[et_pb_section fb_built=”1″ custom_padding_last_edited=”off|desktop” admin_label=”Hero” _builder_version=”4.5.1″ use_background_color_gradient=”on” background_color_gradient_start=”#000000″ background_color_gradient_end=”#04a1a0″ background_color_gradient_direction=”60deg” background_image=”https://cyberarmstech.com/wp-content/uploads/2022/06/maurer-2656-scaled.jpg” custom_padding=”100px|0px|0px|0px” box_shadow_style=”preset7″ box_shadow_horizontal=”0px” box_shadow_vertical=”-100px” box_shadow_color=”#ffffff”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25″ custom_padding=”|||”][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”||60px|” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.1″ text_font=”Open Sans|600|||||||” text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” header_2_font=”Poppins||||||||” header_2_font_size=”36px” header_2_line_height=”1.4em” background_layout=”dark” max_width=”550px” module_alignment=”center”]

Finance Services Cyber Security

 

Raising security levels through predicting, preventing and responding to financially motivated cybercrime

 

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_cta title=”Creating Advanced Multi-Layered protection for Finance Industry” button_url=”#” button_text=”explore” _builder_version=”4.5.1″ header_font=”Poppins|600||on|||||” header_font_size=”14px” header_line_height=”1.8em” body_font=”Open Sans||||||||” body_font_size=”16px” body_line_height=”1.8em” background_color=”#ffffff” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#04a1a0″ button_border_width=”8px” button_border_color=”#04a1a0″ button_border_radius=”100px” button_letter_spacing=”1px” button_font=”Poppins|600||on|||||” button_use_icon=”off” button_alignment=”left” text_orientation=”left” background_layout=”light” max_width=”87%” max_width_tablet=”” max_width_phone=”” max_width_last_edited=”on|desktop” custom_padding=”|||” animation_style=”slide” animation_direction=”top” animation_intensity_slide=”10%” animation_starting_opacity=”80%” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset3″ box_shadow_vertical=”31px” box_shadow_blur=”40px” box_shadow_color=”rgba(11,9,26,0.1)” locked=”off” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”]

Digitalization should not impair cybersecurity efficiency

Adaptive Security for Finance organisations

 

[/et_pb_cta][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Overview” _builder_version=”3.22″ custom_padding=”100px|0px|100px|0px”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25″][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.1″ text_font=”||||||||” text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” header_2_font=”Poppins||||||||” header_2_text_color=”#2c3238″ header_2_font_size=”28px” header_2_line_height=”1.4em” header_3_font=”||||||||” max_width=”700px” module_alignment=”center”]

Digitalization should not impair cybersecurity efficiency

The lure of actual money and ongoing transactions makes financial services a primary target for some of the most dangerous cybercriminals. It’s becoming clear that, with advances in fraud technologies, cybercriminals are switching their focus away from the ‘easy pickings’ of customers to the more challenging but rewarding targets provided by services providers themselves. Cyber Arms multi-layered approach helps financial services providers to implement an adaptive security strategy.
Systems are now interconnected and mobile devices extensively used both for remote access and for data sharing. This digitization increasingly exposes finance organizations to both generic and targeted attacks.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.1″ text_font=”||||||||” text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” header_2_font=”||||||||” header_3_font=”Poppins||||||||” header_3_font_size=”24px” header_3_line_height=”1.4em” max_width=”700px” module_alignment=”center”]

Adaptive Security for Finance organisations

Cyber Arms is a pioneer in helping businesses to adapt their security strategies – to defend their systems and data against advanced threats and targeted attacks – assisted by our world-leading security intelligence. We help organizations like yours to mitigate the risks, detect attacks at an earlier stage, deal with live attacks and improve protection against future attacks, through:

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.5.1″ _module_preset=”default” use_background_color_gradient=”on” background_color_gradient_start=”#04a1a0″ background_color_gradient_end=”#F8F8F8″ background_color_gradient_type=”radial” background_color_gradient_overlays_image=”on”][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_column type=”1_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_blurb title=”Targeted attack detection” url=”https://cyberarmstech.com/government/” image=”https://cyberarmstech.com/wp-content/uploads/2022/06/targeted-atrtack-protection.png” module_class=”brac” _builder_version=”4.5.1″ header_font=”Heebo|800|||||||” header_text_color=”#000000″ header_font_size=”16px” header_line_height=”1.5em” body_font=”||||||||” body_font_size=”15px” body_line_height=”1.8em” background_color=”rgba(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”rgba(0,0,0,0)” background_color_gradient_end=”rgba(0,0,0,0)” background_color_gradient_direction=”200deg” text_orientation=”center” custom_margin_last_edited=”off|desktop” custom_padding=”40px|20px|40px|20px|true|true” custom_padding_tablet=”20px||20px||true” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”3%” animation=”off” link_option_url=”https://cyberarmstech.com/government/” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” border_radii=”on|3px|3px|3px|3px” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0)” locked=”off” transform_styles__hover_enabled=”off” transform_scale__hover_enabled=”off” transform_translate__hover_enabled=”off” transform_rotate__hover_enabled=”off” transform_skew__hover_enabled=”off” transform_origin__hover_enabled=”off” custom_margin__hover_enabled=”on” custom_margin__hover=”-20px|-20px|0px|-20px|false|true” transform_scale__hover=”110%|110%” child_filter_brightness__hover_enabled=”off” child_filter_brightness__hover=”0%” child_filter_contrast__hover_enabled=”off” child_filter_invert__hover_enabled=”off” child_filter_contrast__hover=”200%” child_filter_invert__hover=”100%” background_layout__hover_enabled=”off” background_layout__hover=”dark” background__hover_enabled=”on” background_color_gradient_end__hover=”#45b2ff” background_color_gradient_start__hover=”rgba(252,164,0,0)” custom_padding__hover_enabled=”on” custom_padding__hover=”50px||50px||true|false” background_color__hover=”#aadbff” background_enable_color__hover=”on” box_shadow_color__hover_enabled=”on” box_shadow_color__hover=”rgba(26,138,237,0.64)” box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”38px”]

Comprehensive multi-vector discovery and risk mitigation of advanced threats and targeted attacks

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_blurb title=”Endpoint, ATM and POS systems security” url=”https://cyberarmstech.com/government/” image=”https://cyberarmstech.com/wp-content/uploads/2022/06/endpoint-ransomware-protection.png” module_class=”brac” _builder_version=”4.5.1″ header_font=”Heebo|800|||||||” header_text_color=”#000000″ header_font_size=”16px” header_line_height=”1.5em” body_font=”||||||||” body_font_size=”15px” body_line_height=”1.8em” background_color=”rgba(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”rgba(0,0,0,0)” background_color_gradient_end=”rgba(0,0,0,0)” background_color_gradient_direction=”200deg” text_orientation=”center” custom_margin_last_edited=”off|desktop” custom_padding=”40px|20px|40px|20px|true|true” custom_padding_tablet=”20px||20px||true” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”3%” animation=”off” link_option_url=”https://cyberarmstech.com/government/” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” border_radii=”on|3px|3px|3px|3px” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0)” locked=”off” transform_styles__hover_enabled=”off” transform_scale__hover_enabled=”off” transform_translate__hover_enabled=”off” transform_rotate__hover_enabled=”off” transform_skew__hover_enabled=”off” transform_origin__hover_enabled=”off” custom_margin__hover_enabled=”on” custom_margin__hover=”-20px|-20px|0px|-20px|false|true” transform_scale__hover=”110%|110%” child_filter_brightness__hover_enabled=”off” child_filter_brightness__hover=”0%” child_filter_contrast__hover_enabled=”off” child_filter_invert__hover_enabled=”off” child_filter_contrast__hover=”200%” child_filter_invert__hover=”100%” background_layout__hover_enabled=”off” background_layout__hover=”dark” background__hover_enabled=”on” background_color_gradient_end__hover=”#45b2ff” background_color_gradient_start__hover=”rgba(252,164,0,0)” custom_padding__hover_enabled=”on” custom_padding__hover=”50px||50px||true|false” background_color__hover=”#aadbff” background_enable_color__hover=”on” box_shadow_color__hover_enabled=”on” box_shadow_color__hover=”rgba(26,138,237,0.64)” box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”38px”]

All-in one security specificalli designed for Embedded systems, ATMs and Point-of-Sale devices

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_blurb title=”Hybrid Cloud Security” url=”https://cyberarmstech.com/government/” image=”https://cyberarmstech.com/wp-content/uploads/2022/06/fin-offer-cloud-security.png” module_class=”brac” _builder_version=”4.5.1″ header_font=”Heebo|800|||||||” header_text_color=”#000000″ header_font_size=”16px” header_line_height=”1.5em” body_font=”||||||||” body_font_size=”15px” body_line_height=”1.8em” background_color=”rgba(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”rgba(0,0,0,0)” background_color_gradient_end=”rgba(0,0,0,0)” background_color_gradient_direction=”200deg” text_orientation=”center” custom_margin_last_edited=”off|desktop” custom_padding=”40px|20px|40px|20px|true|true” custom_padding_tablet=”20px||20px||true” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”3%” animation=”off” link_option_url=”https://cyberarmstech.com/government/” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” border_radii=”on|3px|3px|3px|3px” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0)” locked=”off” transform_styles__hover_enabled=”off” transform_scale__hover_enabled=”off” transform_translate__hover_enabled=”off” transform_rotate__hover_enabled=”off” transform_skew__hover_enabled=”off” transform_origin__hover_enabled=”off” custom_margin__hover_enabled=”on” custom_margin__hover=”-20px|-20px|0px|-20px|false|true” transform_scale__hover=”110%|110%” child_filter_brightness__hover_enabled=”off” child_filter_brightness__hover=”0%” child_filter_contrast__hover_enabled=”off” child_filter_invert__hover_enabled=”off” child_filter_contrast__hover=”200%” child_filter_invert__hover=”100%” background_layout__hover_enabled=”off” background_layout__hover=”dark” background__hover_enabled=”on” background_color_gradient_end__hover=”#45b2ff” background_color_gradient_start__hover=”rgba(252,164,0,0)” custom_padding__hover_enabled=”on” custom_padding__hover=”50px||50px||true|false” background_color__hover=”#aadbff” background_enable_color__hover=”on” box_shadow_color__hover_enabled=”on” box_shadow_color__hover=”rgba(26,138,237,0.64)” box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”38px”]

Borderless security engineered for your hybrid cloud

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_blurb title=”Threat intelligence for isolated networks” url=”https://cyberarmstech.com/government/” image=”https://cyberarmstech.com/wp-content/uploads/2022/06/fin-offer-threat-intelligence-security-services.png” module_class=”brac” _builder_version=”4.5.1″ header_font=”Heebo|800|||||||” header_text_color=”#000000″ header_font_size=”16px” header_line_height=”1.5em” body_font=”||||||||” body_font_size=”15px” body_line_height=”1.8em” background_color=”rgba(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”rgba(0,0,0,0)” background_color_gradient_end=”rgba(0,0,0,0)” background_color_gradient_direction=”200deg” text_orientation=”center” custom_margin_last_edited=”off|desktop” custom_padding=”40px|20px|40px|20px|true|true” custom_padding_tablet=”20px||20px||true” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”3%” animation=”off” link_option_url=”https://cyberarmstech.com/government/” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” border_radii=”on|3px|3px|3px|3px” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0)” locked=”off” transform_styles__hover_enabled=”off” transform_scale__hover_enabled=”off” transform_translate__hover_enabled=”off” transform_rotate__hover_enabled=”off” transform_skew__hover_enabled=”off” transform_origin__hover_enabled=”off” custom_margin__hover_enabled=”on” custom_margin__hover=”-20px|-20px|0px|-20px|false|true” transform_scale__hover=”110%|110%” child_filter_brightness__hover_enabled=”off” child_filter_brightness__hover=”0%” child_filter_contrast__hover_enabled=”off” child_filter_invert__hover_enabled=”off” child_filter_contrast__hover=”200%” child_filter_invert__hover=”100%” background_layout__hover_enabled=”off” background_layout__hover=”dark” background__hover_enabled=”on” background_color_gradient_end__hover=”#45b2ff” background_color_gradient_start__hover=”rgba(252,164,0,0)” custom_padding__hover_enabled=”on” custom_padding__hover=”50px||50px||true|false” background_color__hover=”#aadbff” background_enable_color__hover=”on” box_shadow_color__hover_enabled=”on” box_shadow_color__hover=”rgba(26,138,237,0.64)” box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”38px”]

Evidence-based knowledge, including context and actionable recommendations regarding cyberthreats

[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”off|off|off” admin_label=”Problem and Solution” _builder_version=”3.22″ background_color=”#fafafc” custom_padding=”100px|0px|100px|0px”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25″ custom_margin=”2%|||”][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.1″ text_font=”||||||||” text_text_color=”#” text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” header_2_font=”Poppins||||||||” header_2_font_size=”28px” header_2_line_height=”1.4em” header_3_font=”||||||||” max_width=”700px” module_alignment=”center”]

Cyber Arms within the financial services industry

To be sure, the financial services industry needs more qualified Cyber Armns professionals. All business sectors struggle with the current cybersecurity skills shortage, but financial services companies are often high profile targets and must be particularly vigilant when it comes to Cyber Arms. As the gatekeepers of valuable customer PII, financial institutions are subject to an ever-increasing number of cybersecurity rules and regulations. With pressure from regulatory agencies and the need to protect brand reputation, financial firms are motivated to provide significant investment and collaboration to improve cybersecurity preparedness, response, and resiliency across the sector.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.1″ text_font=”||||||||” text_text_color=”#” text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” header_2_font=”Poppins||||||||” header_2_font_size=”28px” header_2_line_height=”1.4em” header_3_font=”||||||||” max_width=”700px” module_alignment=”center”]

Cyber Arms solutions for the financial services industry

The financial industry struggles to keep pace with technological innovation. Legacy systems that would be costly to replace, while only an inconvenience to customers, may pose a significant threat to financial institutions. On the other hand, hackers often benefit from new technologies that make it easier to attack legacy systems. 

Financial services leaders must recognize that hackers will find ways to exploit vulnerabilities. These vulnerabilities may be in computer systems and networks, or they may be in processes and procedures. Constructing a tech firewall is just the first line of defense. 

Many financial institutions find value in creating internal or hiring external penetration teams. Red team — blue team exercises can expose cyber vulnerabilities while providing invaluable training for the internal cyber defenders. 

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Results” _builder_version=”3.22″ custom_padding=”100px|0px|100px|0px”][et_pb_row _builder_version=”3.25″ custom_padding=”27px|0px|27px|0px” locked=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.1″ text_font=”||||||||” text_font_size=”16px” text_line_height=”1.8em” header_font=”||||||||” header_2_font=”Poppins||||||||” header_2_font_size=”28px” header_2_line_height=”1.4em” header_3_font=”||||||||” text_orientation=”center” max_width=”700px” module_alignment=”center”]

The Risk

Cyber-attacks are amongst the most dangerous business risks faced by the financial services sector. But while the risks – and the techniques adopted by cybercriminals – are constantly evolving, too many businesses rely on yesterday’s security technologies to protect against today’s and tomorrow’s threats:

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ use_custom_gutter=”on” gutter_width=”1″ _builder_version=”4.5.1″ _module_preset=”default” width=”68%” max_width=”2560px” module_alignment=”center” custom_margin=”0px||0px||true|false” custom_padding=”0px|0px|0px|0px|true|true” locked=”off”][et_pb_column type=”1_2″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_blurb title=”Targeted attack detection” url=”https://cyberarmstech.com/government/” image=”https://cyberarmstech.com/wp-content/uploads/2022/06/Targeted-attacks-could-be-in-process-in-your-system-right-now.png” icon_placement=”left” module_class=”brac” _builder_version=”4.5.1″ header_font=”Heebo|800|||||||” header_text_color=”#000000″ header_font_size=”16px” header_line_height=”1.5em” body_font=”||||||||” body_font_size=”15px” body_line_height=”1.8em” background_color=”rgba(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”rgba(0,0,0,0)” background_color_gradient_end=”rgba(0,0,0,0)” background_color_gradient_direction=”200deg” text_orientation=”center” custom_margin_last_edited=”off|desktop” custom_padding=”40px|20px|40px|20px|true|true” custom_padding_tablet=”20px||20px||true” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”3%” animation=”off” link_option_url=”https://cyberarmstech.com/government/” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” border_radii=”on|3px|3px|3px|3px” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0)” locked=”off” transform_styles__hover_enabled=”off” transform_scale__hover_enabled=”off” transform_translate__hover_enabled=”off” transform_rotate__hover_enabled=”off” transform_skew__hover_enabled=”off” transform_origin__hover_enabled=”off” custom_margin__hover_enabled=”on” custom_margin__hover=”-20px|-20px|0px|-20px|false|true” transform_scale__hover=”110%|110%” child_filter_brightness__hover_enabled=”off” child_filter_brightness__hover=”0%” child_filter_contrast__hover_enabled=”off” child_filter_invert__hover_enabled=”off” child_filter_contrast__hover=”200%” child_filter_invert__hover=”100%” background_layout__hover_enabled=”off” background_layout__hover=”dark” background__hover_enabled=”on” background_color_gradient_end__hover=”#45b2ff” background_color_gradient_start__hover=”rgba(252,164,0,0)” custom_padding__hover_enabled=”on” custom_padding__hover=”50px||50px||true|false” background_color__hover=”#aadbff” background_enable_color__hover=”on” box_shadow_color__hover_enabled=”on” box_shadow_color__hover=”rgba(26,138,237,0.64)” box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”38px”]

[/et_pb_blurb][et_pb_blurb title=”Data Center attacks can cause massive damage” url=”https://cyberarmstech.com/government/” image=”https://cyberarmstech.com/wp-content/uploads/2022/06/Data-Center-attacks-can-cause-massive-damage.png” icon_placement=”left” module_class=”brac” _builder_version=”4.5.1″ header_font=”Heebo|800|||||||” header_text_color=”#000000″ header_font_size=”16px” header_line_height=”1.5em” body_font=”||||||||” body_font_size=”15px” body_line_height=”1.8em” background_color=”rgba(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”rgba(0,0,0,0)” background_color_gradient_end=”rgba(0,0,0,0)” background_color_gradient_direction=”200deg” text_orientation=”center” custom_margin_last_edited=”off|desktop” custom_padding=”40px|20px|40px|20px|true|true” custom_padding_tablet=”20px||20px||true” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”3%” animation=”off” link_option_url=”https://cyberarmstech.com/government/” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” border_radii=”on|3px|3px|3px|3px” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0)” locked=”off” transform_styles__hover_enabled=”off” transform_scale__hover_enabled=”off” transform_translate__hover_enabled=”off” transform_rotate__hover_enabled=”off” transform_skew__hover_enabled=”off” transform_origin__hover_enabled=”off” custom_margin__hover_enabled=”on” custom_margin__hover=”-20px|-20px|0px|-20px|false|true” transform_scale__hover=”110%|110%” child_filter_brightness__hover_enabled=”off” child_filter_brightness__hover=”0%” child_filter_contrast__hover_enabled=”off” child_filter_invert__hover_enabled=”off” child_filter_contrast__hover=”200%” child_filter_invert__hover=”100%” background_layout__hover_enabled=”off” background_layout__hover=”dark” background__hover_enabled=”on” background_color_gradient_end__hover=”#45b2ff” background_color_gradient_start__hover=”rgba(252,164,0,0)” custom_padding__hover_enabled=”on” custom_padding__hover=”50px||50px||true|false” background_color__hover=”#aadbff” background_enable_color__hover=”on” box_shadow_color__hover_enabled=”on” box_shadow_color__hover=”rgba(26,138,237,0.64)” box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”38px”]

[/et_pb_blurb][et_pb_blurb title=”Confidential data loss costs more than just money” url=”https://cyberarmstech.com/government/” image=”https://cyberarmstech.com/wp-content/uploads/2022/06/Confidential-data-loss-costs-more-than-just-money.png” icon_placement=”left” module_class=”brac” _builder_version=”4.5.1″ header_font=”Heebo|800|||||||” header_text_color=”#000000″ header_font_size=”16px” header_line_height=”1.5em” body_font=”||||||||” body_font_size=”15px” body_line_height=”1.8em” background_color=”rgba(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”rgba(0,0,0,0)” background_color_gradient_end=”rgba(0,0,0,0)” background_color_gradient_direction=”200deg” text_orientation=”center” custom_margin_last_edited=”off|desktop” custom_padding=”40px|20px|40px|20px|true|true” custom_padding_tablet=”20px||20px||true” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”3%” animation=”off” link_option_url=”https://cyberarmstech.com/government/” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” border_radii=”on|3px|3px|3px|3px” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0)” locked=”off” transform_styles__hover_enabled=”off” transform_scale__hover_enabled=”off” transform_translate__hover_enabled=”off” transform_rotate__hover_enabled=”off” transform_skew__hover_enabled=”off” transform_origin__hover_enabled=”off” custom_margin__hover_enabled=”on” custom_margin__hover=”-20px|-20px|0px|-20px|false|true” transform_scale__hover=”110%|110%” child_filter_brightness__hover_enabled=”off” child_filter_brightness__hover=”0%” child_filter_contrast__hover_enabled=”off” child_filter_invert__hover_enabled=”off” child_filter_contrast__hover=”200%” child_filter_invert__hover=”100%” background_layout__hover_enabled=”off” background_layout__hover=”dark” background__hover_enabled=”on” background_color_gradient_end__hover=”#45b2ff” background_color_gradient_start__hover=”rgba(252,164,0,0)” custom_padding__hover_enabled=”on” custom_padding__hover=”50px||50px||true|false” background_color__hover=”#aadbff” background_enable_color__hover=”on” box_shadow_color__hover_enabled=”on” box_shadow_color__hover=”rgba(26,138,237,0.64)” box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”38px”]

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_blurb title=”Malicious insider activity is a common issue” url=”https://cyberarmstech.com/government/” image=”https://cyberarmstech.com/wp-content/uploads/2022/06/Malicious-insider-activity-is-a-common-issue.png” icon_placement=”left” module_class=”brac” _builder_version=”4.5.1″ header_font=”Heebo|800|||||||” header_text_color=”#000000″ header_font_size=”16px” header_line_height=”1.5em” body_font=”||||||||” body_font_size=”15px” body_line_height=”1.8em” background_color=”rgba(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”rgba(0,0,0,0)” background_color_gradient_end=”rgba(0,0,0,0)” background_color_gradient_direction=”200deg” text_orientation=”center” custom_margin_last_edited=”off|desktop” custom_padding=”40px|20px|40px|20px|true|true” custom_padding_tablet=”20px||20px||true” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”3%” animation=”off” link_option_url=”https://cyberarmstech.com/government/” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” border_radii=”on|3px|3px|3px|3px” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0)” locked=”off” transform_styles__hover_enabled=”off” transform_scale__hover_enabled=”off” transform_translate__hover_enabled=”off” transform_rotate__hover_enabled=”off” transform_skew__hover_enabled=”off” transform_origin__hover_enabled=”off” custom_margin__hover_enabled=”on” custom_margin__hover=”-20px|-20px|0px|-20px|false|true” transform_scale__hover=”110%|110%” child_filter_brightness__hover_enabled=”off” child_filter_brightness__hover=”0%” child_filter_contrast__hover_enabled=”off” child_filter_invert__hover_enabled=”off” child_filter_contrast__hover=”200%” child_filter_invert__hover=”100%” background_layout__hover_enabled=”off” background_layout__hover=”dark” background__hover_enabled=”on” background_color_gradient_end__hover=”#45b2ff” background_color_gradient_start__hover=”rgba(252,164,0,0)” custom_padding__hover_enabled=”on” custom_padding__hover=”50px||50px||true|false” background_color__hover=”#aadbff” background_enable_color__hover=”on” box_shadow_color__hover_enabled=”on” box_shadow_color__hover=”rgba(26,138,237,0.64)” box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”38px”]

[/et_pb_blurb][et_pb_blurb title=”Ransomware attacks could lock up critical data and devices” url=”https://cyberarmstech.com/government/” image=”https://cyberarmstech.com/wp-content/uploads/2022/06/Ransomware-attacks-could-lock-up-critical-data-and-devices.png” icon_placement=”left” module_class=”brac” _builder_version=”4.5.1″ header_font=”Heebo|800|||||||” header_text_color=”#000000″ header_font_size=”16px” header_line_height=”1.5em” body_font=”||||||||” body_font_size=”15px” body_line_height=”1.8em” background_color=”rgba(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”rgba(0,0,0,0)” background_color_gradient_end=”rgba(0,0,0,0)” background_color_gradient_direction=”200deg” text_orientation=”center” custom_margin_last_edited=”off|desktop” custom_padding=”40px|20px|40px|20px|true|true” custom_padding_tablet=”20px||20px||true” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”3%” animation=”off” link_option_url=”https://cyberarmstech.com/government/” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” border_radii=”on|3px|3px|3px|3px” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0)” locked=”off” transform_styles__hover_enabled=”off” transform_scale__hover_enabled=”off” transform_translate__hover_enabled=”off” transform_rotate__hover_enabled=”off” transform_skew__hover_enabled=”off” transform_origin__hover_enabled=”off” custom_margin__hover_enabled=”on” custom_margin__hover=”-20px|-20px|0px|-20px|false|true” transform_scale__hover=”110%|110%” child_filter_brightness__hover_enabled=”off” child_filter_brightness__hover=”0%” child_filter_contrast__hover_enabled=”off” child_filter_invert__hover_enabled=”off” child_filter_contrast__hover=”200%” child_filter_invert__hover=”100%” background_layout__hover_enabled=”off” background_layout__hover=”dark” background__hover_enabled=”on” background_color_gradient_end__hover=”#45b2ff” background_color_gradient_start__hover=”rgba(252,164,0,0)” custom_padding__hover_enabled=”on” custom_padding__hover=”50px||50px||true|false” background_color__hover=”#aadbff” background_enable_color__hover=”on” box_shadow_color__hover_enabled=”on” box_shadow_color__hover=”rgba(26,138,237,0.64)” box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”38px”]

[/et_pb_blurb][et_pb_blurb title=”Compliance and regulatory challenges must be met in full” url=”https://cyberarmstech.com/government/” image=”https://cyberarmstech.com/wp-content/uploads/2022/06/Confidential-data-loss-costs-more-than-just-money-1.png” icon_placement=”left” module_class=”brac” _builder_version=”4.5.1″ header_font=”Heebo|800|||||||” header_text_color=”#000000″ header_font_size=”16px” header_line_height=”1.5em” body_font=”||||||||” body_font_size=”15px” body_line_height=”1.8em” background_color=”rgba(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”rgba(0,0,0,0)” background_color_gradient_end=”rgba(0,0,0,0)” background_color_gradient_direction=”200deg” text_orientation=”center” custom_margin_last_edited=”off|desktop” custom_padding=”40px|20px|40px|20px|true|true” custom_padding_tablet=”20px||20px||true” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”3%” animation=”off” link_option_url=”https://cyberarmstech.com/government/” header_font_size_tablet=”15px” header_font_size_phone=”14px” header_font_size_last_edited=”on|phone” border_radii=”on|3px|3px|3px|3px” box_shadow_style=”preset3″ box_shadow_color=”rgba(0,0,0,0)” locked=”off” transform_styles__hover_enabled=”off” transform_scale__hover_enabled=”off” transform_translate__hover_enabled=”off” transform_rotate__hover_enabled=”off” transform_skew__hover_enabled=”off” transform_origin__hover_enabled=”off” custom_margin__hover_enabled=”on” custom_margin__hover=”-20px|-20px|0px|-20px|false|true” transform_scale__hover=”110%|110%” child_filter_brightness__hover_enabled=”off” child_filter_brightness__hover=”0%” child_filter_contrast__hover_enabled=”off” child_filter_invert__hover_enabled=”off” child_filter_contrast__hover=”200%” child_filter_invert__hover=”100%” background_layout__hover_enabled=”off” background_layout__hover=”dark” background__hover_enabled=”on” background_color_gradient_end__hover=”#45b2ff” background_color_gradient_start__hover=”rgba(252,164,0,0)” custom_padding__hover_enabled=”on” custom_padding__hover=”50px||50px||true|false” background_color__hover=”#aadbff” background_enable_color__hover=”on” box_shadow_color__hover_enabled=”on” box_shadow_color__hover=”rgba(26,138,237,0.64)” box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”38px”]

[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Try it Free” _builder_version=”3.22″ background_color=”#000000″ custom_padding=”100px|0px|100px|0px”][et_pb_row custom_padding_last_edited=”off|desktop” _builder_version=”4.5.1″ background_color=”#ffffff” custom_margin=”60px||60px||true” custom_padding=”60px|40px|60px|40px|true|true” animation_style=”zoom” animation_intensity_zoom=”10%” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”100px” box_shadow_color=”rgba(91,110,115,0.1)” locked=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.1″ text_font=”||||||||” text_line_height=”2em” header_font=”||||||||” header_3_font=”Merriweather|700|||||||” header_3_font_size=”26px” header_3_line_height=”1.6em” hover_enabled=”0″ header_3_font_size_tablet=”” header_3_font_size_phone=”20px” header_3_font_size_last_edited=”on|phone” locked=”off” header_text_shadow_style=”preset2″ header_font_size=”49px”]

Get in Touch

[/et_pb_text][et_pb_contact_form captcha=”off” module_id=”et_pb_contact_form_0″ _builder_version=”4.5.1″ form_field_background_color=”rgba(0,0,0,0)” title_font=”||||||||” form_field_font=”Open Sans||||||||” custom_button=”on” button_text_size=”13px” button_text_color=”#ffffff” button_bg_color=”#04a1a0″ button_border_width=”10px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”100px” button_letter_spacing=”2px” button_font=”Montserrat|500||on|||||” button_use_icon=”off” border_radii=”on|4px|4px|4px|4px” border_width_all=”2px” border_color_all=”#e0eaea” form_background_color=”rgba(0,0,0,0)” button_letter_spacing_hover=”2px”][et_pb_contact_field field_id=”Name” field_title=”Name” fullwidth_field=”on” _builder_version=”3.16″ custom_margin=”||24px|” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_contact_field][et_pb_contact_field field_id=”Email” field_title=”Email Address” field_type=”email” fullwidth_field=”on” _builder_version=”3.16″ custom_margin=”||24px|” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_contact_field][et_pb_contact_field field_id=”Message” field_title=”Message” field_type=”text” fullwidth_field=”on” _builder_version=”3.16″ custom_margin=”||24px|” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_contact_field][/et_pb_contact_form][/et_pb_column][/et_pb_row][/et_pb_section]