[av_heading heading=’CyberSecurity Services.‘ tag=’h1′ link=” link_target=” style=’blockquote modern-quote’ size=’70’ subheading_active=” subheading_size=’15’ margin=” padding=’30’ icon_padding=’10’ color=” custom_font=” icon_color=” show_icon=” icon=’ue800′ font=” icon_size=” custom_class=” id=” admin_preview_bg=” av-desktop-hide=” av-medium-hide=” av-small-hide=” av-mini-hide=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av-medium-font-size-1=” av-small-font-size-1=” av-mini-font-size-1=”][/av_heading]

[av_one_half first min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’fade-in’ mobile_breaking=” mobile_display=” av_uid=’av-4wq82i’]
[av_hr class=’short’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ admin_preview_bg=” av_uid=’av-4p628a’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-4ljrn6′ admin_preview_bg=”]
There’s a saying in cybersecurity that there are companies that have been hacked and companies that simply don’t know they’ve been hacked. At RPM we take security very seriously and have long determined that the best defense is a good offense. In other words, we set up systems that do not make for easy prey.

Our philosophy: IT security management requires a multi-faceted approach. Anyone can turn on Anti-virus and a Firewall, but we know comprehensive security goes far beyond the technology. We incorporate policy, procedures, and training into security management to help ensure effective information security.
[/av_textblock]

[av_hr class=’short’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ admin_preview_bg=” av_uid=’av-4d3jhe’]
[/av_one_half]

[av_one_half min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’fade-in’ mobile_breaking=” mobile_display=” av_uid=’av-4828h6′]
[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-44nw5m’ admin_preview_bg=”]

[/av_textblock]
[/av_one_half]

[av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-shadow’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_arrow_bg=” id=’bgkd-cover’ color=’main_color’ custom_bg=” src=’http://dev.rpmtechnologies.com/wp-content/uploads/2018/03/pexels-photo-97077.jpg’ attachment=’1169′ attachment_size=’full’ attach=’scroll’ position=’center center’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” av_element_hidden_in_editor=’0′ av_uid=’av-3yvo0i’]
[av_one_fifth first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-3pzd5e’]

[/av_one_fifth][av_three_fifth min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-3hy0he’]

[av_promobox button=’yes’ label=’Contact Us’ link=’page,513′ link_target=” color=’theme-color’ custom_bg=’#444444′ custom_font=’#ffffff’ size=’large’ icon_select=’no’ icon=’ue800′ font=’entypo-fontello’ box_color=” box_custom_font=’#ffffff’ box_custom_bg=’#444444′ box_custom_border=’#333333′ admin_preview_bg=” av_uid=’av-3fprle’]

Interested in these services? Contact us for more information!

[/av_promobox]

[/av_three_fifth][av_one_fifth min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-3aiwqq’]

[/av_one_fifth]
[/av_section]

[av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-shadow’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_arrow_bg=” id=’bgkd-cover’ color=’main_color’ custom_bg=’#ffffff’ src=” attachment=” attachment_size=” attach=’scroll’ position=’center center’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” av_element_hidden_in_editor=’0′ av_uid=’av-34g7aa’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-2pe8he’ admin_preview_bg=”]

We can help address all of your security concerns. Our security management includes

[/av_textblock]

[av_one_half first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-2iak0a’]

[av_iconlist position=’left’ iconlist_styling=” custom_title_size=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” custom_content_size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” custom_title=” custom_content=” color=” custom_bg=” custom_font=” custom_border=” animation=” alb_description=” id=” custom_class=” av_uid=’av-2cst6i’ admin_preview_bg=”]
[av_iconlist_item title=’Complete IT security assessment’ icon=’ue812′ font=’entypo-fontello’ heading_tag=” heading_class=” link=” linktarget=” linkelement=” av_uid=’av-9pzwqv’][/av_iconlist_item]
[av_iconlist_item title=’Policy development and review’ icon=’ue812′ font=’entypo-fontello’ heading_tag=” heading_class=” link=” linktarget=” linkelement=” av_uid=’av-87pe3b’][/av_iconlist_item]
[av_iconlist_item title=’Firewall security and intrusion prevention’ icon=’ue812′ font=’entypo-fontello’ heading_tag=” heading_class=” link=” linktarget=” linkelement=” av_uid=’av-63eh7b’][/av_iconlist_item]
[/av_iconlist]

[/av_one_half][av_one_half min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-2iak0a’]

[av_iconlist position=’left’ iconlist_styling=” custom_title_size=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” custom_content_size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” custom_title=” custom_content=” color=” custom_bg=” custom_font=” custom_border=” animation=” alb_description=” id=” custom_class=” av_uid=’av-2cst6i’ admin_preview_bg=”]
[av_iconlist_item title=’Independent penetration testing’ icon=’ue812′ font=’entypo-fontello’ heading_tag=” heading_class=” link=” linktarget=” linkelement=” av_uid=’av-3oyzbb’][/av_iconlist_item]
[av_iconlist_item title=’Technology review and solution evaluation’ icon=’ue812′ font=’entypo-fontello’ heading_tag=” heading_class=” link=” linktarget=” linkelement=” av_uid=’av-39mn1z’][/av_iconlist_item]
[av_iconlist_item title=’Security Information and Event Management (SIEM) ‘ icon=’ue800′ font=’entypo-fontello’ heading_tag=” heading_class=” link=” linktarget=” linkelement=”][/av_iconlist_item]
[/av_iconlist]

[/av_one_half][/av_section][av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-shadow’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_arrow_bg=” id=’bgkd-cover’ color=’main_color’ custom_bg=’#a8a8a8′ src=’http://dev.rpmtechnologies.com/wp-content/uploads/2016/05/rpm-cloud-advisory.jpg’ attachment=’839′ attachment_size=’full’ attach=’scroll’ position=’center center’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_enable=’aviaTBoverlay_enable’ overlay_opacity=’0.9′ overlay_color=’#ffffff’ overlay_pattern=” overlay_custom_pattern=” av_element_hidden_in_editor=’0′ av_uid=’av-1mvli2′]
[av_one_third first min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’40px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=’#ffffff’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-1f77nm’]

[av_icon_box icon=’ue824′ font=’entypo-fontello’ title=’Proactive Security Scans’ position=’top’ icon_style=” boxed=’av-no-box’ font_color=” custom_title=” custom_content=” color=’custom’ custom_bg=” custom_font=’#b02b2c’ custom_border=’#b02b2c’ custom_title_size=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” custom_content_size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” heading_tag=” heading_class=” link=” linktarget=” linkelement=” id=” custom_class=” av_uid=’av-18eyg2′ admin_preview_bg=”]
The security of your business data is critical and RPM has a proactive approach to strengthen you security stance by a variety of scanning and penetration tests.  After discovering weaknesses, we then remediate these findings and enhance the defenses around your data and business systems.
[/av_icon_box]

[/av_one_third][av_one_third min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’40px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=’#ffffff’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-13oe0i’]

[av_icon_box icon=’ue864′ font=’entypo-fontello’ title=’Technology Design’ position=’top’ icon_style=” boxed=’av-no-box’ font_color=” custom_title=” custom_content=” color=’custom’ custom_bg=” custom_font=’#b02b2c’ custom_border=’#b02b2c’ custom_title_size=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” custom_content_size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” heading_tag=” heading_class=” link=” linktarget=” linkelement=” id=” custom_class=” av_uid=’av-yf6aa’ admin_preview_bg=”]
RPM can recommend changes to your environment to enhance your security posture.  With our technology experience we can address security weaknesses and improve the strength of your defenses.
[/av_icon_box]

[/av_one_third][av_one_third min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’40px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=’#ffffff’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-pks3e’]

[av_icon_box icon=’ue8c9′ font=’entypo-fontello’ title=’Awareness Training’ position=’top’ icon_style=” boxed=’av-no-box’ font_color=” custom_title=” custom_content=” color=’custom’ custom_bg=” custom_font=’#b02b2c’ custom_border=’#b02b2c’ custom_title_size=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” custom_content_size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” heading_tag=” heading_class=” link=” linktarget=” linkelement=” id=” custom_class=” av_uid=’av-kecoa’ admin_preview_bg=”]
Most of the vulnerability in cyber security is due to human error.  RPM can support the ongoing education of your business team with training that will help your team recognize potential threats and be more effective in stopping external threats from entering your business environment.
[/av_icon_box]

[/av_one_third]
[/av_section]

[av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-shadow’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_arrow_bg=” id=’bgkd-cover’ color=’alternate_color’ custom_bg=” src=’http://dev.rpmtechnologies.com/wp-content/uploads/2018/02/red-bkg.jpg’ attachment=’954′ attachment_size=’full’ attach=’scroll’ position=’center center’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” av_element_hidden_in_editor=’0′ av_uid=’av-d1e3e’]
[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=” av_uid=’av-90wpe’]

What Our Clients Have Said

“From our very first meeting, RPM understood my business. They managed a recent acquisition and systems upgrade without disrupting operations. Now we’re on track for future IT expansion.”

Charles Haywood

President, Mansfield-King

[/av_textblock]
[/av_section]