[vc_row full_width=”stretch_row” full_height=”yes” content_placement=”middle” parallax=”content-moving” parallax_image=”283″ css=”.vc_custom_1540383720317{border-top-width: 50px !important;border-bottom-width: 50px !important;padding-top: 50px !important;padding-bottom: 50px !important;}”][vc_column width=”1/3″ css=”.vc_custom_1540383771423{margin-top: -350px !important;margin-left: 20px !important;border-bottom-width: 20px !important;padding-bottom: 20px !important;padding-left: 30px !important;background-color: rgba(255,255,255,0.78) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;*background-color: rgb(255,255,255) !important;}”][vc_column_text css=”.vc_custom_1540384054945{margin-top: -25px !important;margin-bottom: 100px !important;padding-top: 200px !important;padding-bottom: 150px !important;}”]System Integrator
Infrastructure
Server & Storage
Networking (Passive & Active)
Virtualization
Converged & Hyper Converged
Cloud
Workstations, PC & Laptop
Printing[/vc_column_text][/vc_column][vc_column width=”1/3″ css=”.vc_custom_1540383555224{margin-top: -50px !important;margin-left: 20px !important;border-bottom-width: 20px !important;padding-bottom: 20px !important;padding-left: 30px !important;}”][/vc_column][vc_column width=”1/3″ css=”.vc_custom_1540238795544{margin-top: -50px !important;margin-left: 20px !important;border-bottom-width: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: rgba(255,255,255,0.78) !important;*background-color: rgb(255,255,255) !important;}”][vc_column_text css=”.vc_custom_1540383639938{margin-top: -25px !important;margin-bottom: 100px !important;}”]
Cyber Security
Backup & Recovery
End Point Protection
Next Generation Firewall & Sandboxing
UTM Appliance
Data & Network Encryption
SIEM
Load balancing & High Availability
Privileged Access & Password Management
Multi-Factor Authentication
Network Access Control
Cloud Security & Virtualization
Data Loss Prevention
E-mail Security & DDOS Security
Prevention & Response
Monitoring & Reporting
[/vc_column_text][/vc_column][/vc_row]