[av_one_half first min_height=’av-equal-height-column’ vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’fade-in’ mobile_breaking=” mobile_display=”]
[av_heading heading=’Privacy/Protection.‘ tag=’h3′ style=’blockquote modern-quote’ size=’70’ subheading_active=” subheading_size=’15’ padding=’10’ color=” custom_font=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=”][/av_heading]

[av_hr class=’short’ height=’50’ shadow=’no-shadow’ position=’left’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ admin_preview_bg=”]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=”]
When you hear about all the credit card information, passwords and customer data being stolen lately, it is hard not to be concerned with your system’s security.  RPM Technologies understands your concern and we believe the best defense is a strong offense.

At RPM, we have always employed the philosophy that IT security management and a good compliance program go hand in hand. Anyone can turn on Anti-virus and a Firewall, but we know comprehensive security goes far beyond the technology. We incorporate policy and procedures into security management to help ensure effective information security.
[/av_textblock]
[/av_one_half]

[av_one_half min_height=’av-equal-height-column’ vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=’http://dev.rpmtechnologies.com/wp-content/uploads/2018/02/privacy-1.jpg’ attachment=’1078′ attachment_size=’full’ background_position=’center center’ background_repeat=’no-repeat’ animation=’pop-up’ mobile_breaking=” mobile_display=”][/av_one_half]

[av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-shadow’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_arrow_bg=” id=’bgkd-cover’ color=’main_color’ custom_bg=” src=’http://dev.rpmtechnologies.com/wp-content/uploads/2018/02/privacy-2-1030×502.jpg’ attachment=’1076′ attachment_size=’large’ attach=’parallax’ position=’center center’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_enable=’aviaTBoverlay_enable’ overlay_opacity=’0.7′ overlay_color=’#ffffff’ overlay_pattern=” overlay_custom_pattern=” av_element_hidden_in_editor=’0′]

[av_heading tag=’h2′ padding=’10’ heading=’We can help address all of your security concerns. Our security management includes:’ color=” style=’blockquote modern-quote modern-centered’ custom_font=” size=” subheading_active=” subheading_size=’15’ custom_class=” admin_preview_bg=” av-desktop-hide=” av-medium-hide=” av-small-hide=” av-mini-hide=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=”][/av_heading]

[av_hr class=’short’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ admin_preview_bg=”]

[av_one_third first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=”]

[av_iconlist position=’left’ iconlist_styling=” custom_title_size=” custom_content_size=” font_color=” custom_title=” custom_content=” color=’custom’ custom_bg=’#d63e2d’ custom_font=” custom_border=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=’rgb(241, 241, 241)’]
[av_iconlist_item title=’Complete IT Security Assessment’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’][/av_iconlist_item]
[av_iconlist_item title=’Policy Development and Review’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’][/av_iconlist_item]
[av_iconlist_item title=’Regulatory Compliance Assessment’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’][/av_iconlist_item]
[/av_iconlist]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=”]

[av_iconlist position=’left’ iconlist_styling=” custom_title_size=” custom_content_size=” font_color=” custom_title=” custom_content=” color=’custom’ custom_bg=’#d63e2d’ custom_font=” custom_border=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=”]
[av_iconlist_item title=’Technology Review and Solution Evaluation’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’][/av_iconlist_item]
[av_iconlist_item title=’Independent Penetration Testing’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’][/av_iconlist_item]
[/av_iconlist]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=”]

[av_iconlist position=’left’ iconlist_styling=” custom_title_size=” custom_content_size=” font_color=” custom_title=” custom_content=” color=’custom’ custom_bg=’#d63e2d’ custom_font=” custom_border=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=”]
[av_iconlist_item title=’AV and Spam Filtering’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’][/av_iconlist_item]
[av_iconlist_item title=’Firewall Security and Intrusion Prevention’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’][/av_iconlist_item]
[/av_iconlist]

[/av_one_third][/av_section]