DISCOVER

[et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_image=”http://zero2compliance.com/wp-content/uploads/2019/08/product_0.jpg” background_size=”initial” custom_padding=”||367px|||” fb_built=”1″ _i=”0″ _address=”0″][et_pb_row _builder_version=”3.26.6″ transform_scale_last_edited=”on|desktop” transform_translate=”0px|151px” transform_translate_last_edited=”on|phone” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|phone” _i=”0″ _address=”0.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” header_text_color=”#ffffff” _i=”0″ _address=”0.0.0.0″]

DISCOVER ACCURATELY

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”24px” _i=”1″ _address=”0.0.0.1″]

How certain are you that you have discovered all of your sensitive data?

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.26.6″ transform_translate=”0px|151px” transform_translate_linked=”off” _i=”1″ _address=”0.1″][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”0″ _address=”0.1.0″][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM0OCJ9fQ==@” button_text=”LIVE DEMO” button_alignment=”center” _builder_version=”3.27.3″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”0.1.0.0″][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”1″ _address=”0.1.1″][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NzIifX0=@” button_text=”DATASHEET” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”0.1.1.0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#787878″ fb_built=”1″ _i=”1″ _address=”1″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”1.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”1.0.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” header_font_size=”26px” _i=”0″ _address=”1.0.0.0″]

TRADITIONAL METHODS HAVE CHALLENGES

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ _builder_version=”3.26.6″ _i=”1″ _address=”1.1″][et_pb_column type=”1_4″ _builder_version=”3.26.6″ _i=”0″ _address=”1.1.0″][et_pb_circle_counter title=”data discovery” number=”33″ bar_bg_color=”#37ed0e” circle_color=”#ffffff” circle_color_alpha=”1″ _builder_version=”3.26.6″ title_text_color=”#ffffff” number_text_color=”#ffffff” _i=”0″ _address=”1.1.0.0″][/et_pb_circle_counter][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”19px” _i=”1″ _address=”1.1.0.1″]

Identifies only a third of sensitive data locations

[/et_pb_text][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.26.6″ _i=”1″ _address=”1.1.1″][et_pb_circle_counter title=”composite columns” number=”33″ bar_bg_color=”#e02b20″ circle_color=”#ffffff” circle_color_alpha=”1″ _builder_version=”3.26.6″ title_text_color=”#ffffff” number_text_color=”#ffffff” _i=”0″ _address=”1.1.1.0″][/et_pb_circle_counter][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”19px” custom_padding=”||0px|||” _i=”1″ _address=”1.1.1.1″]

Only way to identify composite columns is through deep code analysis

[/et_pb_text][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.26.6″ _i=”2″ _address=”1.1.2″][et_pb_circle_counter title=”application logic” number=”45″ bar_bg_color=”#55bbeb” circle_color=”#ffffff” circle_color_alpha=”1″ _builder_version=”3.26.6″ title_text_color=”#ffffff” number_text_color=”#ffffff” _i=”0″ _address=”1.1.2.0″][/et_pb_circle_counter][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”19px” _i=”1″ _address=”1.1.2.1″]

Application logic has a lot of important data relationships

[/et_pb_text][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.26.6″ _i=”3″ _address=”1.1.3″][et_pb_circle_counter title=”reg-ex and pattern match” number=”75″ bar_bg_color=”#e09900″ circle_color=”#ffffff” circle_color_alpha=”1″ _builder_version=”3.26.6″ title_text_color=”#ffffff” number_text_color=”#ffffff” _i=”0″ _address=”1.1.3.0″][/et_pb_circle_counter][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”19px” _i=”1″ _address=”1.1.3.1″]

Results in >75% False Positives

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ fb_built=”1″ _i=”2″ _address=”2″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”2.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”2.0.0″][et_pb_text _builder_version=”3.27.4″ _i=”0″ _address=”2.0.0.0″]

How is iDiscover™ better?

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”2.1″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”2.1.0″][et_pb_text _builder_version=”3.27.4″ header_text_align=”right” header_font_size=”15px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” _i=”0″ _address=”2.1.0.0″]

Dictionary Analysis

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font_size=”16px” text_orientation=”right” text_text_align=”right” text_text_align_phone=”center” text_text_align_last_edited=”on|phone” _i=”1″ _address=”2.1.0.1″]

Scans with data dictionary to find where all sensitive data is located

 

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ header_text_align=”right” header_font_size=”15px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” _i=”2″ _address=”2.1.0.2″]

Data Analysis

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font_size=”16px” text_orientation=”right” text_text_align=”right” text_text_align_phone=”center” text_text_align_last_edited=”on|phone” _i=”3″ _address=”2.1.0.3″]

Scans actual data to find where all sensitive data is located

 

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”2.1.1″][et_pb_image src=”http://zero2compliance.com/wp-content/uploads/2019/08/fingerprint_2018-1.png” _builder_version=”3.26.6″ _i=”0″ _address=”2.1.1.0″][/et_pb_image][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”2.1.2″][et_pb_text _builder_version=”3.27.4″ header_text_align=”left” header_font_size=”16px” header_2_font_size=”16px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” header_2_text_align_phone=”center” header_2_text_align_last_edited=”on|phone” _i=”0″ _address=”2.1.2.0″]

Pattern Analysis

[/et_pb_text][et_pb_text content_phone=”

Consistent masking across tables, columns, databases, and files

” content_last_edited=”on|phone” _builder_version=”3.27.4″ text_font_size=”16px” text_orientation=”right” text_text_align=”right” _i=”1″ _address=”2.1.2.1″]

Scans data patterns to find where all sensitive data is located

 

[/et_pb_text][et_pb_text content_phone=”

Blended Masking

” content_last_edited=”on|desktop” _builder_version=”3.27.4″ header_text_align=”right” header_font_size=”16px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” header_text_align_phone=”center” header_text_align_last_edited=”on|desktop” header_font_size_last_edited=”on|phone” _i=”2″ _address=”2.1.2.2″]

code analysis

[/et_pb_text][et_pb_text content_phone=”

Concurrent static and dynamic masking for masking rollouts

” content_last_edited=”on|phone” _builder_version=”3.27.4″ text_font_size=”16px” text_orientation=”right” text_text_align=”right” _i=”3″ _address=”2.1.2.3″]

Scans source code to find very hard locations such as temporary tables, backup tables.

 

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ fb_built=”1″ _i=”3″ _address=”3″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”3.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”3.0.0″][et_pb_text _builder_version=”3.27.4″ _i=”0″ _address=”3.0.0.0″]

mentis advantages

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”3.1″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”3.1.0″][et_pb_text _builder_version=”3.27.4″ header_font_size=”29px” _i=”0″ _address=”3.1.0.0″]

minimal false postives

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font_size=”16px” _i=”1″ _address=”3.1.0.1″]

Scorecard mechanism for efficiency in validation of result

 

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”3.1.1″][et_pb_text _builder_version=”3.27.4″ _i=”0″ _address=”3.1.1.0″]

pattern Analysis

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font_size=”16px” _i=”1″ _address=”3.1.1.1″]

Find sensitive data in the un-validated fields like “Description” and “Value”

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”3.1.2″][et_pb_text _builder_version=”3.27.4″ _i=”0″ _address=”3.1.2.0″]

phantom tables

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font_size=”16px” _i=”1″ _address=”3.1.2.1″]

Find sensitive data in the tables where sensitive information is stored for short duration, for reporting purposes

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.27.4″ _i=”2″ _address=”3.2″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”3.2.0″][et_pb_text _builder_version=”3.27.4″ header_font_size=”29px” _i=”0″ _address=”3.2.0.0″]

ENTERPRISE WIDE

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font_size=”16px” _i=”1″ _address=”3.2.0.1″]

Common and Consistent discovery methods to find all sensitive data across structured, un-structured, cloud and big data sources

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.27.4″ transform_scale=”87%|87%” _i=”1″ _address=”3.2.1″][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”3.2.2″][et_pb_text _builder_version=”3.27.4″ _i=”0″ _address=”3.2.2.0″]

compliance

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font_size=”16px” _i=”1″ _address=”3.2.2.1″]

Reports generated for compliance requirements and Privacy Impact Assessment

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#787878″ fb_built=”1″ _i=”4″ _address=”4″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”4.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”4.0.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” _i=”0″ _address=”4.0.0.0″]

accolades

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.26.6″ _i=”1″ _address=”4.1″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”4.1.0″][et_pb_slider show_image_video_mobile=”on” _builder_version=”3.27.3″ custom_padding=”51px||51px||true|” _i=”0″ _address=”4.1.0.0″][et_pb_slide heading=”philip howard” image=”http://zero2compliance.com/wp-content/uploads/2019/08/BLOOR-LOGO-RGB-.png” _builder_version=”3.27.3″ header_text_align=”center” body_text_align=”justify” background_color=”rgba(0,0,0,0)” background_enable_color=”on” child_filter_saturate=”98%” child_filter_brightness=”150%” child_filter_contrast=”115%” child_mix_blend_mode=”screen” hover_enabled=”0″ _i=”0″ _address=”4.1.0.0.0″]

We particularly like the MENTIS iDiscover module: like other products it can discover sensitive data by inspecting data and metadata but, unlike most other products, it can also do so by introspecting code, which means that this solution goes beyond normal discovery solutions and finds which users and what programs access sensitive data. This information provides complete discovery metadata that is used for downstream masking, monitoring and retirement.

[/et_pb_slide][et_pb_slide heading=”philip howard” image=”http://zero2compliance.com/wp-content/uploads/2019/08/BLOOR-LOGO-RGB-.png” image_tablet=”http://zero2compliance.com/wp-content/uploads/2019/08/BLOOR-LOGO-RGB–300×70.png” image_phone=”http://zero2compliance.com/wp-content/uploads/2019/08/BLOOR-LOGO-RGB–300×70.png” image_last_edited=”on|phone” _builder_version=”3.27.3″ header_text_align=”center” body_text_align=”justify” background_color=”rgba(0,0,0,0)” background_enable_color=”on” child_filter_saturate=”98%” child_filter_brightness=”150%” child_filter_contrast=”115%” child_mix_blend_mode=”screen” hover_enabled=”0″ _i=”1″ _address=”4.1.0.0.1″]

MENTIS offers a number of differentiators, the main one being its support for the introspection of code, for which there is no equivalent functionality.

[/et_pb_slide][et_pb_slide heading=”In the 17 years’ working on this system, there is no way I would have known that.” content_phone=”

IDISCOVER™ CUSTOMER ON THE SURPRISING VOLUME OF SENSITIVE DATA THAT THEY DID NOT KNOW WAS IN THEIR SYSTEM

” content_last_edited=”on|phone” _builder_version=”3.27″ header_font=”Avenir||||||||” header_text_align=”center” header_font_size=”24px” body_font=”fun city level 2||||||||” body_line_height=”2em” background_color=”rgba(0,0,0,0)” background_enable_color=”on” width=”100%” max_width=”100%” custom_padding=”0px||0px||true|false” hover_enabled=”0″ _i=”2″ _address=”4.1.0.0.2″]

IDISCOVER™ CUSTOMER ON THE SURPRISING VOLUME OF SENSITIVE DATA THAT THEY DID NOT KNOW WAS IN THEIR SYSTEM

[/et_pb_slide][et_pb_slide heading=”We could never have found all the sensitive data locations that were identified by MENTIS discovery… even with 22 years of PeopleSoft application knowledge.” _builder_version=”3.27″ header_level=”h1″ header_font=”Avenir||||||||” header_font_size=”22px” body_font=”fun city level 2||||||||” body_font_size=”18px” body_line_height=”2em” background_color=”rgba(0,0,0,0)” background_enable_color=”on” hover_enabled=”0″ header_font_size_last_edited=”on|phone” _i=”3″ _address=”4.1.0.0.3″]

APPLICATION DIRECTOR, LARGE HEALTHCARE COMPANY

[/et_pb_slide][/et_pb_slider][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ fb_built=”1″ _i=”5″ _address=”5″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”5.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”5.0.0″][et_pb_text _builder_version=”3.27.4″ _i=”0″ _address=”5.0.0.0″]

resources

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.27.4″ _i=”1″ _address=”5.1″][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”0″ _address=”5.1.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|85px|10px|false|false” _i=”0″ _address=”5.1.0.0″]

SENSITIVE DATA

iDiscover locates ALL sensitive data with minimal false positives.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NzIifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|0px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” saved_tabs=”all” _i=”1″ _address=”5.1.0.1″][/et_pb_button][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”1″ _address=”5.1.1″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ transform_scale_last_edited=”on|phone” transform_translate_last_edited=”on|phone” transform_translate_linked_phone=”off” transform_rotate_last_edited=”on|phone” transform_skew_last_edited=”on|phone” transform_origin_last_edited=”on|phone” transform_styles_last_edited=”on|phone” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|23px|10px|false|false” hover_enabled=”0″ _i=”0″ _address=”5.1.1.0″]

CASE STUDY – FORTUNE 15 COMPANY

MENTIS helped a fortune 15 global conglomerate to find sensitive data across PeopleSoft, SAP applications

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MTYifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|0px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” saved_tabs=”all” _i=”1″ _address=”5.1.1.1″][/et_pb_button][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”2″ _address=”5.1.2″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” hover_enabled=”0″ inline_fonts=”fun city level 2″ _i=”0″ _address=”5.1.2.0″]

CASE STUDY – LARGEST PRIVATE BANK IN DR

MENTIS helped the largest private bank in Dominican Republic to find all sensitive data in DB2 and Oracle databases

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MTIifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|0px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” saved_tabs=”all” _i=”1″ _address=”5.1.2.1″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#191919″ custom_padding=”8px||0px|||” saved_tabs=”all” fb_built=”1″ _i=”6″ _address=”6″][et_pb_row column_structure=”1_5,1_5,1_5,1_5,1_5″ _builder_version=”3.27.4″ max_width=”1116px” _i=”0″ _address=”6.0″][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”0″ _address=”6.0.0″][et_pb_image src=”http://zero2compliance.com/wp-content/uploads/2019/08/mentis_w__138.png” _builder_version=”3.26.6″ _i=”0″ _address=”6.0.0.0″][/et_pb_image][et_pb_text _builder_version=”3.26.6″ text_text_color=”#ffffff” text_font_size=”15px” text_font_size_last_edited=”on|desktop” text_text_align=”left” _i=”1″ _address=”6.0.0.1″]

Headquarters
3 Columbus Circle 15th Floor
New York
NY 10019.
Telephone : +1 212 203 4365
E-mail: info@mentisinc.com

India
5 Sarojini Street
T Nagar
Chennai India 600017.
Telephone : 0091 44 4210 3594

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”1″ _address=”6.0.1″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”6.0.1.0″]

PRODUCTS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” width=”100%” _i=”1″ _address=”6.0.1.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”2″ _address=”6.0.2″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”6.0.2.0″]

SOLUTIONS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” width=”100%” custom_margin=”|-5px||||” custom_padding=”|0px||||” text_text_color_last_edited=”on|desktop” _i=”1″ _address=”6.0.2.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”3″ _address=”6.0.3″][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” _i=”0″ _address=”6.0.3.0″]

SERVICES

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” _i=”1″ _address=”6.0.3.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”4″ _address=”6.0.4″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”6.0.4.0″]

ABOUT US

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” _i=”1″ _address=”6.0.4.1″]

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]