services

[et_pb_section fb_built=”1″ admin_label=”Header” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00ffd8 0%|#0029e2 100%” background_color_gradient_start=”#00ffd8″ background_color_gradient_end=”#0029e2″ background_image=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-18.png” parallax=”on” custom_padding=”10vw||” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ z_index=”1″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_font=”Overpass|900|||||||” header_font_size=”84px” background_layout=”dark” header_font_size_tablet=”54px” header_font_size_phone=”32px” header_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]

Security Solutions

[/et_pb_text][et_pb_button button_text=”Talk With An Expert” _builder_version=”4.16″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#47d7ff” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(23,102,193,0.46)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px” theme_builder_area=”post_content”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_image src=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-06-1.png” align=”right” _builder_version=”4.16″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”-10vw|0vw||” custom_margin_tablet=”-2vw|0vw||” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_6,1_6,1_6,1_6,1_6,1_6″ use_custom_gutter=”on” gutter_width=”2″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_button button_text=”Threat Discovery” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px” theme_builder_area=”post_content”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_button button_text=”Endpoint Security” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px” theme_builder_area=”post_content”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_button button_text=”Vulnerabilities” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px” theme_builder_area=”post_content”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_button button_text=”Security Training” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px” theme_builder_area=”post_content”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_button button_text=”Incident Report” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px” theme_builder_area=”post_content”][/et_pb_button][/et_pb_column][et_pb_column type=”1_6″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_button button_text=”Intro Assessment ” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”11px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|13px|8px|13px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px” theme_builder_area=”post_content”][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.16″ z_index=”0″ width=”100%” max_width=”none” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_image src=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-13.png” show_bottom_space=”off” force_fullwidth=”on” _builder_version=”4.16″ custom_margin=”0vw||-2px” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Contact Form” _builder_version=”4.16″ background_color=”#f1fafe” z_index=”10″ bottom_divider_height=”26vw” bottom_divider_flip=”horizontal” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_row column_structure=”1_3,1_3,1_3″ custom_padding_last_edited=”on|phone” _builder_version=”4.16″ background_color=”#ffffff” z_index=”1″ custom_margin=”-24vw|auto|-16vw|auto||” custom_padding=”60px|60px|60px|60px|true|true” custom_padding_tablet=”|40px||40px||true” custom_padding_phone=”|20px||20px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_column type=”1_3″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_blurb title=” Risk Assessment” image=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-icon-29.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_blurb][et_pb_blurb title=”Compliance and Governance” image=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-icon-16.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_blurb][et_pb_blurb title=”Prevention From Keylogger” image=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-icon-28.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_blurb title=”Incident Response and Recovery” image=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-icon-15.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_blurb][et_pb_blurb title=”Assessment and Understanding” image=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-icon-6.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_blurb][et_pb_blurb title=”Malware Analysis” image=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-icon-21.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_blurb title=”Managed Security Services” image=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-icon-14.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_blurb][et_pb_blurb title=” Network Security” image=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-icon-10.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_blurb][et_pb_blurb title=” Continuous Monitoring ” image=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-icon-13.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ prev_background_color=”#f1fafe” next_background_color=”#ffffff” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_stops=”#004183 0%|#001f4c 100%” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” custom_margin=”||22vw|||” custom_padding=”24vw||8vw||false|” top_divider_style=”slant” top_divider_height=”27vw” top_divider_flip=”horizontal” bottom_divider_style=”slant” bottom_divider_height=”27vw” bottom_divider_flip=”horizontal” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_row _builder_version=”4.16″ max_width=”800px” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_text _builder_version=”4.16″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” header_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Overpass|600|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” text_orientation=”center” background_layout=”dark” custom_margin=”||” custom_padding=”|||||” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]

Industries

We Serve a Variety of Businesses & Industries

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ _builder_version=”4.16″ locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_column type=”1_4″ _builder_version=”4.16″ background_color=”#ffffff” transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|240px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|tablet” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|tablet” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_blurb title=”Online Stores” image=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-icon-40.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ background_color=”#ffffff” transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|160px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|tablet” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|tablet” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_blurb title=”Health Care” image=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-icon-41.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” body_link_font=”|600|||||||” body_link_text_color=”#00b4ff” text_orientation=”center” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ background_color=”#ffffff” transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|80px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|tablet” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|tablet” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_blurb title=”Government” image=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-icon-31.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” body_link_font=”|600|||||||” body_link_text_color=”#00b4ff” text_orientation=”center” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ background_color=”#ffffff” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_blurb title=”Software” image=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-icon-13.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#3122b2 0%|#00ffd8 100%” background_color_gradient_start=”#3122b2″ background_color_gradient_end=”#00ffd8″ background_image=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-17.png” z_index=”10″ overflow-x=”visible” overflow-y=”visible” custom_padding=”||10vw|||” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”4.16″ background_color=”#ffffff” custom_margin=”-146px|auto|-2px|auto||” custom_padding=”0px||0px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”40px” box_shadow_blur=”60px” box_shadow_spread=”-8px” box_shadow_color=”rgba(10,45,97,0.48)” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_column type=”2_5″ _builder_version=”4.16″ custom_padding=”60px|40px|60px|40px|true|true” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_text _builder_version=”4.16″ header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]

Contact Us

[/et_pb_text][et_pb_blurb title=”7988405356″ use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.27.2″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” hover_enabled=”0″ icon_font_size=”24px” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content” sticky_enabled=”0″][/et_pb_blurb][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00f6ff 0%|#00ffbf 100%” background_color_gradient_start=”#00f6ff” background_color_gradient_end=”#00ffbf” background_image=”https://hackrity.com/wp-content/uploads/2024/10/cyber-security-010-1.png” background_size=”contain” background_position=”bottom_left” transform_translate_linked=”off” custom_padding=”60px|40px|60px|20%|true” custom_padding_tablet=”80px|||40px” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” background_last_edited=”on|desktop” background_image_tablet=”http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-11.png” background_enable_image_tablet=”on” background_position_tablet=”top_left” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” text_orientation=”center” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” text_text_align=”center” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]

Get Started

[/et_pb_text][et_pb_button button_text=”Book Appointment” button_alignment=”center” _builder_version=”4.16″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px” theme_builder_area=”post_content”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]

Scroll to Top