[vc_row full_width=”stretch_row” full_height=”yes” content_placement=”middle” parallax=”content-moving” parallax_image=”283″ css=”.vc_custom_1540383720317{border-top-width: 50px !important;border-bottom-width: 50px !important;padding-top: 50px !important;padding-bottom: 50px !important;}”][vc_column width=”1/3″ css=”.vc_custom_1540383771423{margin-top: -350px !important;margin-left: 20px !important;border-bottom-width: 20px !important;padding-bottom: 20px !important;padding-left: 30px !important;background-color: rgba(255,255,255,0.78) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;*background-color: rgb(255,255,255) !important;}”][vc_column_text css=”.vc_custom_1540384054945{margin-top: -25px !important;margin-bottom: 100px !important;padding-top: 200px !important;padding-bottom: 150px !important;}”]System Integrator

Infrastructure

Server & Storage

Networking (Passive & Active)

Virtualization

Converged & Hyper Converged

Cloud

Workstations, PC & Laptop

Printing[/vc_column_text][/vc_column][vc_column width=”1/3″ css=”.vc_custom_1540383555224{margin-top: -50px !important;margin-left: 20px !important;border-bottom-width: 20px !important;padding-bottom: 20px !important;padding-left: 30px !important;}”][/vc_column][vc_column width=”1/3″ css=”.vc_custom_1540238795544{margin-top: -50px !important;margin-left: 20px !important;border-bottom-width: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: rgba(255,255,255,0.78) !important;*background-color: rgb(255,255,255) !important;}”][vc_column_text css=”.vc_custom_1540383639938{margin-top: -25px !important;margin-bottom: 100px !important;}”]

Cyber Security

Backup & Recovery

End Point Protection

Next Generation Firewall & Sandboxing

UTM Appliance

Data & Network Encryption

SIEM

Load balancing & High Availability

Privileged Access & Password Management

Multi-Factor Authentication

Network Access Control

Cloud Security & Virtualization

Data Loss Prevention

E-mail Security & DDOS Security

Prevention & Response

Monitoring & Reporting

[/vc_column_text][/vc_column][/vc_row]