CLOUD SECURITY

[et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_image=”http://zero2compliance.com/wp-content/uploads/2019/08/www.mentisinc.com-31076132325929.jpg” background_size=”initial” custom_padding=”1px||367px|||” fb_built=”1″ _i=”0″ _address=”0″][et_pb_row _builder_version=”3.26.6″ transform_scale_last_edited=”on|desktop” transform_translate=”0px|151px” transform_translate_last_edited=”on|phone” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|phone” _i=”0″ _address=”0.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” header_text_color=”#ffffff” custom_padding=”10px|||||” _i=”0″ _address=”0.0.0.0″]

data security in the cloud

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”18px” custom_padding=”||3px|||” _i=”1″ _address=”0.0.0.1″]

Consistently enforce security and compliance policies.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.26.6″ transform_translate=”0px|151px” transform_translate_linked=”off” _i=”1″ _address=”0.1″][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”0″ _address=”0.1.0″][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM0OCJ9fQ==@” button_text=”LIVE DEMO” button_alignment=”center” _builder_version=”3.27.3″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”0.1.0.0″][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”1″ _address=”0.1.1″][et_pb_button button_url=”#resources” button_text=”DATASHEET” button_alignment=”center” _builder_version=”3.27.4″ custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”0.1.1.0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ fb_built=”1″ _i=”1″ _address=”1″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”1.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”1.0.0″][et_pb_text _builder_version=”3.27.4″ custom_padding=”0px|||||” _i=”0″ _address=”1.0.0.0″]

built for the cloud

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.26.6″ _i=”1″ _address=”1.1″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”1.1.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”16px” _i=”0″ _address=”1.1.0.0″]

Protect sensitive data in native cloud applications as well as host-based applications

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”1.2″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”1.2.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|47px|10px|false|false” _i=”0″ _address=”1.2.0.0″]

DATA DISCOVERY

On-demand scans to locate and classify all data stored in cloud repositories, or being migrated, with the ability to identify what data is being uploaded.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”1.2.1″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|93px|10px|false|false” _i=”0″ _address=”1.2.1.0″]

RISK REDUCTION

Remove or quarantine data already in the cloud using tokenization.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”1.2.2″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|25px|10px|false|false” _i=”0″ _address=”1.2.2.0″]

DATA ANONYMIZATION

Apply the same data protection to your cloud data stores as to those on-premise, with dynamic and static data-masking tools that preserve data integrity and functionality.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”3″ _address=”1.3″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”1.3.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|9px|0px|false|false” custom_padding=”|10px|26px|10px|false|false” _i=”0″ _address=”1.3.0.0″]

CUSTOM APPLICATIONS

For custom applications hosted on public cloud platforms, MENTIS protects data seamlessly as if it was on-premise.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”1.3.1″][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”1.3.2″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|44px|10px|false|false” _i=”0″ _address=”1.3.2.0″]

SAAS APPLICATIONS

For SaaS applications, protect data at the database and application using available APIs and MENTIS’ web proxy solution

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#787878″ fb_built=”1″ _i=”2″ _address=”2″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”2.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”2.0.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” header_font_size=”26px” custom_padding=”||2px|||” _i=”0″ _address=”2.0.0.0″]

The responsibility for security lies with the data owner, not the cloud service provider.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.26.6″ _i=”1″ _address=”2.1″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”2.1.0″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”0″ _address=”2.1.0.0″]

Sensitive data anonymization capabilities vary widely among cloud service providers. And relying on provider to secure the data means the provider’s administrators can view it. MENTIS provides the solutions you need to take control and ensure reliable, consistent anonymization for data at rest or in transit, while maintaining critical end-user functionality.

Compliance ownership should, by design, reside with the organization at risk – that is, the data owner. The ability to identify data already in the cloud, and data that is migrating to the cloud, means you can apply the right compliance policies consistently and block, quarantine, or protect data that is being uploaded. And because MENTIS’ solutions work across platforms whether on-premise or on the cloud, you can unify your data security policies and streamline management.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.26.6″ custom_margin=”|auto|2px|auto||” _i=”2″ _address=”2.2″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”2.2.0″][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM0OCJ9fQ==@” button_text=”REQUEST A DEMO” button_alignment=”center” _builder_version=”3.27.3″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_translate=”1px|2px” transform_translate_phone=”0px|2px” transform_translate_last_edited=”on|phone” transform_styles_last_edited=”on|phone” custom_margin=”||0px|||” saved_tabs=”all” _i=”0″ _address=”2.2.0.0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ fb_built=”1″ _i=”3″ _address=”3″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”3.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”3.0.0″][et_pb_text _builder_version=”3.27.4″ custom_padding=”0px|||||” _i=”0″ _address=”3.0.0.0″]

MENTIS Advantages

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.26.6″ _i=”1″ _address=”3.1″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”3.1.0″][et_pb_text _builder_version=”3.27.4″ text_font=”Avenir|||on|||||” text_font_size=”16px” text_orientation=”center” custom_padding=”||0px|||” text_text_align=”center” _i=”0″ _address=”3.1.0.0″]

Cloud Security for database and application layers

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”3.2″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”3.2.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|85px|10px|false|false” _i=”0″ _address=”3.2.0.0″]

INTEGRATED & COMPREHENSIVE

Deploy a single, fully integrated and scalable platform that works seamlessly and consistently across on-premise and cloud.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”3.2.1″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”254px” custom_margin=”|0px|13px|0px|false|false” custom_padding=”|10px|4px|10px|false|false” _i=”0″ _address=”3.2.1.0″]

FLEXIBLE & ADAPTABLE

Applicable to data and application security for custom and SaaS applications.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”3.2.2″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|65px|10px|false|false” _i=”0″ _address=”3.2.2.0″]

CONTROLLABLE & AUDITABLE

Keep a complete audit log of all activities from discovery to the retirement of personal data, downloadable in Excel and other formats.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ module_id=”resources” _builder_version=”3.27.4″ fb_built=”1″ _i=”4″ _address=”4″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”4.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”4.0.0″][et_pb_text _builder_version=”3.27.4″ _i=”0″ _address=”4.0.0.0″]

resources

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.27.4″ column_structure=”1_3,1_3,1_3″][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”205px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

A fully Compliant Solution for a Top Swiss Bank

Sensitive data assessment for cloud migration, cross border sharing and compliance.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MzAifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ hover_enabled=”0″ saved_tabs=”all” _i=”0″ _address=”4.2.0.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ transform_scale_last_edited=”on|phone” transform_translate_last_edited=”on|phone” transform_translate_linked_phone=”off” transform_rotate_last_edited=”on|phone” transform_skew_last_edited=”on|phone” transform_origin_last_edited=”on|phone” transform_styles_last_edited=”on|phone” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|23px|10px|false|false” _i=”0″ _address=”0″ min_height=”219px”]

SENSITIVE DATA

iDiscover locates ALL sensitive data with minimal false positives.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NzIifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”4.2.1.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ transform_scale_last_edited=”on|phone” transform_translate_last_edited=”on|phone” transform_translate_linked_phone=”off” transform_rotate_last_edited=”on|phone” transform_skew_last_edited=”on|phone” transform_origin_last_edited=”on|phone” transform_styles_last_edited=”on|phone” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|23px|10px|false|false” _i=”0″ _address=”0″ min_height=”219px”]

CASE STUDY – FORTUNE 15 COMPANY

MENTIS helped a fortune 15 global conglomerate to find sensitive data across PeopleSoft, SAP applications

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MTYifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”4.2.2.0″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”3″ _address=”4.3″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”4.3.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ transform_scale_last_edited=”on|phone” transform_translate_last_edited=”on|phone” transform_translate_linked_phone=”off” transform_rotate_last_edited=”on|phone” transform_skew_last_edited=”on|phone” transform_origin_last_edited=”on|phone” transform_styles_last_edited=”on|phone” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|23px|10px|false|false” _i=”0″ _address=”0″]

Enterprise Wide Deployment – Static Data Masking

Enterprise Wide Solution for a Fortune 20 Global Conglomerate

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0OTIifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”4.4.0.0″][/et_pb_button][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”4.3.1″][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”4.3.2″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ transform_scale_last_edited=”on|phone” transform_translate_last_edited=”on|phone” transform_translate_linked_phone=”off” transform_rotate_last_edited=”on|phone” transform_skew_last_edited=”on|phone” transform_origin_last_edited=”on|phone” transform_styles_last_edited=”on|phone” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|23px|10px|false|false” _i=”0″ _address=”0″]

Highly Integrated Data Security Solution

 Highly Integrated Data Security Solution for a Subsidiary of World’s Largest Re-insurer

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0ODcifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”4.4.2.0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#191919″ custom_padding=”8px||0px|||” saved_tabs=”all” fb_built=”1″ _i=”0″ _address=”0″ global_module=”1638″][et_pb_row column_structure=”1_5,1_5,1_5,1_5,1_5″ _builder_version=”3.27.4″ max_width=”1116px” _i=”0″ _address=”0.0″][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0″][et_pb_image src=”http://zero2compliance.com/wp-content/uploads/2019/08/mentis_w__138.png” _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0.0″][/et_pb_image][et_pb_text _builder_version=”3.26.6″ text_text_color=”#ffffff” text_font_size=”15px” text_font_size_last_edited=”on|desktop” text_text_align=”left” _i=”1″ _address=”0.0.0.1″]

Headquarters
3 Columbus Circle 15th Floor
New York
NY 10019.
Telephone : +1 212 203 4365
E-mail: info@mentisinc.com

India
5 Sarojini Street
T Nagar
Chennai India 600017.
Telephone : 0091 44 4210 3594

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”1″ _address=”0.0.1″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.1.0″]

PRODUCTS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” width=”100%” _i=”1″ _address=”0.0.1.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”2″ _address=”0.0.2″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.2.0″]

SOLUTIONS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” width=”100%” custom_margin=”|-5px||||” custom_padding=”|0px||||” text_text_color_last_edited=”on|desktop” _i=”1″ _address=”0.0.2.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”3″ _address=”0.0.3″][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” _i=”0″ _address=”0.0.3.0″]

SERVICES

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” _i=”1″ _address=”0.0.3.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”4″ _address=”0.0.4″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.4.0″]

ABOUT US

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” _i=”1″ _address=”0.0.4.1″]

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]