{"id":36,"date":"2026-04-19T18:50:50","date_gmt":"2026-04-19T18:50:50","guid":{"rendered":"https:\/\/perimetra.security\/?page_id=36"},"modified":"2026-04-19T19:05:59","modified_gmt":"2026-04-19T19:05:59","slug":"home","status":"publish","type":"page","link":"https:\/\/perimetra.security\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"36\" class=\"elementor elementor-36\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ea89461 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ea89461\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-36b0adb2\" data-id=\"36b0adb2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7fc09b08 elementor-widget elementor-widget-html\" data-id=\"7fc09b08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:inline-flex;align-items:center;gap:8px;background:rgba(26,86,219,0.18);border:1px solid rgba(26,86,219,0.35);color:#C7D7F5;font-size:12px;font-weight:500;letter-spacing:.06em;text-transform:uppercase;padding:6px 14px;border-radius:100px;margin-bottom:8px\"><span style=\"width:6px;height:6px;background:#22C55E;border-radius:50%;display:inline-block\"><\/span>Active Threat Protection \u2014 24\/7 Monitoring<\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b2be261 elementor-widget elementor-widget-spacer\" data-id=\"2b2be261\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c4acbd4 elementor-widget elementor-widget-heading\" data-id=\"1c4acbd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Stop Threats Before They<br>Become Breaches<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27545887 elementor-widget elementor-widget-spacer\" data-id=\"27545887\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1843cba7 elementor-widget elementor-widget-html\" data-id=\"1843cba7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<p style=\"color:#C7D7F5;font-size:18px;font-family:DM Sans,sans-serif;font-weight:300;line-height:1.7;max-width:620px\">Enterprise-grade endpoint detection and email security \u2014 built for small and mid-size businesses. Managed by experts, priced for reality.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46bbf2a8 elementor-widget elementor-widget-html\" data-id=\"46bbf2a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:flex;gap:16px;flex-wrap:wrap;margin-top:8px\"><a href=\"#contact\" style=\"display:inline-flex;align-items:center;gap:8px;background:#1A56DB;color:white;padding:14px 28px;border-radius:8px;font-weight:500;font-size:16px;text-decoration:none;font-family:DM Sans,sans-serif\">Start Free Assessment<\/a><a href=\"#services\" style=\"display:inline-flex;align-items:center;gap:8px;color:rgba(255,255,255,0.75);padding:14px 24px;border-radius:8px;font-weight:400;font-size:16px;text-decoration:none;border:1px solid rgba(255,255,255,0.15);font-family:DM Sans,sans-serif\">View Services \u2192<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41dc178 elementor-widget elementor-widget-html\" data-id=\"41dc178\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:flex;flex-wrap:wrap;padding-top:32px;border-top:1px solid rgba(255,255,255,0.08);margin-top:16px\"><div style=\"padding-right:36px;margin-bottom:16px\"><p style=\"font-family:Syne,sans-serif;font-size:30px;font-weight:700;color:#fff;line-height:1;margin:0 0 6px\">99.<span style='color:#60A5FA'>9%<\/span><\/p><p style=\"font-family:DM Sans,sans-serif;font-size:11px;color:#8FA3C8;text-transform:uppercase;letter-spacing:.05em;margin:0\">Platform Uptime SLA<\/p><\/div><div style=\"padding-right:36px;margin-bottom:16px\"><p style=\"font-family:Syne,sans-serif;font-size:30px;font-weight:700;color:#fff;line-height:1;margin:0 0 6px\"><2<span style='color:#60A5FA'>hr<\/span><\/p><p style=\"font-family:DM Sans,sans-serif;font-size:11px;color:#8FA3C8;text-transform:uppercase;letter-spacing:.05em;margin:0\">P1 Response Time<\/p><\/div><div style=\"padding-right:36px;margin-bottom:16px\"><p style=\"font-family:Syne,sans-serif;font-size:30px;font-weight:700;color:#fff;line-height:1;margin:0 0 6px\">60<span style='color:#60A5FA'>%+<\/span><\/p><p style=\"font-family:DM Sans,sans-serif;font-size:11px;color:#8FA3C8;text-transform:uppercase;letter-spacing:.05em;margin:0\">SMBs Targeted<\/p><\/div><div style=\"padding-right:36px;margin-bottom:16px\"><p style=\"font-family:Syne,sans-serif;font-size:30px;font-weight:700;color:#fff;line-height:1;margin:0 0 6px\">$120<span style='color:#60A5FA'>K<\/span><\/p><p style=\"font-family:DM Sans,sans-serif;font-size:11px;color:#8FA3C8;text-transform:uppercase;letter-spacing:.05em;margin:0\">Avg. Breach Cost<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-18fb0093 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"18fb0093\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-19b96d91\" data-id=\"19b96d91\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-72f0acfa elementor-widget elementor-widget-html\" data-id=\"72f0acfa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<style>@keyframes tick{from{transform:translateX(0)}to{transform:translateX(-50%)}}<\/style><div style=\"overflow:hidden;padding:14px 0\"><div style=\"display:flex;animation:tick 28s linear infinite;width:max-content\"><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#EF4444;display:inline-block\"><\/span>Ransomware \u2014 4,500+ new variants detected this quarter<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#F59E0B;display:inline-block\"><\/span>Business Email Compromise \u2014 #1 cause of SMB financial loss<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#EF4444;display:inline-block\"><\/span>Phishing attacks up 61% year-over-year<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#1A56DB;display:inline-block\"><\/span>HIPAA & PCI-DSS now require endpoint controls for compliance<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#F59E0B;display:inline-block\"><\/span>Average breach detection time without EDR: 197 days<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#EF4444;display:inline-block\"><\/span>91% of breaches start with an email<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#1A56DB;display:inline-block\"><\/span>Cyber insurers increasingly require EDR as a policy condition<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#EF4444;display:inline-block\"><\/span>Ransomware \u2014 4,500+ new variants detected this quarter<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#F59E0B;display:inline-block\"><\/span>Business Email Compromise \u2014 #1 cause of SMB financial loss<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#EF4444;display:inline-block\"><\/span>Phishing attacks up 61% year-over-year<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#1A56DB;display:inline-block\"><\/span>HIPAA & PCI-DSS now require endpoint controls for compliance<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#F59E0B;display:inline-block\"><\/span>Average breach detection time without EDR: 197 days<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#EF4444;display:inline-block\"><\/span>91% of breaches start with an email<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#1A56DB;display:inline-block\"><\/span>Cyber insurers increasingly require EDR as a policy condition<\/span><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4eb24a37 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4eb24a37\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7c6ad358\" data-id=\"7c6ad358\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-36430c41 elementor-widget elementor-widget-html\" data-id=\"36430c41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<span style=\"font-size:12px;font-weight:600;letter-spacing:.1em;text-transform:uppercase;color:#1A56DB;font-family:DM Sans,sans-serif\">What We Deliver<\/span>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-730a6b9d elementor-widget elementor-widget-spacer\" data-id=\"730a6b9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75d14cd elementor-widget elementor-widget-heading\" data-id=\"75d14cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Complete Security, Fully Managed<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12c063b elementor-widget elementor-widget-spacer\" data-id=\"12c063b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-634dfb18 elementor-widget elementor-widget-html\" data-id=\"634dfb18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<p style=\"color:#5A6E8C;font-size:16px;font-family:DM Sans,sans-serif;font-weight:300;line-height:1.7;margin:0\">One partner. Two critical layers. Zero complexity for your team.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6162e7 elementor-widget elementor-widget-spacer\" data-id=\"6162e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1658c601 elementor-widget elementor-widget-html\" data-id=\"1658c601\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:grid;grid-template-columns:repeat(auto-fit,minmax(280px,1fr));gap:2px;background:rgba(26,86,219,0.13);border:1px solid rgba(26,86,219,0.13);border-radius:16px;overflow:hidden\"><div style=\"background:#fff;padding:32px 28px\"><div style=\"font-size:28px;margin-bottom:16px\">\ud83d\udee1<\/div><h3 style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#0D1B35;margin-bottom:8px\">Endpoint Detection & Response<\/h3><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.65;font-weight:300;margin-bottom:14px\">AI-powered behavioral analysis stops ransomware, fileless attacks, and zero-days that antivirus misses. Automated containment isolates threats instantly.<\/p><div><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Behavioral AI<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Auto-Containment<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">24\/7 Monitoring<\/span><\/div><\/div><div style=\"background:#fff;padding:32px 28px\"><div style=\"font-size:28px;margin-bottom:16px\">\ud83d\udce7<\/div><h3 style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#0D1B35;margin-bottom:8px\">Email Security & Anti-Phishing<\/h3><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.65;font-weight:300;margin-bottom:14px\">Stop phishing, BEC, malware attachments, and impersonation attacks before your team ever sees them.<\/p><div><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Anti-Phishing<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">BEC Protection<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Attachment Sandbox<\/span><\/div><\/div><div style=\"background:#fff;padding:32px 28px\"><div style=\"font-size:28px;margin-bottom:16px\">\ud83d\udd0d<\/div><h3 style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#0D1B35;margin-bottom:8px\">Managed Threat Hunting<\/h3><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.65;font-weight:300;margin-bottom:14px\">Human-led proactive threat hunting with weekly reports. We find what automated tools miss.<\/p><div><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Human Analysts<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">IOC Analysis<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Weekly Reports<\/span><\/div><\/div><div style=\"background:#fff;padding:32px 28px\"><div style=\"font-size:28px;margin-bottom:16px\">\ud83d\udccb<\/div><h3 style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#0D1B35;margin-bottom:8px\">Compliance Reporting<\/h3><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.65;font-weight:300;margin-bottom:14px\">Automated HIPAA and PCI-DSS dashboards and quarterly audit-ready reports. Zero manual effort.<\/p><div><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">HIPAA<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">PCI-DSS<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Auto-Reports<\/span><\/div><\/div><div style=\"background:#fff;padding:32px 28px\"><div style=\"font-size:28px;margin-bottom:16px\">\ud83d\udc65<\/div><h3 style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#0D1B35;margin-bottom:8px\">Security Awareness Training<\/h3><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.65;font-weight:300;margin-bottom:14px\">Phishing simulations and monthly training modules turn your team into a first line of defense.<\/p><div><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Phishing Sims<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Monthly Modules<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Per-User Tracking<\/span><\/div><\/div><div style=\"background:#fff;padding:32px 28px\"><div style=\"font-size:28px;margin-bottom:16px\">\u2699\ufe0f<\/div><h3 style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#0D1B35;margin-bottom:8px\">Implementation & Onboarding<\/h3><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.65;font-weight:300;margin-bottom:14px\">Deployed in under 2 hours with zero end-user disruption. Dedicated partner rep handles everything.<\/p><div><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">2-Hour Deploy<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Dedicated Rep<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Zero Disruption<\/span><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-669251de elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"669251de\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-Array\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5236e0e7\" data-id=\"5236e0e7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2572c2aa elementor-widget elementor-widget-html\" data-id=\"2572c2aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<span style=\"font-size:12px;font-weight:600;letter-spacing:.1em;text-transform:uppercase;color:#1A56DB;font-family:DM Sans,sans-serif\">Endpoint Detection & Response<\/span>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75d84998 elementor-widget elementor-widget-spacer\" data-id=\"75d84998\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6572e825 elementor-widget elementor-widget-heading\" data-id=\"6572e825\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Your Endpoints. Defended in Real Time.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f1955c3 elementor-widget elementor-widget-spacer\" data-id=\"4f1955c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62c57717 elementor-widget elementor-widget-html\" data-id=\"62c57717\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<p style=\"color:#5A6E8C;font-size:16px;font-family:DM Sans,sans-serif;font-weight:300;line-height:1.7;margin:0\">Traditional antivirus looks for known signatures. EDR watches behavior \u2014 stopping attacks that have never been seen before.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8feb608 elementor-widget elementor-widget-spacer\" data-id=\"8feb608\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13df7fcb elementor-widget elementor-widget-html\" data-id=\"13df7fcb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:flex;gap:14px;align-items:flex-start;padding:16px;background:#fff;border-radius:10px;border:1px solid rgba(26,86,219,0.1);margin-bottom:12px\"><div style=\"width:36px;height:36px;flex-shrink:0;background:#E8F0FE;border-radius:8px;display:flex;align-items:center;justify-content:center;font-size:16px\">\u26a1<\/div><div><h4 style=\"font-family:Syne,sans-serif;font-size:14px;font-weight:700;color:#0D1B35;margin:0 0 4px\">Behavioral AI Detection<\/h4><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.55;font-weight:300;margin:0\">Detects ransomware, living-off-the-land attacks, fileless malware, and zero-days based on what code does \u2014 not what it looks like.<\/p><\/div><\/div><div style=\"display:flex;gap:14px;align-items:flex-start;padding:16px;background:#fff;border-radius:10px;border:1px solid rgba(26,86,219,0.1);margin-bottom:12px\"><div style=\"width:36px;height:36px;flex-shrink:0;background:#E8F0FE;border-radius:8px;display:flex;align-items:center;justify-content:center;font-size:16px\">\ud83d\udd12<\/div><div><h4 style=\"font-family:Syne,sans-serif;font-size:14px;font-weight:700;color:#0D1B35;margin:0 0 4px\">Automated Host Isolation<\/h4><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.55;font-weight:300;margin:0\">Infected endpoints are cut off from the network in milliseconds \u2014 before ransomware can spread to a single other device.<\/p><\/div><\/div><div style=\"display:flex;gap:14px;align-items:flex-start;padding:16px;background:#fff;border-radius:10px;border:1px solid rgba(26,86,219,0.1);margin-bottom:12px\"><div style=\"width:36px;height:36px;flex-shrink:0;background:#E8F0FE;border-radius:8px;display:flex;align-items:center;justify-content:center;font-size:16px\">\ud83d\udda5<\/div><div><h4 style=\"font-family:Syne,sans-serif;font-size:14px;font-weight:700;color:#0D1B35;margin:0 0 4px\">Multi-Tenant Dashboard<\/h4><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.55;font-weight:300;margin:0\">One pane of glass for all your clients. Triage, manage, and report across every deployment without switching accounts.<\/p><\/div><\/div><div style=\"display:flex;gap:14px;align-items:flex-start;padding:16px;background:#fff;border-radius:10px;border:1px solid rgba(26,86,219,0.1);margin-bottom:12px\"><div style=\"width:36px;height:36px;flex-shrink:0;background:#E8F0FE;border-radius:8px;display:flex;align-items:center;justify-content:center;font-size:16px\">\ud83d\udcca<\/div><div><h4 style=\"font-family:Syne,sans-serif;font-size:14px;font-weight:700;color:#0D1B35;margin:0 0 4px\">Monthly Threat Reports<\/h4><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.55;font-weight:300;margin:0\">Automated branded reports every month \u2014 showing threats stopped, endpoints protected, and action taken.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-29da036f\" data-id=\"29da036f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28d76cd6 elementor-widget elementor-widget-html\" data-id=\"28d76cd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"background:#0D1B35;border-radius:14px;overflow:hidden;border:1px solid rgba(255,255,255,0.08)\"><div style=\"background:#162544;padding:12px 18px;display:flex;align-items:center;gap:8px;border-bottom:1px solid rgba(255,255,255,0.07)\"><span style=\"width:10px;height:10px;border-radius:50%;background:#FF5F57;display:inline-block\"><\/span><span style=\"width:10px;height:10px;border-radius:50%;background:#FFBD2E;display:inline-block\"><\/span><span style=\"width:10px;height:10px;border-radius:50%;background:#28C840;display:inline-block\"><\/span><span style=\"font-size:11px;color:rgba(255,255,255,0.35);font-family:DM Sans,monospace;margin-left:auto\">Perimetra EDR \u2014 Live Threat Feed<\/span><\/div><div style=\"padding:14px\"><div style=\"display:flex;align-items:flex-start;gap:10px;padding:11px 13px;border-radius:8px;border:1px solid rgba(220,38,38,0.2);background:rgba(220,38,38,0.08);margin-bottom:7px\"><span style=\"font-size:10px;font-weight:600;letter-spacing:.05em;text-transform:uppercase;padding:3px 8px;border-radius:4px;background:rgba(220,38,38,0.25);color:#FCA5A5;flex-shrink:0;margin-top:1px\">BLOCKED<\/span><div style=\"flex:1\"><p style=\"font-size:12px;color:rgba(255,255,255,0.8);font-family:DM Sans,sans-serif;margin:0\">Ransomware process tree terminated<\/p><p style=\"font-size:11px;color:rgba(255,255,255,0.35);font-family:DM Sans,monospace;margin:2px 0 0\">WIN-ACC-042 \u00b7 conhost.exe \u00b7 Encrypted 0 files<\/p><\/div><span style=\"font-size:10px;color:rgba(255,255,255,0.25);font-family:monospace;flex-shrink:0;margin-top:2px\">0s<\/span><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:11px 13px;border-radius:8px;border:1px solid rgba(220,38,38,0.2);background:rgba(220,38,38,0.08);margin-bottom:7px\"><span style=\"font-size:10px;font-weight:600;letter-spacing:.05em;text-transform:uppercase;padding:3px 8px;border-radius:4px;background:rgba(220,38,38,0.25);color:#FCA5A5;flex-shrink:0;margin-top:1px\">ISOLATED<\/span><div style=\"flex:1\"><p style=\"font-size:12px;color:rgba(255,255,255,0.8);font-family:DM Sans,sans-serif;margin:0\">Host isolated \u2014 lateral movement attempt<\/p><p style=\"font-size:11px;color:rgba(255,255,255,0.35);font-family:DM Sans,monospace;margin:2px 0 0\">MACBOOK-HR-07 \u00b7 Credential harvesting \u00b7 Network revoked<\/p><\/div><span style=\"font-size:10px;color:rgba(255,255,255,0.25);font-family:monospace;flex-shrink:0;margin-top:2px\">2m<\/span><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:11px 13px;border-radius:8px;border:1px solid rgba(245,158,11,0.2);background:rgba(245,158,11,0.08);margin-bottom:7px\"><span style=\"font-size:10px;font-weight:600;letter-spacing:.05em;text-transform:uppercase;padding:3px 8px;border-radius:4px;background:rgba(245,158,11,0.25);color:#FCD34D;flex-shrink:0;margin-top:1px\">ALERT<\/span><div style=\"flex:1\"><p style=\"font-size:12px;color:rgba(255,255,255,0.8);font-family:DM Sans,sans-serif;margin:0\">Suspicious PowerShell execution<\/p><p style=\"font-size:11px;color:rgba(255,255,255,0.35);font-family:DM Sans,monospace;margin:2px 0 0\">WIN-SRV-01 \u00b7 Encoded command detected \u00b7 Under investigation<\/p><\/div><span style=\"font-size:10px;color:rgba(255,255,255,0.25);font-family:monospace;flex-shrink:0;margin-top:2px\">11m<\/span><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:11px 13px;border-radius:8px;border:1px solid rgba(5,150,105,0.2);background:rgba(5,150,105,0.08);margin-bottom:7px\"><span style=\"font-size:10px;font-weight:600;letter-spacing:.05em;text-transform:uppercase;padding:3px 8px;border-radius:4px;background:rgba(5,150,105,0.25);color:#6EE7B7;flex-shrink:0;margin-top:1px\">CLEAN<\/span><div style=\"flex:1\"><p style=\"font-size:12px;color:rgba(255,255,255,0.8);font-family:DM Sans,sans-serif;margin:0\">Threat hunt complete \u2014 no IOCs found<\/p><p style=\"font-size:11px;color:rgba(255,255,255,0.35);font-family:DM Sans,monospace;margin:2px 0 0\">All 142 endpoints \u00b7 Duration: 4m 22s<\/p><\/div><span style=\"font-size:10px;color:rgba(255,255,255,0.25);font-family:monospace;flex-shrink:0;margin-top:2px\">1h<\/span><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:11px 13px;border-radius:8px;border:1px solid rgba(220,38,38,0.2);background:rgba(220,38,38,0.08);margin-bottom:7px\"><span style=\"font-size:10px;font-weight:600;letter-spacing:.05em;text-transform:uppercase;padding:3px 8px;border-radius:4px;background:rgba(220,38,38,0.25);color:#FCA5A5;flex-shrink:0;margin-top:1px\">BLOCKED<\/span><div style=\"flex:1\"><p style=\"font-size:12px;color:rgba(255,255,255,0.8);font-family:DM Sans,sans-serif;margin:0\">Fileless attack in memory \u2014 terminated<\/p><p style=\"font-size:11px;color:rgba(255,255,255,0.35);font-family:DM Sans,monospace;margin:2px 0 0\">WIN-FIN-03 \u00b7 Reflective DLL injection \u00b7 No persistence<\/p><\/div><span style=\"font-size:10px;color:rgba(255,255,255,0.25);font-family:monospace;flex-shrink:0;margin-top:2px\">3h<\/span><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-229fcc93 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"229fcc93\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-Array\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-700da9e0\" data-id=\"700da9e0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c8ea7f elementor-widget elementor-widget-html\" data-id=\"8c8ea7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"background:#F4F6FB;border-radius:14px;overflow:hidden;border:1px solid rgba(26,86,219,0.13)\"><div style=\"background:#fff;padding:12px 18px;border-bottom:1px solid rgba(26,86,219,0.1);display:flex;justify-content:space-between;align-items:center\"><span style=\"font-family:Syne,sans-serif;font-size:13px;font-weight:700;color:#0D1B35\">Inbox \u2014 Email Security Gateway<\/span><span style=\"font-family:DM Sans,sans-serif;font-size:12px;color:#1A56DB;font-weight:500\">142 threats blocked today<\/span><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:12px 18px;border-bottom:1px solid rgba(26,86,219,0.08);background:rgba(220,38,38,0.03)\"><div style=\"width:32px;height:32px;border-radius:50%;background:#EF4444;display:flex;align-items:center;justify-content:center;font-size:10px;font-weight:600;color:white;flex-shrink:0\">PH<\/div><div style=\"flex:1;min-width:0\"><div style=\"display:flex;align-items:center;gap:8px;flex-wrap:wrap\"><span style=\"font-size:12px;font-weight:500;color:#0D1B35;font-family:DM Sans,sans-serif\">payroll-update@acmecorp-hr.net<\/span><span style=\"font-size:10px;font-weight:600;padding:2px 7px;border-radius:100px;background:rgba(220,38,38,0.12);color:#DC2626;text-transform:uppercase\">Phishing<\/span><\/div><p style=\"font-size:12px;color:#5A6E8C;margin:2px 0 0;font-family:DM Sans,sans-serif;white-space:nowrap;overflow:hidden;text-overflow:ellipsis\">URGENT: Verify your direct deposit by EOD<\/p><\/div><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:12px 18px;border-bottom:1px solid rgba(26,86,219,0.08);background:rgba(220,38,38,0.03)\"><div style=\"width:32px;height:32px;border-radius:50%;background:#EF4444;display:flex;align-items:center;justify-content:center;font-size:10px;font-weight:600;color:white;flex-shrink:0\">ML<\/div><div style=\"flex:1;min-width:0\"><div style=\"display:flex;align-items:center;gap:8px;flex-wrap:wrap\"><span style=\"font-size:12px;font-weight:500;color:#0D1B35;font-family:DM Sans,sans-serif\">invoice@secure-docs-portal.io<\/span><span style=\"font-size:10px;font-weight:600;padding:2px 7px;border-radius:100px;background:rgba(220,38,38,0.12);color:#DC2626;text-transform:uppercase\">Malware<\/span><\/div><p style=\"font-size:12px;color:#5A6E8C;margin:2px 0 0;font-family:DM Sans,sans-serif;white-space:nowrap;overflow:hidden;text-overflow:ellipsis\">Your Invoice #8821 \u2014 Open Attachment<\/p><\/div><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:12px 18px;border-bottom:1px solid rgba(26,86,219,0.08);background:rgba(245,158,11,0.03)\"><div style=\"width:32px;height:32px;border-radius:50%;background:#F59E0B;display:flex;align-items:center;justify-content:center;font-size:10px;font-weight:600;color:white;flex-shrink:0\">SP<\/div><div style=\"flex:1;min-width:0\"><div style=\"display:flex;align-items:center;gap:8px;flex-wrap:wrap\"><span style=\"font-size:12px;font-weight:500;color:#0D1B35;font-family:DM Sans,sans-serif\">deals@best-vendor-offers.biz<\/span><span style=\"font-size:10px;font-weight:600;padding:2px 7px;border-radius:100px;background:rgba(245,158,11,0.12);color:#B45309;text-transform:uppercase\">Spam<\/span><\/div><p style=\"font-size:12px;color:#5A6E8C;margin:2px 0 0;font-family:DM Sans,sans-serif;white-space:nowrap;overflow:hidden;text-overflow:ellipsis\">Exclusive limited-time offer!<\/p><\/div><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:12px 18px;border-bottom:1px solid rgba(26,86,219,0.08);background:rgba(5,150,105,0.03)\"><div style=\"width:32px;height:32px;border-radius:50%;background:#1A56DB;display:flex;align-items:center;justify-content:center;font-size:10px;font-weight:600;color:white;flex-shrink:0\">JS<\/div><div style=\"flex:1;min-width:0\"><div style=\"display:flex;align-items:center;gap:8px;flex-wrap:wrap\"><span style=\"font-size:12px;font-weight:500;color:#0D1B35;font-family:DM Sans,sans-serif\">j.smith@trustedvendor.com<\/span><span style=\"font-size:10px;font-weight:600;padding:2px 7px;border-radius:100px;background:rgba(5,150,105,0.12);color:#059669;text-transform:uppercase\">Clean<\/span><\/div><p style=\"font-size:12px;color:#5A6E8C;margin:2px 0 0;font-family:DM Sans,sans-serif;white-space:nowrap;overflow:hidden;text-overflow:ellipsis\">Q2 Contract Renewal \u2014 Draft for Review<\/p><\/div><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:12px 18px;border-bottom:1px solid rgba(26,86,219,0.08);background:rgba(220,38,38,0.03)\"><div style=\"width:32px;height:32px;border-radius:50%;background:#EF4444;display:flex;align-items:center;justify-content:center;font-size:10px;font-weight:600;color:white;flex-shrink:0\">BEC<\/div><div style=\"flex:1;min-width:0\"><div style=\"display:flex;align-items:center;gap:8px;flex-wrap:wrap\"><span style=\"font-size:12px;font-weight:500;color:#0D1B35;font-family:DM Sans,sans-serif\">ceo-alerts@yourcompany-corp.com<\/span><span style=\"font-size:10px;font-weight:600;padding:2px 7px;border-radius:100px;background:rgba(220,38,38,0.12);color:#DC2626;text-transform:uppercase\">BEC<\/span><\/div><p style=\"font-size:12px;color:#5A6E8C;margin:2px 0 0;font-family:DM Sans,sans-serif;white-space:nowrap;overflow:hidden;text-overflow:ellipsis\">Wire transfer needed \u2014 keep confidential<\/p><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2d40c1be\" data-id=\"2d40c1be\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b02f6e7 elementor-widget elementor-widget-html\" data-id=\"3b02f6e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<span style=\"font-size:12px;font-weight:600;letter-spacing:.1em;text-transform:uppercase;color:#1A56DB;font-family:DM Sans,sans-serif\">Email Security<\/span>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70b21215 elementor-widget elementor-widget-spacer\" data-id=\"70b21215\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71fa19c0 elementor-widget elementor-widget-heading\" data-id=\"71fa19c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">91% of Breaches Start Here.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59491d10 elementor-widget elementor-widget-spacer\" data-id=\"59491d10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60455dc5 elementor-widget elementor-widget-html\" data-id=\"60455dc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<p style=\"color:#5A6E8C;font-size:16px;font-family:DM Sans,sans-serif;font-weight:300;line-height:1.7;margin:0\">Email is the most exploited attack surface in your business. Our gateway stops threats before your team ever sees them.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-373f98f6 elementor-widget elementor-widget-spacer\" data-id=\"373f98f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64cfc002 elementor-widget elementor-widget-html\" data-id=\"64cfc002\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:flex;gap:12px;align-items:flex-start;padding-bottom:14px;border-bottom:1px solid rgba(26,86,219,0.08);margin-bottom:14px\"><div style=\"width:34px;height:34px;flex-shrink:0;background:#E8F0FE;border-radius:8px;display:flex;align-items:center;justify-content:center;font-size:15px\">\ud83c\udfa3<\/div><div><h4 style=\"font-family:Syne,sans-serif;font-size:14px;font-weight:700;color:#0D1B35;margin:0 0 3px\">Real-Time Phishing Detection<\/h4><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.55;font-weight:300;margin:0\">AI analyzes sender reputation, domain age, and content patterns to catch spear-phishing and credential theft attempts.<\/p><\/div><\/div><div style=\"display:flex;gap:12px;align-items:flex-start;padding-bottom:14px;border-bottom:1px solid rgba(26,86,219,0.08);margin-bottom:14px\"><div style=\"width:34px;height:34px;flex-shrink:0;background:#E8F0FE;border-radius:8px;display:flex;align-items:center;justify-content:center;font-size:15px\">\ud83d\udce6<\/div><div><h4 style=\"font-family:Syne,sans-serif;font-size:14px;font-weight:700;color:#0D1B35;margin:0 0 3px\">Attachment Sandboxing<\/h4><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.55;font-weight:300;margin:0\">Every attachment is detonated in isolation before delivery. Malicious macros, PDFs, and executables blocked at the gateway.<\/p><\/div><\/div><div style=\"display:flex;gap:12px;align-items:flex-start;padding-bottom:14px;border-bottom:1px solid rgba(26,86,219,0.08);margin-bottom:14px\"><div style=\"width:34px;height:34px;flex-shrink:0;background:#E8F0FE;border-radius:8px;display:flex;align-items:center;justify-content:center;font-size:15px\">\ud83d\udd17<\/div><div><h4 style=\"font-family:Syne,sans-serif;font-size:14px;font-weight:700;color:#0D1B35;margin:0 0 3px\">URL Rewriting & Click Protection<\/h4><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.55;font-weight:300;margin:0\">Every link is rewritten and scanned at click-time \u2014 so protection follows the user even after delivery.<\/p><\/div><\/div><div style=\"display:flex;gap:12px;align-items:flex-start;padding-bottom:14px;border-bottom:1px solid rgba(26,86,219,0.08);margin-bottom:14px\"><div style=\"width:34px;height:34px;flex-shrink:0;background:#E8F0FE;border-radius:8px;display:flex;align-items:center;justify-content:center;font-size:15px\">\ud83c\udfe2<\/div><div><h4 style=\"font-family:Syne,sans-serif;font-size:14px;font-weight:700;color:#0D1B35;margin:0 0 3px\">BEC Defense<\/h4><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.55;font-weight:300;margin:0\">Detects executive, vendor, and partner impersonation \u2014 even when attackers use legitimate email infrastructure.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-34967659 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"34967659\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-13c354a2\" data-id=\"13c354a2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e766efa elementor-widget elementor-widget-html\" data-id=\"e766efa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<span style=\"font-size:12px;font-weight:600;letter-spacing:.1em;text-transform:uppercase;color:#93C5FD;font-family:DM Sans,sans-serif\">Compliance Coverage<\/span>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2151f3d elementor-widget elementor-widget-spacer\" data-id=\"2151f3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b45e5f6 elementor-widget elementor-widget-heading\" data-id=\"b45e5f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Stay Audit-Ready. Automatically.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c33e547 elementor-widget elementor-widget-spacer\" data-id=\"7c33e547\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6850ad73 elementor-widget elementor-widget-html\" data-id=\"6850ad73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<p style=\"color:#8FA3C8;font-size:16px;font-family:DM Sans,sans-serif;font-weight:300;line-height:1.7;margin:0\">Automated reporting for the frameworks your clients and insurers require \u2014 delivered quarterly with zero manual effort.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-295a424f elementor-widget elementor-widget-spacer\" data-id=\"295a424f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-270820c6 elementor-widget elementor-widget-html\" data-id=\"270820c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:grid;grid-template-columns:repeat(auto-fit,minmax(180px,1fr));gap:14px\"><div style=\"background:rgba(255,255,255,0.04);border:1px solid rgba(255,255,255,0.08);border-radius:12px;padding:24px 20px\"><p style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#60A5FA;margin:0 0 8px\">HIPAA<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:rgba(255,255,255,0.5);line-height:1.5;margin:0\">For healthcare providers and business associates handling patient data<\/p><\/div><div style=\"background:rgba(255,255,255,0.04);border:1px solid rgba(255,255,255,0.08);border-radius:12px;padding:24px 20px\"><p style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#60A5FA;margin:0 0 8px\">PCI-DSS<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:rgba(255,255,255,0.5);line-height:1.5;margin:0\">For any business processing payment card information<\/p><\/div><div style=\"background:rgba(255,255,255,0.04);border:1px solid rgba(255,255,255,0.08);border-radius:12px;padding:24px 20px\"><p style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#60A5FA;margin:0 0 8px\">SOC 2<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:rgba(255,255,255,0.5);line-height:1.5;margin:0\">Security controls increasingly required by enterprise clients<\/p><\/div><div style=\"background:rgba(255,255,255,0.04);border:1px solid rgba(255,255,255,0.08);border-radius:12px;padding:24px 20px\"><p style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#60A5FA;margin:0 0 8px\">NIST CSF<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:rgba(255,255,255,0.5);line-height:1.5;margin:0\">The gold standard for SMB cybersecurity posture<\/p><\/div><div style=\"background:rgba(255,255,255,0.04);border:1px solid rgba(255,255,255,0.08);border-radius:12px;padding:24px 20px\"><p style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#60A5FA;margin:0 0 8px\">Cyber Insurance<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:rgba(255,255,255,0.5);line-height:1.5;margin:0\">EDR and email security required by most carriers \u2014 we provide the documentation<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5aa5d795 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5aa5d795\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b4cd403\" data-id=\"1b4cd403\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-77195bab elementor-widget elementor-widget-html\" data-id=\"77195bab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<span style=\"font-size:12px;font-weight:600;letter-spacing:.1em;text-transform:uppercase;color:#1A56DB;font-family:DM Sans,sans-serif\">Transparent Pricing<\/span>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-169b4acf elementor-widget elementor-widget-spacer\" data-id=\"169b4acf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30889588 elementor-widget elementor-widget-heading\" data-id=\"30889588\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Simple Per-Endpoint Pricing. No Surprises.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a183732 elementor-widget elementor-widget-spacer\" data-id=\"1a183732\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7af7007b elementor-widget elementor-widget-html\" data-id=\"7af7007b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<p style=\"color:#5A6E8C;font-size:16px;font-family:DM Sans,sans-serif;font-weight:300;line-height:1.7;margin:0\">Annual subscriptions billed upfront. Mix and match \u2014 or start with just what you need.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-378707f0 elementor-widget elementor-widget-spacer\" data-id=\"378707f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b06ee6 elementor-widget elementor-widget-html\" data-id=\"9b06ee6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:grid;grid-template-columns:repeat(auto-fit,minmax(230px,1fr));gap:20px\"><div style=\"background:#fff;border:1px solid rgba(26,86,219,0.13);border-radius:16px;padding:32px 28px;height:100%\"><p style=\"font-family:Syne,sans-serif;font-size:11px;font-weight:700;color:#1A56DB;letter-spacing:.1em;text-transform:uppercase;margin:0 0 6px\">Starter<\/p><p style=\"font-family:Syne,sans-serif;font-size:20px;font-weight:700;color:#0D1B35;margin:0 0 12px\">Email Security Only<\/p><p style=\"font-family:Syne,sans-serif;font-size:38px;font-weight:800;color:#0D1B35;line-height:1;margin:0 0 4px\"><span style=\"font-size:18px\">$<\/span>4<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:#5A6E8C;margin:0 0 20px\">per mailbox \/ month \u00b7 billed annually<\/p><hr style=\"border:none;border-top:1px solid #E8F0FE;margin:0 0 18px\"\/><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Anti-phishing & BEC detection<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Attachment sandboxing<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;URL rewriting & click protection<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Spam & malware filtering<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#CBD5E1;margin:0 0 8px\">\u2717 &nbsp;Endpoint detection & response<\/p><a href=\"#contact\" style=\"display:block;text-align:center;padding:12px;border-radius:8px;font-weight:500;font-size:14px;text-decoration:none;border:1.5px solid #1A56DB;color:#1A56DB;font-family:DM Sans,sans-serif;margin-top:20px\">Get Started<\/a><\/div><div style=\"background:#fff;border:1px solid rgba(26,86,219,0.13);border-radius:16px;padding:32px 28px;height:100%\"><p style=\"font-family:Syne,sans-serif;font-size:11px;font-weight:700;color:#1A56DB;letter-spacing:.1em;text-transform:uppercase;margin:0 0 6px\">Essential<\/p><p style=\"font-family:Syne,sans-serif;font-size:20px;font-weight:700;color:#0D1B35;margin:0 0 12px\">Endpoint Defense<\/p><p style=\"font-family:Syne,sans-serif;font-size:38px;font-weight:800;color:#0D1B35;line-height:1;margin:0 0 4px\"><span style=\"font-size:18px\">$<\/span>7<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:#5A6E8C;margin:0 0 20px\">per endpoint \/ month \u00b7 billed annually<\/p><hr style=\"border:none;border-top:1px solid #E8F0FE;margin:0 0 18px\"\/><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Advanced Endpoint Defense (EDR)<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Automated threat response & containment<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Monthly threat summary reports<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;24\/7 platform monitoring<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#CBD5E1;margin:0 0 8px\">\u2717 &nbsp;Email security gateway<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#CBD5E1;margin:0 0 8px\">\u2717 &nbsp;Managed threat hunting<\/p><a href=\"#contact\" style=\"display:block;text-align:center;padding:12px;border-radius:8px;font-weight:500;font-size:14px;text-decoration:none;border:1.5px solid #1A56DB;color:#1A56DB;font-family:DM Sans,sans-serif;margin-top:20px\">Get Started<\/a><\/div><div style=\"background:#0D1B35;border:2px solid #1A56DB;border-radius:16px;padding:32px 28px;height:100%\"><span style=\"display:block;text-align:center;background:#1A56DB;color:white;font-size:10px;font-weight:600;letter-spacing:.06em;text-transform:uppercase;padding:4px 14px;border-radius:100px;width:fit-content;margin:0 auto 14px\">Most Popular<\/span><p style=\"font-family:Syne,sans-serif;font-size:11px;font-weight:700;color:#1A56DB;letter-spacing:.1em;text-transform:uppercase;margin:0 0 6px\">Advanced<\/p><p style=\"font-family:Syne,sans-serif;font-size:20px;font-weight:700;color:white;margin:0 0 12px\">Complete Protection<\/p><p style=\"font-family:Syne,sans-serif;font-size:38px;font-weight:800;color:white;line-height:1;margin:0 0 4px\"><span style=\"font-size:18px\">$<\/span>12<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:#C7D7F5;margin:0 0 20px\">per endpoint \/ month \u00b7 billed annually<\/p><hr style=\"border:none;border-top:1px solid rgba(255,255,255,0.1);margin:0 0 18px\"\/><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#C7D7F5;margin:0 0 8px\">\u2713 &nbsp;Everything in Essential<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#C7D7F5;margin:0 0 8px\">\u2713 &nbsp;Email security & anti-phishing<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#C7D7F5;margin:0 0 8px\">\u2713 &nbsp;Managed threat hunting (weekly)<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#C7D7F5;margin:0 0 8px\">\u2713 &nbsp;Security awareness training<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#C7D7F5;margin:0 0 8px\">\u2713 &nbsp;Compliance reporting (HIPAA\/PCI)<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#C7D7F5;margin:0 0 8px\">\u2713 &nbsp;Dedicated partner success manager<\/p><a href=\"#contact\" style=\"display:block;text-align:center;padding:12px;border-radius:8px;font-weight:500;font-size:14px;text-decoration:none;background:#1A56DB;color:white;font-family:DM Sans,sans-serif;margin-top:20px\">Get Started<\/a><\/div><div style=\"background:#fff;border:1px solid rgba(26,86,219,0.13);border-radius:16px;padding:32px 28px;height:100%\"><p style=\"font-family:Syne,sans-serif;font-size:11px;font-weight:700;color:#1A56DB;letter-spacing:.1em;text-transform:uppercase;margin:0 0 6px\">Enterprise<\/p><p style=\"font-family:Syne,sans-serif;font-size:20px;font-weight:700;color:#0D1B35;margin:0 0 12px\">Custom Program<\/p><p style=\"font-family:Syne,sans-serif;font-size:28px;font-weight:800;color:#0D1B35;line-height:1;margin:0 0 4px\">Custom<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:#5A6E8C;margin:0 0 20px\">volume pricing for 500+ endpoints<\/p><hr style=\"border:none;border-top:1px solid #E8F0FE;margin:0 0 18px\"\/><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Everything in Advanced<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;White-label reporting<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Custom SLA terms<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;SIEM integration available<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Quarterly executive review<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Priority 1-hour P1 SLA<\/p><a href=\"#contact\" style=\"display:block;text-align:center;padding:12px;border-radius:8px;font-weight:500;font-size:14px;text-decoration:none;border:1.5px solid #1A56DB;color:#1A56DB;font-family:DM Sans,sans-serif;margin-top:20px\">Contact Sales<\/a><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-24687a6f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"24687a6f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3d97b14d\" data-id=\"3d97b14d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1940fe25 elementor-widget elementor-widget-html\" data-id=\"1940fe25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<span style=\"font-size:12px;font-weight:600;letter-spacing:.1em;text-transform:uppercase;color:#1A56DB;font-family:DM Sans,sans-serif\">Client Stories<\/span>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26601bbf elementor-widget elementor-widget-spacer\" data-id=\"26601bbf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2180ec16 elementor-widget elementor-widget-heading\" data-id=\"2180ec16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Our Clients Say<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76d10593 elementor-widget elementor-widget-spacer\" data-id=\"76d10593\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16192352 elementor-widget elementor-widget-html\" data-id=\"16192352\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:grid;grid-template-columns:repeat(auto-fit,minmax(270px,1fr));gap:22px\"><div style=\"background:#F4F6FB;border-radius:14px;padding:30px 26px;border:1px solid rgba(26,86,219,0.1)\"><p style=\"font-family:Syne,sans-serif;font-size:24px;color:#1A56DB;margin:0 0 12px\">&ldquo;<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:14px;color:#5A6E8C;line-height:1.7;font-weight:300;margin:0 0 18px\">Perimetra stopped a ransomware attack on a Friday afternoon before anyone on our team even knew it was happening. The automated report showed exactly what occurred. That alone paid for years of service.<\/p><div style=\"display:flex;align-items:center;gap:10px\"><div style=\"width:36px;height:36px;border-radius:50%;background:#0D1B35;display:flex;align-items:center;justify-content:center;font-size:11px;font-weight:600;color:white;flex-shrink:0\">DM<\/div><div><p style=\"font-family:DM Sans,sans-serif;font-size:13px;font-weight:500;color:#0D1B35;margin:0\">David M.<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:#8FA3C8;margin:0\">Managing Partner, Regional Law Firm<\/p><\/div><\/div><\/div><div style=\"background:#F4F6FB;border-radius:14px;padding:30px 26px;border:1px solid rgba(26,86,219,0.1)\"><p style=\"font-family:Syne,sans-serif;font-size:24px;color:#1A56DB;margin:0 0 12px\">&ldquo;<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:14px;color:#5A6E8C;line-height:1.7;font-weight:300;margin:0 0 18px\">We switched from basic AV and within the first week Perimetra caught three credential phishing attempts targeting our billing team. Our cyber insurer reduced our premium after seeing the EDR coverage.<\/p><div style=\"display:flex;align-items:center;gap:10px\"><div style=\"width:36px;height:36px;border-radius:50%;background:#0D1B35;display:flex;align-items:center;justify-content:center;font-size:11px;font-weight:600;color:white;flex-shrink:0\">SC<\/div><div><p style=\"font-family:DM Sans,sans-serif;font-size:13px;font-weight:500;color:#0D1B35;margin:0\">Sandra C.<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:#8FA3C8;margin:0\">Practice Manager, Dental Group (14 locations)<\/p><\/div><\/div><\/div><div style=\"background:#F4F6FB;border-radius:14px;padding:30px 26px;border:1px solid rgba(26,86,219,0.1)\"><p style=\"font-family:Syne,sans-serif;font-size:24px;color:#1A56DB;margin:0 0 12px\">&ldquo;<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:14px;color:#5A6E8C;line-height:1.7;font-weight:300;margin:0 0 18px\">The email security gateway alone was worth it. BEC attempts were coming in weekly targeting our finance team. Now they never see them. Setup took less than two hours.<\/p><div style=\"display:flex;align-items:center;gap:10px\"><div style=\"width:36px;height:36px;border-radius:50%;background:#0D1B35;display:flex;align-items:center;justify-content:center;font-size:11px;font-weight:600;color:white;flex-shrink:0\">TR<\/div><div><p style=\"font-family:DM Sans,sans-serif;font-size:13px;font-weight:500;color:#0D1B35;margin:0\">Thomas R.<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:#8FA3C8;margin:0\">CFO, Accounting Firm (80 staff)<\/p><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-38faf6de elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"38faf6de\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7410e67a\" data-id=\"7410e67a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6f11380a elementor-widget elementor-widget-heading\" data-id=\"6f11380a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ready to Protect Your Business?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b451316 elementor-widget elementor-widget-spacer\" data-id=\"7b451316\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f014729 elementor-widget elementor-widget-html\" data-id=\"2f014729\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<p style=\"color:#8FA3C8;font-size:17px;font-family:DM Sans,sans-serif;font-weight:300;line-height:1.7;text-align:center\">Get a free security assessment and custom quote \u2014 no commitment required.<br>Most clients are protected within 48 hours of signing.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d269efc elementor-widget elementor-widget-spacer\" data-id=\"5d269efc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5349ee80 elementor-widget elementor-widget-html\" data-id=\"5349ee80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:flex;justify-content:center;gap:14px;flex-wrap:wrap\"><a href=\"mailto:sales@perimetra.com\" style=\"display:inline-flex;align-items:center;gap:8px;background:#1A56DB;color:white;padding:14px 26px;border-radius:8px;font-weight:500;font-size:15px;text-decoration:none;font-family:DM Sans,sans-serif\">Email Us for a Quote<\/a><a href=\"tel:+18005550100\" style=\"display:inline-flex;align-items:center;gap:8px;color:rgba(255,255,255,0.75);padding:14px 22px;border-radius:8px;font-size:15px;text-decoration:none;border:1px solid rgba(255,255,255,0.15);font-family:DM Sans,sans-serif\">1-800-555-0100<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73728a90 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"73728a90\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-35957c6f\" data-id=\"35957c6f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ab55542 elementor-widget elementor-widget-html\" data-id=\"ab55542\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:inline-flex;align-items:center;gap:8px;background:rgba(26,86,219,0.18);border:1px solid rgba(26,86,219,0.35);color:#C7D7F5;font-size:12px;font-weight:500;letter-spacing:.06em;text-transform:uppercase;padding:6px 14px;border-radius:100px;margin-bottom:8px\"><span style=\"width:6px;height:6px;background:#22C55E;border-radius:50%;display:inline-block\"><\/span>Active Threat Protection \u2014 24\/7 Monitoring<\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-524b9b34 elementor-widget elementor-widget-spacer\" data-id=\"524b9b34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f07cca2 elementor-widget elementor-widget-heading\" data-id=\"f07cca2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Stop Threats Before They<br>Become Breaches<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62c0c516 elementor-widget elementor-widget-spacer\" data-id=\"62c0c516\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-148d1369 elementor-widget elementor-widget-html\" data-id=\"148d1369\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<p style=\"color:#C7D7F5;font-size:18px;font-family:DM Sans,sans-serif;font-weight:300;line-height:1.7;max-width:620px\">Enterprise-grade endpoint detection and email security \u2014 built for small and mid-size businesses. Managed by experts, priced for reality.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a62033d elementor-widget elementor-widget-html\" data-id=\"7a62033d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:flex;gap:16px;flex-wrap:wrap;margin-top:8px\"><a href=\"#contact\" style=\"display:inline-flex;align-items:center;gap:8px;background:#1A56DB;color:white;padding:14px 28px;border-radius:8px;font-weight:500;font-size:16px;text-decoration:none;font-family:DM Sans,sans-serif\">Start Free Assessment<\/a><a href=\"#services\" style=\"display:inline-flex;align-items:center;gap:8px;color:rgba(255,255,255,0.75);padding:14px 24px;border-radius:8px;font-weight:400;font-size:16px;text-decoration:none;border:1px solid rgba(255,255,255,0.15);font-family:DM Sans,sans-serif\">View Services \u2192<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73bb7828 elementor-widget elementor-widget-html\" data-id=\"73bb7828\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:flex;flex-wrap:wrap;padding-top:32px;border-top:1px solid rgba(255,255,255,0.08);margin-top:16px\"><div style=\"padding-right:36px;margin-bottom:16px\"><p style=\"font-family:Syne,sans-serif;font-size:30px;font-weight:700;color:#fff;line-height:1;margin:0 0 6px\">99.<span style='color:#60A5FA'>9%<\/span><\/p><p style=\"font-family:DM Sans,sans-serif;font-size:11px;color:#8FA3C8;text-transform:uppercase;letter-spacing:.05em;margin:0\">Platform Uptime SLA<\/p><\/div><div style=\"padding-right:36px;margin-bottom:16px\"><p style=\"font-family:Syne,sans-serif;font-size:30px;font-weight:700;color:#fff;line-height:1;margin:0 0 6px\"><2<span style='color:#60A5FA'>hr<\/span><\/p><p style=\"font-family:DM Sans,sans-serif;font-size:11px;color:#8FA3C8;text-transform:uppercase;letter-spacing:.05em;margin:0\">P1 Response Time<\/p><\/div><div style=\"padding-right:36px;margin-bottom:16px\"><p style=\"font-family:Syne,sans-serif;font-size:30px;font-weight:700;color:#fff;line-height:1;margin:0 0 6px\">60<span style='color:#60A5FA'>%+<\/span><\/p><p style=\"font-family:DM Sans,sans-serif;font-size:11px;color:#8FA3C8;text-transform:uppercase;letter-spacing:.05em;margin:0\">SMBs Targeted<\/p><\/div><div style=\"padding-right:36px;margin-bottom:16px\"><p style=\"font-family:Syne,sans-serif;font-size:30px;font-weight:700;color:#fff;line-height:1;margin:0 0 6px\">$120<span style='color:#60A5FA'>K<\/span><\/p><p style=\"font-family:DM Sans,sans-serif;font-size:11px;color:#8FA3C8;text-transform:uppercase;letter-spacing:.05em;margin:0\">Avg. Breach Cost<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6912d984 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6912d984\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-321c736a\" data-id=\"321c736a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e334e0 elementor-widget elementor-widget-html\" data-id=\"4e334e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<style>@keyframes tick{from{transform:translateX(0)}to{transform:translateX(-50%)}}<\/style><div style=\"overflow:hidden;padding:14px 0\"><div style=\"display:flex;animation:tick 28s linear infinite;width:max-content\"><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#EF4444;display:inline-block\"><\/span>Ransomware \u2014 4,500+ new variants detected this quarter<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#F59E0B;display:inline-block\"><\/span>Business Email Compromise \u2014 #1 cause of SMB financial loss<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#EF4444;display:inline-block\"><\/span>Phishing attacks up 61% year-over-year<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#1A56DB;display:inline-block\"><\/span>HIPAA & PCI-DSS now require endpoint controls for compliance<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#F59E0B;display:inline-block\"><\/span>Average breach detection time without EDR: 197 days<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#EF4444;display:inline-block\"><\/span>91% of breaches start with an email<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#1A56DB;display:inline-block\"><\/span>Cyber insurers increasingly require EDR as a policy condition<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#EF4444;display:inline-block\"><\/span>Ransomware \u2014 4,500+ new variants detected this quarter<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#F59E0B;display:inline-block\"><\/span>Business Email Compromise \u2014 #1 cause of SMB financial loss<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#EF4444;display:inline-block\"><\/span>Phishing attacks up 61% year-over-year<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#1A56DB;display:inline-block\"><\/span>HIPAA & PCI-DSS now require endpoint controls for compliance<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#F59E0B;display:inline-block\"><\/span>Average breach detection time without EDR: 197 days<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#EF4444;display:inline-block\"><\/span>91% of breaches start with an email<\/span><span style=\"display:inline-flex;align-items:center;gap:10px;padding:0 36px;white-space:nowrap;font-size:12px;color:rgba(255,255,255,0.5);font-family:DM Sans,sans-serif\"><span style=\"width:5px;height:5px;border-radius:50%;background:#1A56DB;display:inline-block\"><\/span>Cyber insurers increasingly require EDR as a policy condition<\/span><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-68499931 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"68499931\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-28e4c525\" data-id=\"28e4c525\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5cf98ad5 elementor-widget elementor-widget-html\" data-id=\"5cf98ad5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<span style=\"font-size:12px;font-weight:600;letter-spacing:.1em;text-transform:uppercase;color:#1A56DB;font-family:DM Sans,sans-serif\">What We Deliver<\/span>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbd0d75 elementor-widget elementor-widget-spacer\" data-id=\"dbd0d75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-403b1776 elementor-widget elementor-widget-heading\" data-id=\"403b1776\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Complete Security, Fully Managed<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5832d0fc elementor-widget elementor-widget-spacer\" data-id=\"5832d0fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-367e7660 elementor-widget elementor-widget-html\" data-id=\"367e7660\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<p style=\"color:#5A6E8C;font-size:16px;font-family:DM Sans,sans-serif;font-weight:300;line-height:1.7;margin:0\">One partner. Two critical layers. Zero complexity for your team.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36725a75 elementor-widget elementor-widget-spacer\" data-id=\"36725a75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56a36939 elementor-widget elementor-widget-html\" data-id=\"56a36939\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:grid;grid-template-columns:repeat(auto-fit,minmax(280px,1fr));gap:2px;background:rgba(26,86,219,0.13);border:1px solid rgba(26,86,219,0.13);border-radius:16px;overflow:hidden\"><div style=\"background:#fff;padding:32px 28px\"><div style=\"font-size:28px;margin-bottom:16px\">\ud83d\udee1<\/div><h3 style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#0D1B35;margin-bottom:8px\">Endpoint Detection & Response<\/h3><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.65;font-weight:300;margin-bottom:14px\">AI-powered behavioral analysis stops ransomware, fileless attacks, and zero-days that antivirus misses. Automated containment isolates threats instantly.<\/p><div><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Behavioral AI<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Auto-Containment<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">24\/7 Monitoring<\/span><\/div><\/div><div style=\"background:#fff;padding:32px 28px\"><div style=\"font-size:28px;margin-bottom:16px\">\ud83d\udce7<\/div><h3 style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#0D1B35;margin-bottom:8px\">Email Security & Anti-Phishing<\/h3><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.65;font-weight:300;margin-bottom:14px\">Stop phishing, BEC, malware attachments, and impersonation attacks before your team ever sees them.<\/p><div><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Anti-Phishing<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">BEC Protection<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Attachment Sandbox<\/span><\/div><\/div><div style=\"background:#fff;padding:32px 28px\"><div style=\"font-size:28px;margin-bottom:16px\">\ud83d\udd0d<\/div><h3 style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#0D1B35;margin-bottom:8px\">Managed Threat Hunting<\/h3><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.65;font-weight:300;margin-bottom:14px\">Human-led proactive threat hunting with weekly reports. We find what automated tools miss.<\/p><div><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Human Analysts<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">IOC Analysis<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Weekly Reports<\/span><\/div><\/div><div style=\"background:#fff;padding:32px 28px\"><div style=\"font-size:28px;margin-bottom:16px\">\ud83d\udccb<\/div><h3 style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#0D1B35;margin-bottom:8px\">Compliance Reporting<\/h3><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.65;font-weight:300;margin-bottom:14px\">Automated HIPAA and PCI-DSS dashboards and quarterly audit-ready reports. Zero manual effort.<\/p><div><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">HIPAA<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">PCI-DSS<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Auto-Reports<\/span><\/div><\/div><div style=\"background:#fff;padding:32px 28px\"><div style=\"font-size:28px;margin-bottom:16px\">\ud83d\udc65<\/div><h3 style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#0D1B35;margin-bottom:8px\">Security Awareness Training<\/h3><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.65;font-weight:300;margin-bottom:14px\">Phishing simulations and monthly training modules turn your team into a first line of defense.<\/p><div><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Phishing Sims<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Monthly Modules<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Per-User Tracking<\/span><\/div><\/div><div style=\"background:#fff;padding:32px 28px\"><div style=\"font-size:28px;margin-bottom:16px\">\u2699\ufe0f<\/div><h3 style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#0D1B35;margin-bottom:8px\">Implementation & Onboarding<\/h3><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.65;font-weight:300;margin-bottom:14px\">Deployed in under 2 hours with zero end-user disruption. Dedicated partner rep handles everything.<\/p><div><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">2-Hour Deploy<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Dedicated Rep<\/span><span style=\"font-size:11px;padding:3px 10px;border-radius:100px;background:#E8F0FE;color:#1A56DB;border:1px solid rgba(26,86,219,0.15);margin:3px 3px 0 0;display:inline-block\">Zero Disruption<\/span><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-63e025dc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"63e025dc\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-Array\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-50c2e727\" data-id=\"50c2e727\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6cd858f9 elementor-widget elementor-widget-html\" data-id=\"6cd858f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<span style=\"font-size:12px;font-weight:600;letter-spacing:.1em;text-transform:uppercase;color:#1A56DB;font-family:DM Sans,sans-serif\">Endpoint Detection & Response<\/span>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14359348 elementor-widget elementor-widget-spacer\" data-id=\"14359348\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7de5987d elementor-widget elementor-widget-heading\" data-id=\"7de5987d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Your Endpoints. Defended in Real Time.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8578e8a elementor-widget elementor-widget-spacer\" data-id=\"8578e8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f92b4ba elementor-widget elementor-widget-html\" data-id=\"2f92b4ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<p style=\"color:#5A6E8C;font-size:16px;font-family:DM Sans,sans-serif;font-weight:300;line-height:1.7;margin:0\">Traditional antivirus looks for known signatures. EDR watches behavior \u2014 stopping attacks that have never been seen before.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d055943 elementor-widget elementor-widget-spacer\" data-id=\"5d055943\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2473f901 elementor-widget elementor-widget-html\" data-id=\"2473f901\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:flex;gap:14px;align-items:flex-start;padding:16px;background:#fff;border-radius:10px;border:1px solid rgba(26,86,219,0.1);margin-bottom:12px\"><div style=\"width:36px;height:36px;flex-shrink:0;background:#E8F0FE;border-radius:8px;display:flex;align-items:center;justify-content:center;font-size:16px\">\u26a1<\/div><div><h4 style=\"font-family:Syne,sans-serif;font-size:14px;font-weight:700;color:#0D1B35;margin:0 0 4px\">Behavioral AI Detection<\/h4><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.55;font-weight:300;margin:0\">Detects ransomware, living-off-the-land attacks, fileless malware, and zero-days based on what code does \u2014 not what it looks like.<\/p><\/div><\/div><div style=\"display:flex;gap:14px;align-items:flex-start;padding:16px;background:#fff;border-radius:10px;border:1px solid rgba(26,86,219,0.1);margin-bottom:12px\"><div style=\"width:36px;height:36px;flex-shrink:0;background:#E8F0FE;border-radius:8px;display:flex;align-items:center;justify-content:center;font-size:16px\">\ud83d\udd12<\/div><div><h4 style=\"font-family:Syne,sans-serif;font-size:14px;font-weight:700;color:#0D1B35;margin:0 0 4px\">Automated Host Isolation<\/h4><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.55;font-weight:300;margin:0\">Infected endpoints are cut off from the network in milliseconds \u2014 before ransomware can spread to a single other device.<\/p><\/div><\/div><div style=\"display:flex;gap:14px;align-items:flex-start;padding:16px;background:#fff;border-radius:10px;border:1px solid rgba(26,86,219,0.1);margin-bottom:12px\"><div style=\"width:36px;height:36px;flex-shrink:0;background:#E8F0FE;border-radius:8px;display:flex;align-items:center;justify-content:center;font-size:16px\">\ud83d\udda5<\/div><div><h4 style=\"font-family:Syne,sans-serif;font-size:14px;font-weight:700;color:#0D1B35;margin:0 0 4px\">Multi-Tenant Dashboard<\/h4><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.55;font-weight:300;margin:0\">One pane of glass for all your clients. Triage, manage, and report across every deployment without switching accounts.<\/p><\/div><\/div><div style=\"display:flex;gap:14px;align-items:flex-start;padding:16px;background:#fff;border-radius:10px;border:1px solid rgba(26,86,219,0.1);margin-bottom:12px\"><div style=\"width:36px;height:36px;flex-shrink:0;background:#E8F0FE;border-radius:8px;display:flex;align-items:center;justify-content:center;font-size:16px\">\ud83d\udcca<\/div><div><h4 style=\"font-family:Syne,sans-serif;font-size:14px;font-weight:700;color:#0D1B35;margin:0 0 4px\">Monthly Threat Reports<\/h4><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.55;font-weight:300;margin:0\">Automated branded reports every month \u2014 showing threats stopped, endpoints protected, and action taken.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-53ab57f9\" data-id=\"53ab57f9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15fb8755 elementor-widget elementor-widget-html\" data-id=\"15fb8755\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"background:#0D1B35;border-radius:14px;overflow:hidden;border:1px solid rgba(255,255,255,0.08)\"><div style=\"background:#162544;padding:12px 18px;display:flex;align-items:center;gap:8px;border-bottom:1px solid rgba(255,255,255,0.07)\"><span style=\"width:10px;height:10px;border-radius:50%;background:#FF5F57;display:inline-block\"><\/span><span style=\"width:10px;height:10px;border-radius:50%;background:#FFBD2E;display:inline-block\"><\/span><span style=\"width:10px;height:10px;border-radius:50%;background:#28C840;display:inline-block\"><\/span><span style=\"font-size:11px;color:rgba(255,255,255,0.35);font-family:DM Sans,monospace;margin-left:auto\">Perimetra EDR \u2014 Live Threat Feed<\/span><\/div><div style=\"padding:14px\"><div style=\"display:flex;align-items:flex-start;gap:10px;padding:11px 13px;border-radius:8px;border:1px solid rgba(220,38,38,0.2);background:rgba(220,38,38,0.08);margin-bottom:7px\"><span style=\"font-size:10px;font-weight:600;letter-spacing:.05em;text-transform:uppercase;padding:3px 8px;border-radius:4px;background:rgba(220,38,38,0.25);color:#FCA5A5;flex-shrink:0;margin-top:1px\">BLOCKED<\/span><div style=\"flex:1\"><p style=\"font-size:12px;color:rgba(255,255,255,0.8);font-family:DM Sans,sans-serif;margin:0\">Ransomware process tree terminated<\/p><p style=\"font-size:11px;color:rgba(255,255,255,0.35);font-family:DM Sans,monospace;margin:2px 0 0\">WIN-ACC-042 \u00b7 conhost.exe \u00b7 Encrypted 0 files<\/p><\/div><span style=\"font-size:10px;color:rgba(255,255,255,0.25);font-family:monospace;flex-shrink:0;margin-top:2px\">0s<\/span><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:11px 13px;border-radius:8px;border:1px solid rgba(220,38,38,0.2);background:rgba(220,38,38,0.08);margin-bottom:7px\"><span style=\"font-size:10px;font-weight:600;letter-spacing:.05em;text-transform:uppercase;padding:3px 8px;border-radius:4px;background:rgba(220,38,38,0.25);color:#FCA5A5;flex-shrink:0;margin-top:1px\">ISOLATED<\/span><div style=\"flex:1\"><p style=\"font-size:12px;color:rgba(255,255,255,0.8);font-family:DM Sans,sans-serif;margin:0\">Host isolated \u2014 lateral movement attempt<\/p><p style=\"font-size:11px;color:rgba(255,255,255,0.35);font-family:DM Sans,monospace;margin:2px 0 0\">MACBOOK-HR-07 \u00b7 Credential harvesting \u00b7 Network revoked<\/p><\/div><span style=\"font-size:10px;color:rgba(255,255,255,0.25);font-family:monospace;flex-shrink:0;margin-top:2px\">2m<\/span><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:11px 13px;border-radius:8px;border:1px solid rgba(245,158,11,0.2);background:rgba(245,158,11,0.08);margin-bottom:7px\"><span style=\"font-size:10px;font-weight:600;letter-spacing:.05em;text-transform:uppercase;padding:3px 8px;border-radius:4px;background:rgba(245,158,11,0.25);color:#FCD34D;flex-shrink:0;margin-top:1px\">ALERT<\/span><div style=\"flex:1\"><p style=\"font-size:12px;color:rgba(255,255,255,0.8);font-family:DM Sans,sans-serif;margin:0\">Suspicious PowerShell execution<\/p><p style=\"font-size:11px;color:rgba(255,255,255,0.35);font-family:DM Sans,monospace;margin:2px 0 0\">WIN-SRV-01 \u00b7 Encoded command detected \u00b7 Under investigation<\/p><\/div><span style=\"font-size:10px;color:rgba(255,255,255,0.25);font-family:monospace;flex-shrink:0;margin-top:2px\">11m<\/span><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:11px 13px;border-radius:8px;border:1px solid rgba(5,150,105,0.2);background:rgba(5,150,105,0.08);margin-bottom:7px\"><span style=\"font-size:10px;font-weight:600;letter-spacing:.05em;text-transform:uppercase;padding:3px 8px;border-radius:4px;background:rgba(5,150,105,0.25);color:#6EE7B7;flex-shrink:0;margin-top:1px\">CLEAN<\/span><div style=\"flex:1\"><p style=\"font-size:12px;color:rgba(255,255,255,0.8);font-family:DM Sans,sans-serif;margin:0\">Threat hunt complete \u2014 no IOCs found<\/p><p style=\"font-size:11px;color:rgba(255,255,255,0.35);font-family:DM Sans,monospace;margin:2px 0 0\">All 142 endpoints \u00b7 Duration: 4m 22s<\/p><\/div><span style=\"font-size:10px;color:rgba(255,255,255,0.25);font-family:monospace;flex-shrink:0;margin-top:2px\">1h<\/span><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:11px 13px;border-radius:8px;border:1px solid rgba(220,38,38,0.2);background:rgba(220,38,38,0.08);margin-bottom:7px\"><span style=\"font-size:10px;font-weight:600;letter-spacing:.05em;text-transform:uppercase;padding:3px 8px;border-radius:4px;background:rgba(220,38,38,0.25);color:#FCA5A5;flex-shrink:0;margin-top:1px\">BLOCKED<\/span><div style=\"flex:1\"><p style=\"font-size:12px;color:rgba(255,255,255,0.8);font-family:DM Sans,sans-serif;margin:0\">Fileless attack in memory \u2014 terminated<\/p><p style=\"font-size:11px;color:rgba(255,255,255,0.35);font-family:DM Sans,monospace;margin:2px 0 0\">WIN-FIN-03 \u00b7 Reflective DLL injection \u00b7 No persistence<\/p><\/div><span style=\"font-size:10px;color:rgba(255,255,255,0.25);font-family:monospace;flex-shrink:0;margin-top:2px\">3h<\/span><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-36efbeec elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"36efbeec\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-Array\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4c15e25c\" data-id=\"4c15e25c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ba80414 elementor-widget elementor-widget-html\" data-id=\"4ba80414\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"background:#F4F6FB;border-radius:14px;overflow:hidden;border:1px solid rgba(26,86,219,0.13)\"><div style=\"background:#fff;padding:12px 18px;border-bottom:1px solid rgba(26,86,219,0.1);display:flex;justify-content:space-between;align-items:center\"><span style=\"font-family:Syne,sans-serif;font-size:13px;font-weight:700;color:#0D1B35\">Inbox \u2014 Email Security Gateway<\/span><span style=\"font-family:DM Sans,sans-serif;font-size:12px;color:#1A56DB;font-weight:500\">142 threats blocked today<\/span><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:12px 18px;border-bottom:1px solid rgba(26,86,219,0.08);background:rgba(220,38,38,0.03)\"><div style=\"width:32px;height:32px;border-radius:50%;background:#EF4444;display:flex;align-items:center;justify-content:center;font-size:10px;font-weight:600;color:white;flex-shrink:0\">PH<\/div><div style=\"flex:1;min-width:0\"><div style=\"display:flex;align-items:center;gap:8px;flex-wrap:wrap\"><span style=\"font-size:12px;font-weight:500;color:#0D1B35;font-family:DM Sans,sans-serif\">payroll-update@acmecorp-hr.net<\/span><span style=\"font-size:10px;font-weight:600;padding:2px 7px;border-radius:100px;background:rgba(220,38,38,0.12);color:#DC2626;text-transform:uppercase\">Phishing<\/span><\/div><p style=\"font-size:12px;color:#5A6E8C;margin:2px 0 0;font-family:DM Sans,sans-serif;white-space:nowrap;overflow:hidden;text-overflow:ellipsis\">URGENT: Verify your direct deposit by EOD<\/p><\/div><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:12px 18px;border-bottom:1px solid rgba(26,86,219,0.08);background:rgba(220,38,38,0.03)\"><div style=\"width:32px;height:32px;border-radius:50%;background:#EF4444;display:flex;align-items:center;justify-content:center;font-size:10px;font-weight:600;color:white;flex-shrink:0\">ML<\/div><div style=\"flex:1;min-width:0\"><div style=\"display:flex;align-items:center;gap:8px;flex-wrap:wrap\"><span style=\"font-size:12px;font-weight:500;color:#0D1B35;font-family:DM Sans,sans-serif\">invoice@secure-docs-portal.io<\/span><span style=\"font-size:10px;font-weight:600;padding:2px 7px;border-radius:100px;background:rgba(220,38,38,0.12);color:#DC2626;text-transform:uppercase\">Malware<\/span><\/div><p style=\"font-size:12px;color:#5A6E8C;margin:2px 0 0;font-family:DM Sans,sans-serif;white-space:nowrap;overflow:hidden;text-overflow:ellipsis\">Your Invoice #8821 \u2014 Open Attachment<\/p><\/div><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:12px 18px;border-bottom:1px solid rgba(26,86,219,0.08);background:rgba(245,158,11,0.03)\"><div style=\"width:32px;height:32px;border-radius:50%;background:#F59E0B;display:flex;align-items:center;justify-content:center;font-size:10px;font-weight:600;color:white;flex-shrink:0\">SP<\/div><div style=\"flex:1;min-width:0\"><div style=\"display:flex;align-items:center;gap:8px;flex-wrap:wrap\"><span style=\"font-size:12px;font-weight:500;color:#0D1B35;font-family:DM Sans,sans-serif\">deals@best-vendor-offers.biz<\/span><span style=\"font-size:10px;font-weight:600;padding:2px 7px;border-radius:100px;background:rgba(245,158,11,0.12);color:#B45309;text-transform:uppercase\">Spam<\/span><\/div><p style=\"font-size:12px;color:#5A6E8C;margin:2px 0 0;font-family:DM Sans,sans-serif;white-space:nowrap;overflow:hidden;text-overflow:ellipsis\">Exclusive limited-time offer!<\/p><\/div><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:12px 18px;border-bottom:1px solid rgba(26,86,219,0.08);background:rgba(5,150,105,0.03)\"><div style=\"width:32px;height:32px;border-radius:50%;background:#1A56DB;display:flex;align-items:center;justify-content:center;font-size:10px;font-weight:600;color:white;flex-shrink:0\">JS<\/div><div style=\"flex:1;min-width:0\"><div style=\"display:flex;align-items:center;gap:8px;flex-wrap:wrap\"><span style=\"font-size:12px;font-weight:500;color:#0D1B35;font-family:DM Sans,sans-serif\">j.smith@trustedvendor.com<\/span><span style=\"font-size:10px;font-weight:600;padding:2px 7px;border-radius:100px;background:rgba(5,150,105,0.12);color:#059669;text-transform:uppercase\">Clean<\/span><\/div><p style=\"font-size:12px;color:#5A6E8C;margin:2px 0 0;font-family:DM Sans,sans-serif;white-space:nowrap;overflow:hidden;text-overflow:ellipsis\">Q2 Contract Renewal \u2014 Draft for Review<\/p><\/div><\/div><div style=\"display:flex;align-items:flex-start;gap:10px;padding:12px 18px;border-bottom:1px solid rgba(26,86,219,0.08);background:rgba(220,38,38,0.03)\"><div style=\"width:32px;height:32px;border-radius:50%;background:#EF4444;display:flex;align-items:center;justify-content:center;font-size:10px;font-weight:600;color:white;flex-shrink:0\">BEC<\/div><div style=\"flex:1;min-width:0\"><div style=\"display:flex;align-items:center;gap:8px;flex-wrap:wrap\"><span style=\"font-size:12px;font-weight:500;color:#0D1B35;font-family:DM Sans,sans-serif\">ceo-alerts@yourcompany-corp.com<\/span><span style=\"font-size:10px;font-weight:600;padding:2px 7px;border-radius:100px;background:rgba(220,38,38,0.12);color:#DC2626;text-transform:uppercase\">BEC<\/span><\/div><p style=\"font-size:12px;color:#5A6E8C;margin:2px 0 0;font-family:DM Sans,sans-serif;white-space:nowrap;overflow:hidden;text-overflow:ellipsis\">Wire transfer needed \u2014 keep confidential<\/p><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e9b7fb4\" data-id=\"e9b7fb4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5daf8f20 elementor-widget elementor-widget-html\" data-id=\"5daf8f20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<span style=\"font-size:12px;font-weight:600;letter-spacing:.1em;text-transform:uppercase;color:#1A56DB;font-family:DM Sans,sans-serif\">Email Security<\/span>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-231c312f elementor-widget elementor-widget-spacer\" data-id=\"231c312f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51de00f4 elementor-widget elementor-widget-heading\" data-id=\"51de00f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">91% of Breaches Start Here.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34d497da elementor-widget elementor-widget-spacer\" data-id=\"34d497da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61f519a9 elementor-widget elementor-widget-html\" data-id=\"61f519a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<p style=\"color:#5A6E8C;font-size:16px;font-family:DM Sans,sans-serif;font-weight:300;line-height:1.7;margin:0\">Email is the most exploited attack surface in your business. Our gateway stops threats before your team ever sees them.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c0c7860 elementor-widget elementor-widget-spacer\" data-id=\"5c0c7860\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74003725 elementor-widget elementor-widget-html\" data-id=\"74003725\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:flex;gap:12px;align-items:flex-start;padding-bottom:14px;border-bottom:1px solid rgba(26,86,219,0.08);margin-bottom:14px\"><div style=\"width:34px;height:34px;flex-shrink:0;background:#E8F0FE;border-radius:8px;display:flex;align-items:center;justify-content:center;font-size:15px\">\ud83c\udfa3<\/div><div><h4 style=\"font-family:Syne,sans-serif;font-size:14px;font-weight:700;color:#0D1B35;margin:0 0 3px\">Real-Time Phishing Detection<\/h4><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.55;font-weight:300;margin:0\">AI analyzes sender reputation, domain age, and content patterns to catch spear-phishing and credential theft attempts.<\/p><\/div><\/div><div style=\"display:flex;gap:12px;align-items:flex-start;padding-bottom:14px;border-bottom:1px solid rgba(26,86,219,0.08);margin-bottom:14px\"><div style=\"width:34px;height:34px;flex-shrink:0;background:#E8F0FE;border-radius:8px;display:flex;align-items:center;justify-content:center;font-size:15px\">\ud83d\udce6<\/div><div><h4 style=\"font-family:Syne,sans-serif;font-size:14px;font-weight:700;color:#0D1B35;margin:0 0 3px\">Attachment Sandboxing<\/h4><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.55;font-weight:300;margin:0\">Every attachment is detonated in isolation before delivery. Malicious macros, PDFs, and executables blocked at the gateway.<\/p><\/div><\/div><div style=\"display:flex;gap:12px;align-items:flex-start;padding-bottom:14px;border-bottom:1px solid rgba(26,86,219,0.08);margin-bottom:14px\"><div style=\"width:34px;height:34px;flex-shrink:0;background:#E8F0FE;border-radius:8px;display:flex;align-items:center;justify-content:center;font-size:15px\">\ud83d\udd17<\/div><div><h4 style=\"font-family:Syne,sans-serif;font-size:14px;font-weight:700;color:#0D1B35;margin:0 0 3px\">URL Rewriting & Click Protection<\/h4><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.55;font-weight:300;margin:0\">Every link is rewritten and scanned at click-time \u2014 so protection follows the user even after delivery.<\/p><\/div><\/div><div style=\"display:flex;gap:12px;align-items:flex-start;padding-bottom:14px;border-bottom:1px solid rgba(26,86,219,0.08);margin-bottom:14px\"><div style=\"width:34px;height:34px;flex-shrink:0;background:#E8F0FE;border-radius:8px;display:flex;align-items:center;justify-content:center;font-size:15px\">\ud83c\udfe2<\/div><div><h4 style=\"font-family:Syne,sans-serif;font-size:14px;font-weight:700;color:#0D1B35;margin:0 0 3px\">BEC Defense<\/h4><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;line-height:1.55;font-weight:300;margin:0\">Detects executive, vendor, and partner impersonation \u2014 even when attackers use legitimate email infrastructure.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-520624da elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"520624da\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2b2f627c\" data-id=\"2b2f627c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b54d7fc elementor-widget elementor-widget-html\" data-id=\"3b54d7fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<span style=\"font-size:12px;font-weight:600;letter-spacing:.1em;text-transform:uppercase;color:#93C5FD;font-family:DM Sans,sans-serif\">Compliance Coverage<\/span>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-547ee0c9 elementor-widget elementor-widget-spacer\" data-id=\"547ee0c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48b2ffc4 elementor-widget elementor-widget-heading\" data-id=\"48b2ffc4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Stay Audit-Ready. Automatically.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15f1a4be elementor-widget elementor-widget-spacer\" data-id=\"15f1a4be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dd40dea elementor-widget elementor-widget-html\" data-id=\"7dd40dea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<p style=\"color:#8FA3C8;font-size:16px;font-family:DM Sans,sans-serif;font-weight:300;line-height:1.7;margin:0\">Automated reporting for the frameworks your clients and insurers require \u2014 delivered quarterly with zero manual effort.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-589d5e92 elementor-widget elementor-widget-spacer\" data-id=\"589d5e92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56e31e7e elementor-widget elementor-widget-html\" data-id=\"56e31e7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:grid;grid-template-columns:repeat(auto-fit,minmax(180px,1fr));gap:14px\"><div style=\"background:rgba(255,255,255,0.04);border:1px solid rgba(255,255,255,0.08);border-radius:12px;padding:24px 20px\"><p style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#60A5FA;margin:0 0 8px\">HIPAA<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:rgba(255,255,255,0.5);line-height:1.5;margin:0\">For healthcare providers and business associates handling patient data<\/p><\/div><div style=\"background:rgba(255,255,255,0.04);border:1px solid rgba(255,255,255,0.08);border-radius:12px;padding:24px 20px\"><p style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#60A5FA;margin:0 0 8px\">PCI-DSS<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:rgba(255,255,255,0.5);line-height:1.5;margin:0\">For any business processing payment card information<\/p><\/div><div style=\"background:rgba(255,255,255,0.04);border:1px solid rgba(255,255,255,0.08);border-radius:12px;padding:24px 20px\"><p style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#60A5FA;margin:0 0 8px\">SOC 2<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:rgba(255,255,255,0.5);line-height:1.5;margin:0\">Security controls increasingly required by enterprise clients<\/p><\/div><div style=\"background:rgba(255,255,255,0.04);border:1px solid rgba(255,255,255,0.08);border-radius:12px;padding:24px 20px\"><p style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#60A5FA;margin:0 0 8px\">NIST CSF<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:rgba(255,255,255,0.5);line-height:1.5;margin:0\">The gold standard for SMB cybersecurity posture<\/p><\/div><div style=\"background:rgba(255,255,255,0.04);border:1px solid rgba(255,255,255,0.08);border-radius:12px;padding:24px 20px\"><p style=\"font-family:Syne,sans-serif;font-size:17px;font-weight:700;color:#60A5FA;margin:0 0 8px\">Cyber Insurance<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:rgba(255,255,255,0.5);line-height:1.5;margin:0\">EDR and email security required by most carriers \u2014 we provide the documentation<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d6d84f1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d6d84f1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5d027607\" data-id=\"5d027607\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61a6b679 elementor-widget elementor-widget-html\" data-id=\"61a6b679\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<span style=\"font-size:12px;font-weight:600;letter-spacing:.1em;text-transform:uppercase;color:#1A56DB;font-family:DM Sans,sans-serif\">Transparent Pricing<\/span>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-750fae91 elementor-widget elementor-widget-spacer\" data-id=\"750fae91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-332b0aa7 elementor-widget elementor-widget-heading\" data-id=\"332b0aa7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Simple Per-Endpoint Pricing. No Surprises.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4019efd7 elementor-widget elementor-widget-spacer\" data-id=\"4019efd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1be4de28 elementor-widget elementor-widget-html\" data-id=\"1be4de28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<p style=\"color:#5A6E8C;font-size:16px;font-family:DM Sans,sans-serif;font-weight:300;line-height:1.7;margin:0\">Annual subscriptions billed upfront. Mix and match \u2014 or start with just what you need.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b5caee5 elementor-widget elementor-widget-spacer\" data-id=\"5b5caee5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c6f20c8 elementor-widget elementor-widget-html\" data-id=\"6c6f20c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:grid;grid-template-columns:repeat(auto-fit,minmax(230px,1fr));gap:20px\"><div style=\"background:#fff;border:1px solid rgba(26,86,219,0.13);border-radius:16px;padding:32px 28px;height:100%\"><p style=\"font-family:Syne,sans-serif;font-size:11px;font-weight:700;color:#1A56DB;letter-spacing:.1em;text-transform:uppercase;margin:0 0 6px\">Starter<\/p><p style=\"font-family:Syne,sans-serif;font-size:20px;font-weight:700;color:#0D1B35;margin:0 0 12px\">Email Security Only<\/p><p style=\"font-family:Syne,sans-serif;font-size:38px;font-weight:800;color:#0D1B35;line-height:1;margin:0 0 4px\"><span style=\"font-size:18px\">$<\/span>4<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:#5A6E8C;margin:0 0 20px\">per mailbox \/ month \u00b7 billed annually<\/p><hr style=\"border:none;border-top:1px solid #E8F0FE;margin:0 0 18px\"\/><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Anti-phishing & BEC detection<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Attachment sandboxing<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;URL rewriting & click protection<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Spam & malware filtering<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#CBD5E1;margin:0 0 8px\">\u2717 &nbsp;Endpoint detection & response<\/p><a href=\"#contact\" style=\"display:block;text-align:center;padding:12px;border-radius:8px;font-weight:500;font-size:14px;text-decoration:none;border:1.5px solid #1A56DB;color:#1A56DB;font-family:DM Sans,sans-serif;margin-top:20px\">Get Started<\/a><\/div><div style=\"background:#fff;border:1px solid rgba(26,86,219,0.13);border-radius:16px;padding:32px 28px;height:100%\"><p style=\"font-family:Syne,sans-serif;font-size:11px;font-weight:700;color:#1A56DB;letter-spacing:.1em;text-transform:uppercase;margin:0 0 6px\">Essential<\/p><p style=\"font-family:Syne,sans-serif;font-size:20px;font-weight:700;color:#0D1B35;margin:0 0 12px\">Endpoint Defense<\/p><p style=\"font-family:Syne,sans-serif;font-size:38px;font-weight:800;color:#0D1B35;line-height:1;margin:0 0 4px\"><span style=\"font-size:18px\">$<\/span>7<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:#5A6E8C;margin:0 0 20px\">per endpoint \/ month \u00b7 billed annually<\/p><hr style=\"border:none;border-top:1px solid #E8F0FE;margin:0 0 18px\"\/><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Advanced Endpoint Defense (EDR)<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Automated threat response & containment<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Monthly threat summary reports<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;24\/7 platform monitoring<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#CBD5E1;margin:0 0 8px\">\u2717 &nbsp;Email security gateway<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#CBD5E1;margin:0 0 8px\">\u2717 &nbsp;Managed threat hunting<\/p><a href=\"#contact\" style=\"display:block;text-align:center;padding:12px;border-radius:8px;font-weight:500;font-size:14px;text-decoration:none;border:1.5px solid #1A56DB;color:#1A56DB;font-family:DM Sans,sans-serif;margin-top:20px\">Get Started<\/a><\/div><div style=\"background:#0D1B35;border:2px solid #1A56DB;border-radius:16px;padding:32px 28px;height:100%\"><span style=\"display:block;text-align:center;background:#1A56DB;color:white;font-size:10px;font-weight:600;letter-spacing:.06em;text-transform:uppercase;padding:4px 14px;border-radius:100px;width:fit-content;margin:0 auto 14px\">Most Popular<\/span><p style=\"font-family:Syne,sans-serif;font-size:11px;font-weight:700;color:#1A56DB;letter-spacing:.1em;text-transform:uppercase;margin:0 0 6px\">Advanced<\/p><p style=\"font-family:Syne,sans-serif;font-size:20px;font-weight:700;color:white;margin:0 0 12px\">Complete Protection<\/p><p style=\"font-family:Syne,sans-serif;font-size:38px;font-weight:800;color:white;line-height:1;margin:0 0 4px\"><span style=\"font-size:18px\">$<\/span>12<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:#C7D7F5;margin:0 0 20px\">per endpoint \/ month \u00b7 billed annually<\/p><hr style=\"border:none;border-top:1px solid rgba(255,255,255,0.1);margin:0 0 18px\"\/><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#C7D7F5;margin:0 0 8px\">\u2713 &nbsp;Everything in Essential<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#C7D7F5;margin:0 0 8px\">\u2713 &nbsp;Email security & anti-phishing<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#C7D7F5;margin:0 0 8px\">\u2713 &nbsp;Managed threat hunting (weekly)<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#C7D7F5;margin:0 0 8px\">\u2713 &nbsp;Security awareness training<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#C7D7F5;margin:0 0 8px\">\u2713 &nbsp;Compliance reporting (HIPAA\/PCI)<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#C7D7F5;margin:0 0 8px\">\u2713 &nbsp;Dedicated partner success manager<\/p><a href=\"#contact\" style=\"display:block;text-align:center;padding:12px;border-radius:8px;font-weight:500;font-size:14px;text-decoration:none;background:#1A56DB;color:white;font-family:DM Sans,sans-serif;margin-top:20px\">Get Started<\/a><\/div><div style=\"background:#fff;border:1px solid rgba(26,86,219,0.13);border-radius:16px;padding:32px 28px;height:100%\"><p style=\"font-family:Syne,sans-serif;font-size:11px;font-weight:700;color:#1A56DB;letter-spacing:.1em;text-transform:uppercase;margin:0 0 6px\">Enterprise<\/p><p style=\"font-family:Syne,sans-serif;font-size:20px;font-weight:700;color:#0D1B35;margin:0 0 12px\">Custom Program<\/p><p style=\"font-family:Syne,sans-serif;font-size:28px;font-weight:800;color:#0D1B35;line-height:1;margin:0 0 4px\">Custom<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:#5A6E8C;margin:0 0 20px\">volume pricing for 500+ endpoints<\/p><hr style=\"border:none;border-top:1px solid #E8F0FE;margin:0 0 18px\"\/><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Everything in Advanced<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;White-label reporting<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Custom SLA terms<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;SIEM integration available<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Quarterly executive review<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:13px;color:#5A6E8C;margin:0 0 8px\">\u2713 &nbsp;Priority 1-hour P1 SLA<\/p><a href=\"#contact\" style=\"display:block;text-align:center;padding:12px;border-radius:8px;font-weight:500;font-size:14px;text-decoration:none;border:1.5px solid #1A56DB;color:#1A56DB;font-family:DM Sans,sans-serif;margin-top:20px\">Contact Sales<\/a><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cc82211 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc82211\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-14889854\" data-id=\"14889854\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-40a08fc elementor-widget elementor-widget-html\" data-id=\"40a08fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<span style=\"font-size:12px;font-weight:600;letter-spacing:.1em;text-transform:uppercase;color:#1A56DB;font-family:DM Sans,sans-serif\">Client Stories<\/span>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7404d3f3 elementor-widget elementor-widget-spacer\" data-id=\"7404d3f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-102ab989 elementor-widget elementor-widget-heading\" data-id=\"102ab989\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Our Clients Say<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b5b4f61 elementor-widget elementor-widget-spacer\" data-id=\"5b5b4f61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49d84354 elementor-widget elementor-widget-html\" data-id=\"49d84354\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:grid;grid-template-columns:repeat(auto-fit,minmax(270px,1fr));gap:22px\"><div style=\"background:#F4F6FB;border-radius:14px;padding:30px 26px;border:1px solid rgba(26,86,219,0.1)\"><p style=\"font-family:Syne,sans-serif;font-size:24px;color:#1A56DB;margin:0 0 12px\">&ldquo;<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:14px;color:#5A6E8C;line-height:1.7;font-weight:300;margin:0 0 18px\">Perimetra stopped a ransomware attack on a Friday afternoon before anyone on our team even knew it was happening. The automated report showed exactly what occurred. That alone paid for years of service.<\/p><div style=\"display:flex;align-items:center;gap:10px\"><div style=\"width:36px;height:36px;border-radius:50%;background:#0D1B35;display:flex;align-items:center;justify-content:center;font-size:11px;font-weight:600;color:white;flex-shrink:0\">DM<\/div><div><p style=\"font-family:DM Sans,sans-serif;font-size:13px;font-weight:500;color:#0D1B35;margin:0\">David M.<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:#8FA3C8;margin:0\">Managing Partner, Regional Law Firm<\/p><\/div><\/div><\/div><div style=\"background:#F4F6FB;border-radius:14px;padding:30px 26px;border:1px solid rgba(26,86,219,0.1)\"><p style=\"font-family:Syne,sans-serif;font-size:24px;color:#1A56DB;margin:0 0 12px\">&ldquo;<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:14px;color:#5A6E8C;line-height:1.7;font-weight:300;margin:0 0 18px\">We switched from basic AV and within the first week Perimetra caught three credential phishing attempts targeting our billing team. Our cyber insurer reduced our premium after seeing the EDR coverage.<\/p><div style=\"display:flex;align-items:center;gap:10px\"><div style=\"width:36px;height:36px;border-radius:50%;background:#0D1B35;display:flex;align-items:center;justify-content:center;font-size:11px;font-weight:600;color:white;flex-shrink:0\">SC<\/div><div><p style=\"font-family:DM Sans,sans-serif;font-size:13px;font-weight:500;color:#0D1B35;margin:0\">Sandra C.<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:#8FA3C8;margin:0\">Practice Manager, Dental Group (14 locations)<\/p><\/div><\/div><\/div><div style=\"background:#F4F6FB;border-radius:14px;padding:30px 26px;border:1px solid rgba(26,86,219,0.1)\"><p style=\"font-family:Syne,sans-serif;font-size:24px;color:#1A56DB;margin:0 0 12px\">&ldquo;<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:14px;color:#5A6E8C;line-height:1.7;font-weight:300;margin:0 0 18px\">The email security gateway alone was worth it. BEC attempts were coming in weekly targeting our finance team. Now they never see them. Setup took less than two hours.<\/p><div style=\"display:flex;align-items:center;gap:10px\"><div style=\"width:36px;height:36px;border-radius:50%;background:#0D1B35;display:flex;align-items:center;justify-content:center;font-size:11px;font-weight:600;color:white;flex-shrink:0\">TR<\/div><div><p style=\"font-family:DM Sans,sans-serif;font-size:13px;font-weight:500;color:#0D1B35;margin:0\">Thomas R.<\/p><p style=\"font-family:DM Sans,sans-serif;font-size:12px;color:#8FA3C8;margin:0\">CFO, Accounting Firm (80 staff)<\/p><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3034d2d8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3034d2d8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-16eb7b35\" data-id=\"16eb7b35\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f410038 elementor-widget elementor-widget-heading\" data-id=\"7f410038\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ready to Protect Your Business?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41b1ed2 elementor-widget elementor-widget-spacer\" data-id=\"41b1ed2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5eb8973e elementor-widget elementor-widget-html\" data-id=\"5eb8973e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<p style=\"color:#8FA3C8;font-size:17px;font-family:DM Sans,sans-serif;font-weight:300;line-height:1.7;text-align:center\">Get a free security assessment and custom quote \u2014 no commitment required.<br>Most clients are protected within 48 hours of signing.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c094d8a elementor-widget elementor-widget-spacer\" data-id=\"6c094d8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58cc1d60 elementor-widget elementor-widget-html\" data-id=\"58cc1d60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"display:flex;justify-content:center;gap:14px;flex-wrap:wrap\"><a href=\"mailto:sales@perimetra.com\" style=\"display:inline-flex;align-items:center;gap:8px;background:#1A56DB;color:white;padding:14px 26px;border-radius:8px;font-weight:500;font-size:15px;text-decoration:none;font-family:DM Sans,sans-serif\">Email Us for a Quote<\/a><a href=\"tel:+18005550100\" style=\"display:inline-flex;align-items:center;gap:8px;color:rgba(255,255,255,0.75);padding:14px 22px;border-radius:8px;font-size:15px;text-decoration:none;border:1px solid rgba(255,255,255,0.15);font-family:DM Sans,sans-serif\">1-800-555-0100<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Active Threat Protection \u2014 24\/7 Monitoring Stop Threats Before TheyBecome Breaches Enterprise-grade endpoint detection and email security \u2014 built for small and mid-size businesses. Managed by experts, priced for reality. Start Free AssessmentView Services \u2192 99.9% Platform Uptime SLA<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-36","page","type-page","status-publish","hentry"],"brizy_media":[],"_links":{"self":[{"href":"https:\/\/perimetra.security\/index.php?rest_route=\/wp\/v2\/pages\/36","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perimetra.security\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/perimetra.security\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/perimetra.security\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/perimetra.security\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=36"}],"version-history":[{"count":5,"href":"https:\/\/perimetra.security\/index.php?rest_route=\/wp\/v2\/pages\/36\/revisions"}],"predecessor-version":[{"id":44,"href":"https:\/\/perimetra.security\/index.php?rest_route=\/wp\/v2\/pages\/36\/revisions\/44"}],"wp:attachment":[{"href":"https:\/\/perimetra.security\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=36"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}