CROSS BORDER

[et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_image=”http://zero2compliance.com/wp-content/uploads/2019/08/www.mentisinc.com-2368543158693643.jpg” background_size=”initial” custom_padding=”1px||367px|||” fb_built=”1″ _i=”0″ _address=”0″][et_pb_row _builder_version=”3.26.6″ transform_scale_last_edited=”on|desktop” transform_translate=”0px|151px” transform_translate_last_edited=”on|phone” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|phone” _i=”0″ _address=”0.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” header_text_color=”#ffffff” custom_padding=”10px|||||” _i=”0″ _address=”0.0.0.0″]

cross-border data security

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”18px” _i=”1″ _address=”0.0.0.1″]

Stringent regional and national data protection laws can put a stop to the global distribution of data.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.26.6″ transform_translate=”0px|151px” transform_translate_linked=”off” _i=”1″ _address=”0.1″][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”0″ _address=”0.1.0″][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI0NyJ9fQ==@” button_text=”LIVE DEMO” button_alignment=”center” _builder_version=”3.27.3″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”0.1.0.0″][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”1″ _address=”0.1.1″][et_pb_button button_url=”#resources” button_text=”DATASHEET” button_alignment=”center” _builder_version=”3.27.4″ custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”0.1.1.0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ fb_built=”1″ _i=”1″ _address=”1″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”1.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”1.0.0″][et_pb_text _builder_version=”3.27.4″ custom_padding=”0px|||||” _i=”0″ _address=”1.0.0.0″]

Mitigating Barriers to Cross-Border Data Flows

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.26.6″ _i=”1″ _address=”1.1″][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”0″ _address=”1.1.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|36px|10px|false|false” _i=”0″ _address=”1.1.0.0″]

Discover

Discover sensitive data based on classification and who (user and program) has access to it

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”1″ _address=”1.1.1″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|36px|10px|false|false” _i=”0″ _address=”1.1.1.0″]

ELIMINATE

Elimnate sensitive data exposure in non-production environment using static data masking

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.26.6″ _i=”2″ _address=”1.2″][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”0″ _address=”1.2.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|9px|0px|false|false” custom_padding=”|10px|43px|10px|false|false” _i=”0″ _address=”1.2.0.0″]

MINIMIZE

Minimize the exposure of sensitive data in production environment using dynamic data masking

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”1″ _address=”1.2.1″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|36px|10px|false|false” _i=”0″ _address=”1.2.1.0″]

DATA RESIDENCY

Proprietary tools, including dynamic data masking at the source logic, make sure the data never leaves the country of residence. Allow cross-border sharing while adhering to compliance requirements

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#787878″ fb_built=”1″ _i=”2″ _address=”2″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”2.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”2.0.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” header_font_size=”27px” custom_padding=”||2px|||” header_font_last_edited=”on|desktop” header_font_size_phone=”27px” header_font_size_last_edited=”on|phone” _i=”0″ _address=”2.0.0.0″]

cross border data security and localisation

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.26.6″ _i=”1″ _address=”2.1″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”2.1.0″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”0″ _address=”2.1.0.0″]

MENTIS Data and Application security technology platform is tested, deployed and proven to enable cross-border information sharing.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.26.6″ custom_margin=”|auto|2px|auto||” custom_padding=”||30px|||” _i=”2″ _address=”2.2″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”2.2.0″][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM0OCJ9fQ==@” button_text=”REQUEST A DEMO” button_alignment=”center” _builder_version=”3.27.3″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_translate=”1px|2px” transform_translate_phone=”0px|2px” transform_translate_last_edited=”on|phone” transform_styles_last_edited=”on|phone” custom_margin=”||0px|||” saved_tabs=”all” _i=”0″ _address=”2.2.0.0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ fb_built=”1″ _i=”3″ _address=”3″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”3.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”3.0.0″][et_pb_text _builder_version=”3.27.4″ custom_padding=”0px|||||” _i=”0″ _address=”3.0.0.0″]

MAPPED TO GDPR

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”3.1″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”3.1.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|103px|10px|false|false” _i=”0″ _address=”3.1.0.0″]

INTEGRATED

A single, fully integrated platform with a distributed architecture to allow enterprise scalability and performance.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”3.1.1″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”254px” custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|0px|10px|false|false” _i=”0″ _address=”3.1.1.0″]

SEAMLESS

Use of data discovery to drive action – anonymize, monitor, and retire sensitive data with a single sensitive data repository.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”3.1.2″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|80px|10px|false|false” _i=”0″ _address=”3.1.2.0″]

BLENDED MASKING

Coexistence of static and dynamic data masking for rollouts maintains consistency across.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”3.2″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”3.2.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|132px|10px|false|false” _i=”0″ _address=”3.2.0.0″]

SEPARATION OF DUTIES

Built-in separation of duties.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”3.2.1″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”254px” custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|6px|10px|false|false” _i=”0″ _address=”3.2.1.0″]

COVERAGE

Support for structure and unstructured data, data on-premise and in the Cloud, and Big Data.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”3.2.2″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|63px|0px|false|false” custom_padding=”|10px|109px|10px|false|false” _i=”0″ _address=”3.2.2.0″]

DATA FUNCTIONALITY

Anonymization that maintains data functionality.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ module_id=”resources” _builder_version=”3.27.4″ fb_built=”1″ _i=”4″ _address=”4″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”4.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”4.0.0″][et_pb_text _builder_version=”3.27.4″ _i=”0″ _address=”4.0.0.0″]

resources

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.27.4″ column_structure=”1_3,1_3,1_3″][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ transform_scale_last_edited=”on|phone” transform_translate_last_edited=”on|phone” transform_translate_linked_phone=”off” transform_rotate_last_edited=”on|phone” transform_skew_last_edited=”on|phone” transform_origin_last_edited=”on|phone” transform_styles_last_edited=”on|phone” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|23px|10px|false|false” _i=”0″ _address=”0″ min_height=”211px”]

SENSITIVE DATA

iDiscover locates ALL sensitive data with minimal false positives.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NzIifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ hover_enabled=”0″ saved_tabs=”all” _i=”0″ _address=”4.2.0.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ transform_scale_last_edited=”on|phone” transform_translate_last_edited=”on|phone” transform_translate_linked_phone=”off” transform_rotate_last_edited=”on|phone” transform_skew_last_edited=”on|phone” transform_origin_last_edited=”on|phone” transform_styles_last_edited=”on|phone” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|23px|10px|false|false” _i=”0″ _address=”0″]

CASE STUDY – FORTUNE 15 COMPANY

MENTIS helped a fortune 15 global conglomerate to find sensitive data across PeopleSoft, SAP applications

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MTYifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ hover_enabled=”0″ saved_tabs=”all” _i=”0″ _address=”4.2.1.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”214px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

IMASK™ – MASK SEAMLESSLY

Dynamic Data Masking. Conditional and Location-Aware. 

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NjUifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ hover_enabled=”0″ saved_tabs=”all” _i=”0″ _address=”4.2.2.0″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.27.4″ column_structure=”1_3,1_3,1_3″][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”243px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

IMASK™ – MASK SEAMLESSLY

Dynamic Data Masking. Conditional and Location-Aware. 

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NDUifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ hover_enabled=”0″ saved_tabs=”all” _i=”0″ _address=”4.4.0.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

Integrated Data Masking for PeopleSoft Enterprise

Protecting Sensitive Data in Production and Non-Production Applications and Databases.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MDEifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”4.4.1.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

Integrated Data Masking for Oracle E-Business

Protecting Sensitive Data in Production and Non-Production Applications and Databases.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MDYifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”4.4.2.0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#191919″ custom_padding=”8px||0px|||” saved_tabs=”all” fb_built=”1″ _i=”0″ _address=”0″ global_module=”1638″][et_pb_row column_structure=”1_5,1_5,1_5,1_5,1_5″ _builder_version=”3.27.4″ max_width=”1116px” _i=”0″ _address=”0.0″][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0″][et_pb_image src=”http://zero2compliance.com/wp-content/uploads/2019/08/mentis_w__138.png” _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0.0″][/et_pb_image][et_pb_text _builder_version=”3.26.6″ text_text_color=”#ffffff” text_font_size=”15px” text_font_size_last_edited=”on|desktop” text_text_align=”left” _i=”1″ _address=”0.0.0.1″]

Headquarters
3 Columbus Circle 15th Floor
New York
NY 10019.
Telephone : +1 212 203 4365
E-mail: info@mentisinc.com

India
5 Sarojini Street
T Nagar
Chennai India 600017.
Telephone : 0091 44 4210 3594

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”1″ _address=”0.0.1″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.1.0″]

PRODUCTS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” width=”100%” _i=”1″ _address=”0.0.1.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”2″ _address=”0.0.2″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.2.0″]

SOLUTIONS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” width=”100%” custom_margin=”|-5px||||” custom_padding=”|0px||||” text_text_color_last_edited=”on|desktop” _i=”1″ _address=”0.0.2.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”3″ _address=”0.0.3″][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” _i=”0″ _address=”0.0.3.0″]

SERVICES

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” _i=”1″ _address=”0.0.3.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”4″ _address=”0.0.4″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.4.0″]

ABOUT US

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” _i=”1″ _address=”0.0.4.1″]

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]