”padding-bottom: 1.25em;” border_radii=”on|6px|6px|6px|6px” border_width_all=”2px” border_color_all=”rgba(0,0,0,0.08)” locked=”off” global_colors_info=”{}” price_letter_spacing__sticky_enabled=”on|desktop”][et_pb_pricing_table title=”Basic Plan” subtitle=”Ideal for small businesses” currency=”$” per=”month” sum=”50″ button_url=”#” button_text=”Get Started” _builder_version=”4.23″ _module_preset=”default” border_width_right=”0px” border_width_right_tablet=”0px” border_width_right_phone=”2px” border_width_right_last_edited=”on|phone” global_colors_info=”{}” sticky_transition=”on”]<\/p>\n + Unified Endpoint Management [\/et_pb_pricing_table][et_pb_pricing_table featured=”on” title=”Professional Plan” subtitle=”Perfect for growing businesses” currency=”$” per=”month” sum=”50″ button_url=”#” button_text=”Get Started” _builder_version=”4.24.3″ _module_preset=”default” box_shadow_style=”preset4″ box_shadow_horizontal=”0px” box_shadow_vertical=”24px” box_shadow_blur=”72px” box_shadow_spread=”-12px” box_shadow_color=”rgba(0,0,0,0.12)” global_colors_info=”{}” sticky_transition=”on”]<\/p>\n + Unified Endpoint Management [\/et_pb_pricing_table][et_pb_pricing_table title=”Enterprise Plan” subtitle=”Best for large enterprises” currency=”$” per=”month” sum=”50″ button_url=”#” button_text=”Get Started” _builder_version=”4.23″ _module_preset=”default” border_width_left=”0px” border_width_left_tablet=”2px” border_width_left_phone=”2px” border_width_left_last_edited=”on|phone” global_colors_info=”{}” sticky_transition=”on”]<\/p>\n + Unified Endpoint Management [\/et_pb_pricing_table][\/et_pb_pricing_tables][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Testimonials” _builder_version=”4.17.6″ _module_preset=”default” locked=”off” collapsed=”on” global_colors_info=”{}” disabled_on=”on|on|on” disabled=”on”][et_pb_row _builder_version=”4.17.6″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_heading title=”What Our Customers Say” _builder_version=”4.24.3″ _module_preset=”c33f07d9-41e0-421a-8799-5799df695cce” title_level=”h2″ title_font=”Lato|Lato_weight|||||||” title_text_color=”#0e0c19″ title_font_size=”50px” title_line_height=”1.2em” custom_margin=”||10px||false|false” title_font_size_tablet=”28px” title_font_size_phone=”20px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ use_custom_gutter=”on” gutter_width=”2″ _builder_version=”4.24.2″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.24.2″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_testimonial author=”John Doe, IT Manager” portrait_url=”https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2024\/05\/new-portrait-10-800×800-1-1-800×800.jpg” quote_icon_color=”#1E5F4B” quote_icon_background_color=”RGBA(255,255,255,0)” font_icon=”||fa||900″ module_class=”ai_ignore_font_icon” _builder_version=”4.24.3″ _module_preset=”0e35d7c8-43f7-4642-88fa-284809e5aebb” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” author_font=”Lato|700|||||||” author_text_color=”#0e0c19″ position_font=”Lato|Lato_weight|||||||” company_font=”Lato|Lato_weight|||||||” background_color=”RGBA(255,255,255,0)” text_orientation=”center” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” custom_css_main_element=”overflow: visible !important;” border_radii=”on|6px|6px|6px|6px” border_width_all=”2px” border_color_all=”rgba(0,0,0,0.08)” border_radii_portrait=”on|100px|100px|100px|100px” locked=”off” global_colors_info=”{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22%93}” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone”]<\/p>\n Prominic.NET’s security package has transformed our endpoint management. The real-time monitoring and automated patch deployment have significantly reduced our downtime.<\/p>\n [\/et_pb_testimonial][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_testimonial author=”Jane Smith, CTO” portrait_url=”https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2024\/05\/new-portrait-9-800×800-1-1-800×800.jpg” quote_icon_color=”#1E5F4B” quote_icon_background_color=”RGBA(255,255,255,0)” font_icon=”||fa||900″ module_class=”ai_ignore_font_icon” _builder_version=”4.24.3″ _module_preset=”0e35d7c8-43f7-4642-88fa-284809e5aebb” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” author_font=”Lato|700|||||||” author_text_color=”#0e0c19″ position_font=”Lato|Lato_weight|||||||” company_font=”Lato|Lato_weight|||||||” background_color=”RGBA(255,255,255,0)” text_orientation=”center” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” custom_css_main_element=”overflow: visible !important;” border_radii=”on|6px|6px|6px|6px” border_width_all=”2px” border_color_all=”rgba(0,0,0,0.08)” border_radii_portrait=”on|100px|100px|100px|100px” locked=”off” global_colors_info=”{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22%93}” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone”]<\/p>\n The advanced threat detection and response features have been a game-changer for our company. We feel much more secure knowing that Prominic.NET is protecting our data.<\/p>\n [\/et_pb_testimonial][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_testimonial author=”Michael Brown, CEO” portrait_url=”https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2024\/05\/new-portrait-11-800×800-1-2-800×800.jpg” quote_icon_color=”#1E5F4B” quote_icon_background_color=”RGBA(255,255,255,0)” font_icon=”||fa||900″ module_class=”ai_ignore_font_icon” _builder_version=”4.24.3″ _module_preset=”0e35d7c8-43f7-4642-88fa-284809e5aebb” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” author_font=”Lato|700|||||||” author_text_color=”#0e0c19″ position_font=”Lato|Lato_weight|||||||” company_font=”Lato|Lato_weight|||||||” background_color=”RGBA(255,255,255,0)” text_orientation=”center” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” custom_css_main_element=”overflow: visible !important;” border_radii=”on|6px|6px|6px|6px” border_width_all=”2px” border_color_all=”rgba(0,0,0,0.08)” border_radii_portrait=”on|100px|100px|100px|100px” locked=”off” global_colors_info=”{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22%93}” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone”]<\/p>\n With Prominic.NET’s comprehensive solution, we have peace of mind knowing our critical data is backed up and easily recoverable. The seamless integration with our existing systems was a huge plus.<\/p>\n [\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ use_custom_gutter=”on” gutter_width=”2″ _builder_version=”4.16″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_testimonial author=”Emily Johnson, Systems Administrator” quote_icon_color=”#1E5F4B” quote_icon_background_color=”RGBA(255,255,255,0)” font_icon=”||fa||900″ module_class=”ai_ignore_font_icon” _builder_version=”4.24.3″ _module_preset=”0e35d7c8-43f7-4642-88fa-284809e5aebb” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” author_font=”Lato|700|||||||” author_text_color=”#0e0c19″ position_font=”Lato|Lato_weight|||||||” company_font=”Lato|Lato_weight|||||||” background_color=”RGBA(255,255,255,0)” text_orientation=”center” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” custom_css_main_element=”overflow: visible !important;” border_radii=”on|6px|6px|6px|6px” border_width_all=”2px” border_color_all=”rgba(0,0,0,0.08)” border_radii_portrait=”on|100px|100px|100px|100px” locked=”off” global_colors_info=”{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22%93}” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone”]<\/p>\n The unified endpoint management feature has made it so much easier to keep track of all our devices. The detailed inventory management is incredibly useful.<\/p>\n [\/et_pb_testimonial][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_testimonial author=”David Lee, Network Engineer” quote_icon_color=”#1E5F4B” quote_icon_background_color=”RGBA(255,255,255,0)” font_icon=”||fa||900″ module_class=”ai_ignore_font_icon” _builder_version=”4.24.3″ _module_preset=”0e35d7c8-43f7-4642-88fa-284809e5aebb” body_font=”Lato|Lato_weight|||||||” body_text_color=”#3c3a47″ body_line_height=”1.75em” author_font=”Lato|700|||||||” author_text_color=”#0e0c19″ position_font=”Lato|Lato_weight|||||||” company_font=”Lato|Lato_weight|||||||” background_color=”RGBA(255,255,255,0)” text_orientation=”center” body_font_size_tablet=”15px” body_font_size_phone=”14px” body_font_size_last_edited=”on|desktop” custom_css_main_element=”overflow: visible !important;” border_radii=”on|6px|6px|6px|6px” border_width_all=”2px” border_color_all=”rgba(0,0,0,0.08)” border_radii_portrait=”on|100px|100px|100px|100px” locked=”off” global_colors_info=”{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22,%22icon_color%22%93}” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone”]<\/p>\n The 24\/7 monitoring and support provided by Prominic.NET have been invaluable. Their expert team is always available to assist with any issues, ensuring our systems are always protected.<\/p>\n [\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Call to Action” _builder_version=”4.17.6″ _module_preset=”default” custom_padding=”0px|||||” locked=”off” collapsed=”on” global_colors_info=”{}”][et_pb_row _builder_version=”4.17.6″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ min_height=”602.6px” custom_padding=”||0px|||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_image src=”https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2024\/05\/DALL\u00b7E-2024-05-22-12.17.48-A-professional-IT-technician-managing-a-network-of-secure-endpoints-including-desktops-laptops-and-servers-in-a-modern-office-environment.-The-tech-1-scaled.webp” title_text=”DALL\u00b7E 2024-05-22 12.17.48 – A professional IT technician managing a network of secure endpoints including desktops, laptops, and servers, in a modern office environment. The tech” _builder_version=”4.25.1″ _module_preset=”6ed8fd5c-62c5-4100-98c3-7b8b6d2c2ee6″ custom_margin=”-27px|||||” border_radii=”on|6px|6px|6px|6px” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”3_5,2_5″ _builder_version=”4.17.6″ _module_preset=”5138c454-be54-4233-bd3b-f8e6a8747976″ global_colors_info=”{}”][et_pb_column type=”3_5″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_heading title=”Ready to Secure Your Endpoints?” _builder_version=”4.24.2″ _module_preset=”c33f07d9-41e0-421a-8799-5799df695cce” title_level=”h2″ title_font=”Lato|Lato_weight|||||||” title_text_color=”#0e0c19″ title_font_size=”50px” title_line_height=”1.2em” custom_margin=”||10px||false|false” title_font_size_tablet=”28px” title_font_size_phone=”20px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][\/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.16″ _module_preset=”73121f80-a3ef-4484-8763-c3f18e3c56d2″ global_colors_info=”{}”][et_pb_heading title=”Protect and manage your endpoints with Prominic’s comprehensive package. Get started with Prominic today.” _builder_version=”4.24.3″ _module_preset=”a3805066-8711-43c7-9f62-5782da0e9f7a” title_level=”h5″ title_font=”Lato|Lato_weight|||||||” title_text_color=”#0e0c19″ title_font_size=”18px” title_line_height=”1.4em” custom_margin=”||10px||false|false” title_font_size_tablet=”15px” title_font_size_phone=”14px” title_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][\/et_pb_heading][et_pb_button button_url=”https:\/\/prominic.net\/prominic-sales\/” url_new_window=”on” button_text=”Contact Us” _builder_version=”4.25.1″ _module_preset=”1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206″ custom_button=”on” button_text_size=”14px” button_text_color=”#FFFFFF” button_bg_color=”#1E5F4B” button_border_width=”0px” button_border_radius=”100px” button_font=”Lato|700|||||||” custom_padding=”12px|24px|12px|24px|true|true” locked=”off” global_colors_info=”{}” custom_padding__hover_enabled=”off|desktop” custom_padding__hover=”|28px||20px|true|false”][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":" Ensure the security and efficiency of your business’s endpoints with our all-in-one solution.Our package combines robust management and advanced security features to protect and optimize your desktops, laptops, and servers. Experience seamless integration and unparalleled protection with Prominic’s comprehensive solution.Manage all endpoints from a single platform. Integrates remote management, monitoring, inventory management, and automated patch […]<\/p>\n","protected":false},"author":36,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"yoast_head":"\n\n
\n
\n
\n
<\/ul>\n
<\/ul>\n
<\/ul>\n
\n
\n
\n
\n
<\/ul>\n
<\/ul>\n
\n
\n
\n
\n
<\/ul>\n
<\/ul>\n
\n
\n
\n
\n
<\/ul>\n
+ Advanced Threat Detection
+ Cloud Backup Solutions
+ Multi-Factor Authentication
– 24\/7 Monitoring
– Customizable Features<\/p>\n
+ Advanced Threat Detection
+ Cloud Backup Solutions
+ Multi-Factor Authentication
+ 24\/7 Monitoring
+ Customizable Features
– Dedicated Support<\/p>\n
+ Advanced Threat Detection
+ Cloud Backup Solutions
+ Multi-Factor Authentication
+ 24\/7 Monitoring
+ Customizable Features
+ Dedicated Support
+ Priority Response<\/p>\n