[vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern” row_negative_margin=”disable_negative_margin” z_index=”” padding_top=”50″ padding_bottom=”50″ background_image=”2192″][vc_column css=”.vc_custom_1674849872279{padding-top: 100px !important;padding-bottom: 100px !important;}”][vc_row_inner row_type=”row” type=”grid” text_align=”left” css_animation=””][vc_column_inner width=”5/12″ css=”.vc_custom_1675237620147{padding-top: 30px !important;padding-bottom: 30px !important;background-color: #20bbe9 !important;}”][vc_column_text]

CYBERSECURITY
SOLUTIONS AND
SERVICES

[/vc_column_text][vc_column_text]Accelerate Digital Transformation With Confidence[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″ css=”.vc_custom_1672924672992{padding-top: 20px !important;padding-bottom: 20px !important;}”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern” z_index=”” padding_top=”60″ padding_bottom=”50″][vc_column][vc_row_inner row_type=”row” type=”grid” text_align=”left” css_animation=””][vc_column_inner][vc_column_text]

Business is evolving fast; new technologies are being adopted to keep the competitive edge and cater to end-user needs. The diversity of new technologies and tools has increased the surface area that is exposed to attacks. These attacks may come in the form of ransomware, advanced persistent threats, and phishing attacks. Cyber attacks continue to accelerate in number, frequency and impact. The financial implications of a cyber attack have made cybersecurity a top concern for organizations. For organizations tasked with mission-critical operations, system downtime is simply not an option.

[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern” z_index=”” padding_top=”40″ padding_bottom=”80″ css=”.vc_custom_1673518935379{padding-right: 20px !important;}”][vc_column][vc_row_inner row_type=”row” type=”grid” text_align=”left” css_animation=””][vc_column_inner width=”1/4″][/vc_column_inner][vc_column_inner width=”1/2″][vc_column_text]

Why Choose Croyten?

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][/vc_column_inner][/vc_row_inner][vc_row_inner row_type=”row” type=”grid” text_align=”left” css_animation=”” padding_top=”20″][vc_column_inner width=”1/2″][vc_column_text]Cybersecurity is a global issue that affects all sectors and leads to large financial losses. Whether your organization is a multinational corporation, a sole proprietorship, or a non-profit, its operations are susceptible to online attacks from hackers. The growth in Ethernet based communication protocols in industrial automation and control systems has opened these systems to the possibility of misuse and cyberattacks, requiring increasingly advanced skills and solutions. Unfortunately, most companies do not have the time, money and resources required to build their own security environment. That is where we come in—we help organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging our deep industry knowledge across client value chains and services that span the security lifecycle, we help enterprises to safeguard their valuable digital assets against sophisticated threats from end-to-end.[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″ css=”.vc_custom_1674127036856{margin-top: 40px !important;}”][vc_single_image image=”1822″ img_size=”large” qode_css_animation=””][/vc_column_inner][/vc_row_inner][vc_row_inner row_type=”row” type=”grid” text_align=”left” css_animation=”” padding_top=”20″][vc_column_inner css=”.vc_custom_1672926893098{padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;background-color: #1fb2e0 !important;border-radius: 10px !important;}”][vc_column_text]

Our Cyber Security solutions are compliant with NIST Cybersecurity Framework and follow International standards such as NERC CIP, ENISA, PERA, ISO 27001 and ISA/IEC-62443.

[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”grid” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern” z_index=”” padding_top=”100″ padding_bottom=”100″ css=”.vc_custom_1672927306578{padding-right: 20px !important;border-radius: 10px !important;}” background_color=”#1fb2e0″][vc_column][vc_row_inner row_type=”row” type=”full_width” text_align=”left” css_animation=””][vc_column_inner][vc_column_text]

Advantages of our Cybersecurity Consulting Approach

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner row_type=”row” type=”full_width” text_align=”left” css_animation=”” padding_top=”40″][vc_column_inner width=”1/2″][vc_column_text]

End-to-end Service

If you have a disjointed front, you are vulnerable to attacks. You need an expert technology partner to synchronize all your cybersecurity efforts into an end-to-end security solution.[/vc_column_text][vc_column_text css=”.vc_custom_1673521482582{padding-top: 20px !important;}”]

Collaborative Attitude

We believe that you know your business best, and no security solution can work without your input and collaboration, therefore, we make an effort to understand your point of view.[/vc_column_text][vc_column_text css=”.vc_custom_1673521488211{padding-top: 20px !important;}”]

Data Driven Decisions and Actionable Cybersecurity Insights

We collect hard data over an extended period of time and recommend steps that are backed by this data. This in depth analysis ensures that the cybersecurity solution we deliver is tailored to your business needs and provides the highest level of security with the least amount of time and resources invested.[/vc_column_text][vc_column_text css=”.vc_custom_1673521495637{padding-top: 20px !important;}”]

Focus on Automation and Data Analytics

We focus on automating the security process as much as possible so that your team can devote their time to your highest priorities. We also bring in AI and analytics to detect threats in real time by analyzing data from multiple streams so that these threats can be tackled before they impact your ecosystem.[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][vc_column_text]

Expertise in Cloud Security

We are experts in cloud security. We can help you assess how secure your cloud environment is, map your existing security framework, understand your current cyber security requirements, implement tools and best practices based on your current need, bridge security compliance gaps, monitor security tools, and manage security incidents.[/vc_column_text][vc_column_text css=”.vc_custom_1673521508740{padding-top: 20px !important;}”]

Global Experience

We have worked with businesses from around the globe, and we can deliver the advice, tools and services that are right for your business given its geographical location and reach.[/vc_column_text][vc_column_text css=”.vc_custom_1673521514011{padding-top: 20px !important;}”]

Focus on Simplicity

Cybersecurity is getting overwhelmingly complex. One of our goals is to make cybersecurity management simpler and easier for our clients. We deal with complexity so you can have a safer, but simple, user experience.[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”grid” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern” z_index=”” padding_top=”120″ padding_bottom=”50″ css=”.vc_custom_1671026151613{border-radius: 10px !important;}”][vc_column][vc_row_inner row_type=”row” type=”full_width” text_align=”left” css_animation=””][vc_column_inner][vc_column_text]

Our Cybersecurity Framework

We follow the industry-leading NIST cybersecurity standards. Our framework consists of:[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner row_type=”row” type=”full_width” text_align=”left” css_animation=”” css=”.vc_custom_1670940493206{margin-top: 40px !important;}”][vc_column_inner width=”1/2″][vc_column_text]

Identifying risks

  • Inventory critical assets and systems
  • Carry out a thorough risk analysis
  • Real-time correlation and analysis
  • Ethical hacking

[/vc_column_text][vc_column_text css=”.vc_custom_1673520197740{padding-top: 30px !important;}”]

Developing Safeguards

  • Developing policies, procedures
  • Introducing protective tools
  • Implementing appropriate access and auditing controls

[/vc_column_text][vc_column_text css=”.vc_custom_1673520205474{padding-top: 30px !important;}”]

Prompt Action

  • Developing a robust response plan
  • Timely and appropriate incident resolution

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][vc_column_text]

Timely Detection

  • Proactive event monitoring and automated alerts
  • Incident investigation and evaluation
  • Timely auditing
  • Advanced-Data Analytics

[/vc_column_text][vc_column_text css=”.vc_custom_1673520214001{padding-top: 30px !important;}”]

Fast Recovery

  • Developing a recovery strategy
  • Learning from threat events and improving security framework

[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”grid” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern” z_index=”” padding_top=”40″ padding_bottom=”50″ css=”.vc_custom_1673521797544{border-radius: 10px !important;}”][vc_column][vc_row_inner row_type=”row” type=”full_width” text_align=”left” css_animation=””][vc_column_inner][vc_column_text]

Our Services

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner row_type=”row” type=”full_width” text_align=”left” css_animation=”” padding_top=”20″][vc_column_inner width=”1/4″ css=”.vc_custom_1672930109218{border-top-width: 8px !important;border-right-width: 8px !important;border-bottom-width: 8px !important;border-left-width: 8px !important;padding-top: 50px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;background-color: #1fb2e0 !important;border-left-color: #ffffff !important;border-left-style: solid !important;border-right-color: #ffffff !important;border-right-style: solid !important;border-top-color: #ffffff !important;border-top-style: solid !important;border-bottom-color: #ffffff !important;border-bottom-style: solid !important;border-radius: 20px !important;}”][vc_single_image image=”1841″ img_size=”medium” alignment=”center” qode_css_animation=””][vc_column_text css=”.vc_custom_1672929037771{margin-top: 20px !important;}”]

Managed
Security

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″ css=”.vc_custom_1672930153835{border-top-width: 8px !important;border-right-width: 8px !important;border-bottom-width: 8px !important;border-left-width: 8px !important;padding-top: 50px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;background-color: #1fb2e0 !important;border-left-color: #ffffff !important;border-left-style: solid !important;border-right-color: #ffffff !important;border-right-style: solid !important;border-top-color: #ffffff !important;border-top-style: solid !important;border-bottom-color: #ffffff !important;border-bottom-style: solid !important;border-radius: 20px !important;}”][vc_single_image image=”1842″ img_size=”medium” alignment=”center” qode_css_animation=””][vc_column_text css=”.vc_custom_1672928344658{margin-top: 20px !important;}”]

Network Security

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″ css=”.vc_custom_1672930159680{border-top-width: 8px !important;border-right-width: 8px !important;border-bottom-width: 8px !important;border-left-width: 8px !important;padding-top: 50px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;background-color: #1fb2e0 !important;border-left-color: #ffffff !important;border-left-style: solid !important;border-right-color: #ffffff !important;border-right-style: solid !important;border-top-color: #ffffff !important;border-top-style: solid !important;border-bottom-color: #ffffff !important;border-bottom-style: solid !important;border-radius: 20px !important;}”][vc_single_image image=”1840″ img_size=”medium” alignment=”center” qode_css_animation=””][vc_column_text css=”.vc_custom_1672928338162{margin-top: 20px !important;}”]

Information Security

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″ css=”.vc_custom_1673520748263{border-top-width: 8px !important;border-right-width: 8px !important;border-bottom-width: 8px !important;border-left-width: 8px !important;padding-top: 50px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;background-color: #1fb2e0 !important;border-left-color: #ffffff !important;border-left-style: solid !important;border-right-color: #ffffff !important;border-right-style: solid !important;border-top-color: #ffffff !important;border-top-style: solid !important;border-bottom-color: #ffffff !important;border-bottom-style: solid !important;border-radius: 20px !important;}”][vc_single_image image=”1837″ img_size=”medium” alignment=”center” qode_css_animation=””][vc_column_text css=”.vc_custom_1673536591984{margin-top: 20px !important;}”]

Cloud
Security

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner row_type=”row” type=”full_width” text_align=”left” css_animation=”” padding_top=”20″][vc_column_inner width=”1/4″ css=”.vc_custom_1672930174020{border-top-width: 8px !important;border-right-width: 8px !important;border-bottom-width: 8px !important;border-left-width: 8px !important;padding-top: 50px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;background-color: #1fb2e0 !important;border-left-color: #ffffff !important;border-left-style: solid !important;border-right-color: #ffffff !important;border-right-style: solid !important;border-top-color: #ffffff !important;border-top-style: solid !important;border-bottom-color: #ffffff !important;border-bottom-style: solid !important;border-radius: 20px !important;}”][vc_single_image image=”1839″ img_size=”medium” alignment=”center” qode_css_animation=””][vc_column_text css=”.vc_custom_1672928423322{margin-top: 20px !important;}”]

Identity management,
especially for privileged
users

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″ css=”.vc_custom_1672930180933{border-top-width: 8px !important;border-right-width: 8px !important;border-bottom-width: 8px !important;border-left-width: 8px !important;padding-top: 50px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;background-color: #1fb2e0 !important;border-left-color: #ffffff !important;border-left-style: solid !important;border-right-color: #ffffff !important;border-right-style: solid !important;border-top-color: #ffffff !important;border-top-style: solid !important;border-bottom-color: #ffffff !important;border-bottom-style: solid !important;border-radius: 20px !important;}”][vc_single_image image=”1836″ img_size=”medium” alignment=”center” qode_css_animation=””][vc_column_text css=”.vc_custom_1674127901693{margin-top: 20px !important;padding-bottom: 90px !important;}”]

Application
Security

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″ css=”.vc_custom_1672930187061{border-top-width: 8px !important;border-right-width: 8px !important;border-bottom-width: 8px !important;border-left-width: 8px !important;padding-top: 50px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;background-color: #1fb2e0 !important;border-left-color: #ffffff !important;border-left-style: solid !important;border-right-color: #ffffff !important;border-right-style: solid !important;border-top-color: #ffffff !important;border-top-style: solid !important;border-bottom-color: #ffffff !important;border-bottom-style: solid !important;border-radius: 20px !important;}”][vc_single_image image=”1835″ img_size=”medium” alignment=”center” qode_css_animation=””][vc_column_text css=”.vc_custom_1674128022071{margin-top: 20px !important;padding-bottom: 60px !important;}”]

Advisory
Services & Risk
Assessment

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″ css=”.vc_custom_1672930194303{border-top-width: 8px !important;border-right-width: 8px !important;border-bottom-width: 8px !important;border-left-width: 8px !important;padding-top: 50px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;background-color: #1fb2e0 !important;border-left-color: #ffffff !important;border-left-style: solid !important;border-right-color: #ffffff !important;border-right-style: solid !important;border-top-color: #ffffff !important;border-top-style: solid !important;border-bottom-color: #ffffff !important;border-bottom-style: solid !important;border-radius: 20px !important;}”][vc_single_image image=”1838″ img_size=”medium” alignment=”center” qode_css_animation=””][vc_column_text css=”.vc_custom_1674128146172{margin-top: 20px !important;padding-bottom: 30px !important;}”]

Gamification of
cybersecurity training
and awareness

[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern” z_index=”” padding_top=”60″ padding_bottom=”40″ css=”.vc_custom_1672930269963{border-radius: 10px !important;}” side_padding=”2″][vc_column][vc_row_inner row_type=”row” type=”grid” text_align=”left” css_animation=””][vc_column_inner width=”1/2″][vc_column_text css=”.vc_custom_1673423994559{margin-bottom: 20px !important;}”]

Advisory Services &
Risk Assessment

We offer consulting and advisory services to help assess your cybersecurity environment, determine the best strategy for moving forward and boost your organization’s incident response capabilities: Our consulting and advisory services include:[/vc_column_text][vc_column_text css=”.vc_custom_1673422401123{margin-bottom: 20px !important;}”]

Vulnerability Assessment:

A machine-generated report to highlight your organization’s vulnerability and the steps necessary to eliminate it.

Penetration Test:

A penetration test is carried by a professional security practitioner to analyze gaps in your existing cybersecurity tool kit and the readiness of your organization in the aftermath of a security breach.

Application Security Assessment:

We evaluate your coding processes to determine whether your team is using best practices during your application development life cycle in order to promote safe coding and digital infrastructure agility.[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][vc_single_image image=”2006″ img_size=”full” alignment=”center” qode_css_animation=”” css=”.vc_custom_1674129139195{margin-top: 10px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner row_type=”row” type=”grid” text_align=”left” css_animation=”” css=”.vc_custom_1674129333339{padding-top: 30px !important;}”][vc_column_inner width=”1/2″][vc_single_image image=”2007″ img_size=”full” alignment=”center” qode_css_animation=”” css=”.vc_custom_1674129154319{margin-top: 10px !important;}”][/vc_column_inner][vc_column_inner width=”1/2″][vc_column_text css=”.vc_custom_1673423987206{margin-bottom: 20px !important;}”]

Network Security

We utilize firewalls and access control to secure your storage area networks, Wi-Fi, Email and the web against unwanted traffic and unauthorized users. Our Network Security services include:[/vc_column_text][vc_column_text css=”.vc_custom_1673424115483{margin-bottom: 20px !important;}”]

Firewalls

We install security policies at the application level to detect and block sophisticated attacks. This provides early warning to your team so you can respond in time.

Endpoint Protection

We help you install a security solution that provides anti-malware, firewall, host-based intrusion prevention and other threats on client devices and network infrastructure.

Email Security

Helps to minimize spam, phishing and malware attacks, and prevents information leaks.

Web Security

Protects employees from watering holes, malvertisements and phishing attacks by leveraging URL filtering, malware protection and application control technologies.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner row_type=”row” type=”grid” text_align=”left” css_animation=”” css=”.vc_custom_1674129339881{padding-top: 30px !important;}”][vc_column_inner width=”1/2″][vc_column_text css=”.vc_custom_1675698200919{margin-bottom: 20px !important;}”]

Cloud Security

We manage your cloud security infrastructure by providing the following services (Visit our Cloud Computing Consulting page):[/vc_column_text][vc_column_text css=”.vc_custom_1673424261967{margin-bottom: 20px !important;}”]

Secure Access Service Edge (SASE)

Combines network security functions with SD-WAN capabilities to deliver secure access to end users.

Cloud Security Posture Management (CSPM)

Leverage API integrations with cloud providers to provide security assessment and compliance monitoring.

Cloud Workload Protection Platforms (CWPP)

Enable server workload protection across data centers and cloud environments.

Cloud Access Security Broker (CASB)

Ensures that all traffic between your organization’s network and third party cloud-enabled applications follow policies created by your network administrators.[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][vc_single_image image=”2005″ img_size=”full” alignment=”center” qode_css_animation=”” css=”.vc_custom_1674129167508{margin-top: 10px !important;}”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern” z_index=”” background_color=”#20bbe9″ padding_top=”60″ padding_bottom=”60″][vc_column][vc_row_inner row_type=”row” type=”grid” text_align=”left” css_animation=””][vc_column_inner][vc_column_text]

Types of Threats We Protect You Against

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner row_type=”row” type=”grid” text_align=”left” css_animation=”” css=”.vc_custom_1673425503189{margin-top: 30px !important;}”][vc_column_inner width=”1/2″][icon_list_item icon=”fa-plus” icon_type=”circle” icon_color=”#20bbe9″ title=”Malware” icon_background_color=”#ffffff” margin_bottom=”20″ title_color=”#ffffff” title_size=”30″][icon_list_item icon=”fa-plus” icon_type=”circle” icon_color=”#20bbe9″ title=”Ransomware” icon_background_color=”#ffffff” margin_bottom=”20″ title_color=”#ffffff” title_size=”30″][icon_list_item icon=”fa-plus” icon_type=”circle” icon_color=”#20bbe9″ title=”Phishing” icon_background_color=”#ffffff” margin_bottom=”20″ title_color=”#ffffff” title_size=”30″][icon_list_item icon=”fa-plus” icon_type=”circle” icon_color=”#20bbe9″ title=”Man-in-the-middle attacks” icon_background_color=”#ffffff” margin_bottom=”20″ title_color=”#ffffff” title_size=”30″][/vc_column_inner][vc_column_inner width=”1/2″][icon_list_item icon=”fa-plus” icon_type=”circle” icon_color=”#20bbe9″ title=”Distributed denial-of-service attacks” icon_background_color=”#ffffff” margin_bottom=”20″ title_color=”#ffffff” title_size=”30″][icon_list_item icon=”fa-plus” icon_type=”circle” icon_color=”#20bbe9″ title=”SQL injections” icon_background_color=”#ffffff” margin_bottom=”20″ title_color=”#ffffff” title_size=”30″][icon_list_item icon=”fa-plus” icon_type=”circle” icon_color=”#20bbe9″ title=”Zero-day exploits” icon_background_color=”#ffffff” margin_bottom=”20″ title_color=”#ffffff” title_size=”30″][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern” z_index=”” padding_top=”60″ padding_bottom=”60″][vc_column][vc_row_inner row_type=”row” type=”grid” text_align=”left” css_animation=”” padding_bottom=”40″][vc_column_inner][vc_column_text]

Our Focus Industries

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner row_type=”row” type=”grid” text_align=”left” css_animation=””][vc_column_inner width=”1/4″][vc_single_image image=”1913″ img_size=”100 x 100″ alignment=”center” qode_css_animation=””][vc_column_text css=”.vc_custom_1673520550182{margin-top: 30px !important;}”]

Oil & Gas

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”1909″ img_size=”100 x 100″ alignment=”center” qode_css_animation=””][vc_column_text css=”.vc_custom_1673520539388{margin-top: 30px !important;}”]

Food & Beverage

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”1912″ img_size=”100 x 100″ alignment=”center” qode_css_animation=””][vc_column_text css=”.vc_custom_1673521116214{margin-top: 30px !important;}”]

Manufacturing

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”1914″ img_size=”100 x 100″ alignment=”center” qode_css_animation=””][vc_column_text css=”.vc_custom_1673521069392{margin-top: 30px !important;}”]

Retail

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner row_type=”row” type=”grid” text_align=”left” css_animation=”” padding_top=”40″][vc_column_inner width=”1/4″][vc_single_image image=”1910″ img_size=”100 x 100″ alignment=”center” qode_css_animation=””][vc_column_text css=”.vc_custom_1673520558546{margin-top: 30px !important;}”]

Healthcare

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”1908″ img_size=”100 x 100″ alignment=”center” qode_css_animation=””][vc_column_text css=”.vc_custom_1673520564445{margin-top: 30px !important;}”]

Education

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”1907″ img_size=”100 x 100″ alignment=”center” qode_css_animation=””][vc_column_text css=”.vc_custom_1673520570786{margin-top: 30px !important;}”]

Communications

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”1911″ img_size=”100 x 100″ alignment=”center” qode_css_animation=””][vc_column_text css=”.vc_custom_1673520576745{margin-top: 30px !important;}”]

Logistics

[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]