Feature Boxes

[vc_row][vc_column][volcanno_heading heading_style=”custom-heading-02″ title=”Feature Boxes Boxed Style” subtitle=”FEATURE BOXES”][vc_row_inner][vc_column_inner width=”1/3″][volcanno_feature_box icon_type=”icon_lynny” icon_lynny=”lynny-user-group-2″ title=”Professional IT Security Consulting” text=”We can help you enhance your IT security efficiency and increase your business value.” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Fservices-subcategory%2F|||” align=”centered” icon_openiconic=”vc-oi vc-oi-play-circle2″][/vc_column_inner][vc_column_inner width=”1/3″][volcanno_feature_box icon_type=”icon_lynny” icon_lynny=”lynny-lightning” title=”Vulnerability & Threat Management” text=”Intelligent threat and vulnerability services including penetration testing and software security.” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Fservices-single%2F|||” align=”centered”][/vc_column_inner][vc_column_inner width=”1/3″][volcanno_feature_box icon_type=”icon_lynny” icon_lynny=”lynny-server-connections” title=”Architecture & Implementation” text=”Building strong foundations for IT security implementation, management and control.” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Fservices-architecture-implementation%2F|||” align=”centered”][/vc_column_inner][/vc_row_inner][volcanno_divider divider_style=”divider”][/vc_column][/vc_row][vc_row][vc_column][volcanno_heading heading_style=”custom-heading-02″ title=”Feature Box With Image” subtitle=”FEATURE BOXES”][vc_row_inner][vc_column_inner width=”1/3″][volcanno_feature_box style=”image” image=”2577″ icon_type=”icon_lynny” icon_lynny=”lynny-user-group-2″ title=”Professional IT Security Consulting” text=”We can help you enhance your IT security efficiency and increase your business value.” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Fservices-subcategory%2F|||” align=”centered”][/vc_column_inner][vc_column_inner width=”1/3″][volcanno_feature_box style=”image” image=”2590″ icon_type=”icon_lynny” icon_lynny=”lynny-lightning” title=”Vulnerability & Threat Management” text=”Intelligent threat and vulnerability services including penetration testing and software security.
” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Fservices-single%2F|||” align=”centered”][/vc_column_inner][vc_column_inner width=”1/3″][volcanno_feature_box style=”image” image=”2596″ icon_type=”icon_lynny” icon_lynny=”lynny-server-connections” title=”Architecture & Implementation” text=”Building strong foundations for IT security implementation, management and control.” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Fservices-architecture-implementation%2F|||” align=”centered”][/vc_column_inner][/vc_row_inner][volcanno_divider divider_style=”divider”][/vc_column][/vc_row][vc_row][vc_column][volcanno_heading heading_style=”custom-heading-02″ title=”Feature Box With Icons” subtitle=”FEATURE BOXES”][vc_row_inner][vc_column_inner width=”1/2″][volcanno_feature_box style=”list” icon_type=”icon_lynny” icon_lynny=”lynny-user-group-2″ title=”Professional IT Security Consulting” text=”We can help you enhance your IT security efficiency and increase your business value.” list=”%5B%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Vulnerability%20and%20Threat%20Management%22%7D%2C%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Security%20Risk%20and%20Compliance%5Cn%22%7D%2C%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Education%20and%20Security%20Awareness%22%7D%5D” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Fservices-subcategory%2F|||” align=”centered”][/vc_column_inner][vc_column_inner width=”1/2″][volcanno_feature_box style=”list” icon_type=”icon_lynny” icon_lynny=”lynny-lightning” title=”Vulnerability & Threat Management” text=”Intelligent threat and vulnerability services including penetration testing and software security.” list=”%5B%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Penetration%20Testing%22%7D%2C%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Software%20Security%22%7D%2C%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Threat%20Discovery%22%7D%5D” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Fservices-single%2F|||” align=”centered”][/vc_column_inner][/vc_row_inner][volcanno_divider divider_style=”divider”][/vc_column][/vc_row][vc_row][vc_column][volcanno_heading heading_style=”custom-heading-02″ title=”Feature Box With Small Icons” subtitle=”FEATURE BOXES”][vc_row_inner][vc_column_inner width=”1/4″][volcanno_feature_box style=”icons-sm” icon_type=”icon_lynny” icon_lynny=”lynny-currency-euro” title=”Currencies” text=”Get professional guidance for trading USD/EUR and other currency pairs.” href=”|||” align=”centered”][/vc_column_inner][vc_column_inner width=”1/4″][volcanno_feature_box style=”icons-sm” icon_type=”icon_lynny” icon_lynny=”lynny-diamond” title=”Commodities” text=”We’ll guide you to smart selection of commodities to invest, like gold.” href=”|||” align=”centered”][/vc_column_inner][vc_column_inner width=”1/4″][volcanno_feature_box style=”icons-sm” icon_type=”icon_fontawesome” icon_fontawesome=”fa fa-line-chart” title=”Stocks” text=”Smart analysis of stock market movement and selection of most profitable stocks.” href=”|||” align=”centered”][/vc_column_inner][vc_column_inner width=”1/4″][volcanno_feature_box style=”icons-sm” icon_type=”icon_lynny” icon_lynny=”lynny-line-chart” title=”Indices” text=”We’ll guide you to investing in most profitable indices like Nasdaq.” href=”|||” align=”centered”][/vc_column_inner][/vc_row_inner][volcanno_divider divider_style=”divider”][/vc_column][/vc_row][vc_row][vc_column][volcanno_heading heading_style=”custom-heading-02″ title=”Feature Box With Circled Icons” subtitle=”FEATURE BOXES”][vc_row_inner][vc_column_inner width=”1/3″][volcanno_feature_box style=”service-box-02″ icon_type=”icon_lynny” icon_lynny=”lynny-user-group-2″ title=”Professional IT Security Consulting” text=”We can help you enhance your IT security efficiency and increase your business value.” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Ffeature-boxes%2F|||” align=”centered”][/vc_column_inner][vc_column_inner width=”1/3″][volcanno_feature_box style=”service-box-02″ icon_type=”icon_lynny” icon_lynny=”lynny-lightning” title=”Vulnerability & Threat Management” text=”Intelligent threat and vulnerability services including penetration testing and software security.” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Ffeature-boxes%2F|||” align=”centered”][/vc_column_inner][vc_column_inner width=”1/3″][volcanno_feature_box style=”service-box-02″ icon_type=”icon_lynny” icon_lynny=”lynny-server-connections” title=”Architecture & Implementation” text=”Building strong foundations for IT security implementation, management and control.” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Ffeature-boxes%2F|||” align=”centered”][/vc_column_inner][/vc_row_inner][volcanno_divider divider_style=”divider”][/vc_column][/vc_row][vc_row][vc_column][volcanno_heading heading_style=”custom-heading-02″ title=”Feature Box Boxed & Shadow Style” subtitle=”FEATURE BOXES”][vc_row_inner][vc_column_inner width=”1/3″][volcanno_feature_box style=”service-box-03″ icon_type=”icon_lynny” icon_lynny=”lynny-user-group-2″ title=”Professional IT Security Consulting” text=”We can help you enhance your IT security efficiency and increase your business value.” href=”|||” align=”centered”][/vc_column_inner][vc_column_inner width=”1/3″][volcanno_feature_box style=”service-box-03″ icon_type=”icon_lynny” icon_lynny=”lynny-lightning” title=”Vulnerability & Threat Management” text=”Intelligent threat and vulnerability services including penetration testing and software security.” href=”|||” align=”centered”][/vc_column_inner][vc_column_inner width=”1/3″][volcanno_feature_box style=”service-box-03″ icon_type=”icon_lynny” icon_lynny=”lynny-server-connections” title=”Architecture & Implementation” text=”Building strong foundations for IT security implementation, management and control.” href=”|||” align=”centered”][/vc_column_inner][/vc_row_inner][volcanno_divider divider_style=”divider”][/vc_column][/vc_row][vc_row][vc_column][volcanno_heading heading_style=”custom-heading-02″ title=”Feature Boxes – Custom Pages Links” subtitle=”LINK ONE BOX TO ANY OF YOUR INNER PAGES.”][vc_row_inner][vc_column_inner width=”1/3″][volcanno_feature_box style=”cp-links” image=”1220″ icon_type=”icon_lynny” icon_lynny=”lynny-currency-euro” icon_color=”#dd3333″ title=”ConsultingPress – Leading Finance Consulting company” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Fabout-us%2F|||” align=”centered”][/vc_column_inner][vc_column_inner width=”1/3″][volcanno_feature_box style=”cp-links” image=”1224″ icon_type=”icon_lynny” icon_lynny=”lynny-currency-euro” icon_color=”#dd3333″ title=”Increasing your business productivity using our expertise” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Fservices-image-grid%2F|||” align=”centered”][/vc_column_inner][vc_column_inner width=”1/3″][volcanno_feature_box style=”cp-links” image=”1228″ icon_type=”icon_lynny” icon_lynny=”lynny-currency-euro” icon_color=”#dd3333″ title=”Over 20 years of experience and 250 case studies conducted” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Fcases-list%2F|||” align=”centered”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]