[cs_content][cs_section bg_color=”hsl(0, 4%, 91%)” parallax=”false” separator_top_type=”none” separator_top_height=”50px” separator_top_inset=”0px” separator_top_angle_point=”50″ separator_bottom_type=”none” separator_bottom_height=”50px” separator_bottom_inset=”0px” separator_bottom_angle_point=”50″ class=”cs-ta-center dark-section” style=”margin: 0px;padding: 80px 0px 40px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/1″ class=”cs-ta-center” style=”padding: 0px;”][cs_element_headline _id=”4″ ][cs_element_button _id=”5″ ][/cs_column][/cs_row][/cs_section][cs_section bg_color=”hsla(0, 0%, 0%, 0)” parallax=”false” separator_top_type=”none” separator_top_height=”50px” separator_top_inset=”0px” separator_top_angle_point=”50″ separator_bottom_type=”none” separator_bottom_height=”50px” separator_bottom_inset=”0px” separator_bottom_angle_point=”50″ class=”cs-ta-center dark-section” style=”margin: 0px;padding: 100px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”2/3″ class=”cs-ta-left” style=”padding: 0px;”][cs_element_headline _id=”9″ ][cs_element_gap _id=”10″ ][cs_element_text _id=”11″ ][cs_element_gap _id=”12″ ][x_feature_list][x_feature_box title=”Virtual CISO Program” title_color=”hsl(240, 1%, 35%)” text_color=”hsl(240, 1%, 35%)” graphic=”icon” graphic_size=”56px” graphic_shape=”rounded” graphic_color=”hsl(240, 1%, 35%)” graphic_bg_color=”hsla(0, 1%, 98%, 0)” align_h=”left” align_v=”middle” side_graphic_spacing=”40px” max_width=”none” child=”true” connector_width=”.00px” connector_style=”dotted” connector_color=”hsl(0, 1%, 94%)” graphic_border=”border-width: px px px px; border-style: solid; border-color: ;” graphic_icon=”lock”][/x_feature_box][x_feature_box title=”Vulnerability Management as a Service (VMaaS)” title_color=”hsl(240, 1%, 35%)” text_color=”hsl(240, 1%, 35%)” graphic=”icon” graphic_size=”56px” graphic_shape=”rounded” graphic_color=”hsl(240, 1%, 35%)” graphic_bg_color=”hsla(0, 9%, 22%, 0)” align_h=”left” align_v=”middle” side_graphic_spacing=”40px” max_width=”none” child=”true” connector_width=”.00px” connector_style=”dotted” connector_color=”hsl(0, 1%, 94%)” graphic_border=”border-width: px px px px; border-style: solid; border-color: ;” graphic_icon=”search-plus”][/x_feature_box][x_feature_box title=”Cloud Security” title_color=”hsl(240, 1%, 35%)” text_color=”hsl(240, 1%, 35%)” graphic=”icon” graphic_size=”56px” graphic_shape=”rounded” graphic_color=”hsl(240, 1%, 35%)” graphic_bg_color=”hsla(0, 9%, 22%, 0)” align_h=”left” align_v=”middle” side_graphic_spacing=”40px” max_width=”none” child=”true” connector_width=”.00px” connector_style=”dotted” connector_color=”hsl(0, 1%, 94%)” graphic_border=”border-width: px px px px; border-style: solid; border-color: ;” graphic_icon=”cloud”][/x_feature_box][x_feature_box title=”Security Assessments” title_color=”hsl(240, 1%, 35%)” text_color=”” graphic=”icon” graphic_size=”56px” graphic_shape=”rounded” graphic_color=”hsl(240, 1%, 35%)” graphic_bg_color=”hsla(0, 5%, 12%, 0)” align_h=”left” align_v=”middle” side_graphic_spacing=”40px” max_width=”none” child=”true” connector_width=”.00px” connector_style=”dotted” connector_color=”hsl(0, 1%, 94%)” graphic_border=”border-width: px px px px; border-style: solid; border-color: ;” graphic_icon=”shield-alt”] [/x_feature_box][x_feature_box title=”Readiness Assessments” title_color=”hsl(240, 1%, 35%)” text_color=”” graphic=”icon” graphic_size=”56px” graphic_shape=”rounded” graphic_color=”hsl(240, 1%, 35%)” graphic_bg_color=”hsla(0, 5%, 12%, 0)” align_h=”left” align_v=”middle” side_graphic_spacing=”40px” max_width=”none” child=”true” connector_width=”.00px” connector_style=”dotted” connector_color=”hsl(0, 1%, 94%)” graphic_border=”border-width: px px px px; border-style: solid; border-color: ;” graphic_icon=”check-square-o”] [/x_feature_box][x_feature_box title=”Software Composition Analysis” title_color=”hsl(240, 1%, 35%)” text_color=”” graphic=”icon” graphic_size=”56px” graphic_shape=”rounded” graphic_color=”hsl(240, 1%, 35%)” graphic_bg_color=”hsla(0, 5%, 12%, 0)” align_h=”left” align_v=”middle” side_graphic_spacing=”40px” max_width=”none” child=”true” connector_width=”.00px” connector_style=”dotted” connector_color=”hsl(0, 1%, 94%)” graphic_border=”border-width: px px px px; border-style: solid; border-color: ;” graphic_icon=”bug”] [/x_feature_box][x_feature_box title=”Static Code Analysis (SAST)” title_color=”hsl(240, 1%, 35%)” text_color=”” graphic=”icon” graphic_size=”56px” graphic_shape=”rounded” graphic_color=”hsl(240, 1%, 35%)” graphic_bg_color=”hsla(0, 5%, 12%, 0)” align_h=”left” align_v=”middle” side_graphic_spacing=”40px” max_width=”none” child=”true” connector_width=”.00px” connector_style=”dotted” connector_color=”hsl(0, 1%, 94%)” graphic_border=”border-width: px px px px; border-style: solid; border-color: ;” graphic_icon=”bug”] [/x_feature_box][/x_feature_list][cs_element_gap _id=”21″ ][cs_element_line _id=”22″ ][cs_element_gap _id=”23″ ][x_custom_headline level=”h2″ looks_like=”h3″ accent=”false” class=”cs-ta-left” style=”color: hsl(240, 1%, 35%);”]Call us.[/x_custom_headline][cs_text class=”cs-ta-left”](800) 518-9311[/cs_text][x_feature_headline level=”h5″ looks_like=”h5″ icon=”envelope” icon_color=”hsl(0, 0%, 100%)” icon_bg_color=”hsl(205, 86%, 40%)” class=”cs-ta-left man” style=”color: hsl(240, 1%, 35%);”]info@securepoint360.com[/x_feature_headline][cs_element_widget_area _id=”27″ ][cs_element_gap _id=”28″ ][/cs_column][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/3″ style=”padding: 0px;”][cs_element_gap _id=”30″ ][cs_element_text _id=”31″ ][cs_element_gap _id=”32″ ][x_raw_content]
[/x_raw_content][/cs_column][/cs_row][/cs_section][/cs_content]