Services icons grid

[vc_row][vc_column width=”1/2″][volcanno_feature_box style=”list” icon_type=”icon_lynny” icon_lynny=”lynny-user-group-2″ title=”Professional IT Security Consulting” text=”We can help you enhance your IT security efficiency and increase your business value.” list=”%5B%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Vulnerability%20and%20Threat%20Management%22%7D%2C%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Security%20Risk%20and%20Compliance%22%7D%2C%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Education%20and%20Security%20Awareness%22%7D%5D” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Fservices-subcategory%2F|||”][/vc_column][vc_column width=”1/2″][volcanno_feature_box style=”list” icon_type=”icon_lynny” icon_lynny=”lynny-lightning” title=”Vulnerability & Threat Management” text=”Intelligent threat and vulnerability services including penetration testing and software security.” list=”%5B%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Penetration%20Testing%22%7D%2C%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Software%20Security%22%7D%2C%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Threat%20Discovery%22%7D%5D” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Fservices-single%2F|||”][/vc_column][/vc_row][vc_row][vc_column width=”1/2″][volcanno_feature_box style=”list” icon_type=”icon_lynny” icon_lynny=”lynny-server-connections” title=”Architecture & Implementation” text=”Building strong foundations for IT security implementation, management and control.” list=”%5B%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Company%20architecture%22%7D%2C%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Cloud%20Security%22%7D%2C%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Data%20Security%22%7D%5D” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Fservices-architecture-implementation%2F|||”][/vc_column][vc_column width=”1/2″][volcanno_feature_box style=”list” icon_type=”icon_lynny” icon_lynny=”lynny-page-1″ title=”Security Risk & Compliance” text=”Providing guidance in detecting risks and developing compliance strategies.” list=”%5B%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Risk%20Management%22%7D%2C%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Compliance%22%7D%5D” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Fsecurity-risk-and-compliance%2F|||”][/vc_column][/vc_row][vc_row][vc_column width=”1/2″][volcanno_feature_box style=”list” icon_type=”icon_lynny” icon_lynny=”lynny-shield” title=”Security Incident Management” text=”Providing detailed procedures for dealing and mitigating security incidents.” list=”%5B%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Incident%20Response%20Strategy%22%7D%2C%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Incident%20Recovery%20Strategy%22%7D%2C%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22Security%20Incident%20Management%22%7D%5D” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Fsecurity-incident-management%2F|||”][/vc_column][vc_column width=”1/2″][volcanno_feature_box style=”list” icon_type=”icon_lynny” icon_lynny=”lynny-building-2″ title=”Education & Security Awareness” text=”Improving security by educating employees and partners about the value of IT security.” list=”%5B%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22IT%20Security%20Education%22%7D%2C%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22IT%20Security%20Training%22%7D%2C%7B%22icon_type%22%3A%22icon_fontawesome%22%2C%22icon_fontawesome%22%3A%22fa%20fa-arrow-right%22%2C%22icon_lynny%22%3A%22lynny-boat%22%2C%22text%22%3A%22IT%20Security%20Learning%20System%22%7D%5D” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Feducation-security-awareness%2F|||”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1481207726856{margin-bottom: 0px !important;background-color: #09142d !important;}”][vc_column][volcanno_call_to_action cta_text=”Securing your most valuable business assets with smaller costs.” cta_text_color=”#ffffff” text=”request a quick quote” href=”url:http%3A%2F%2Fdemo.pixel-industry.com%2Fconsultingpress%2Fhome-it-security%2Fservices-image-grid-2%2F|||” icon=”true” icon_type=”icon_lynny” icon_lynny=”lynny-page-1″][/vc_column][/vc_row]