{"id":3301,"date":"2024-11-16T08:38:38","date_gmt":"2024-11-16T08:38:38","guid":{"rendered":"https:\/\/greenmethod.net\/dev\/?page_id=3301"},"modified":"2024-12-07T16:55:42","modified_gmt":"2024-12-07T16:55:42","slug":"expert-led-endpoint-protection-services","status":"publish","type":"page","link":"https:\/\/greenmethod.net\/dev\/expert-led-endpoint-protection-services\/","title":{"rendered":"Expert-Led Endpoint Protection Services"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3301\" class=\"elementor elementor-3301\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b1704ae e-flex e-con-boxed e-con e-parent\" data-id=\"b1704ae\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56e99fb elementor-widget elementor-widget-heading\" data-id=\"56e99fb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Expert-Led Endpoint Protection Services<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2df9a2 elementor-widget elementor-widget-heading\" data-id=\"f2df9a2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Secure Your Digital World with Green Method Technologies Access Management<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c5afaeb section-relative e-con-full e-flex e-con e-parent\" data-id=\"c5afaeb\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-20c0a91 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"20c0a91\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"597\" height=\"1024\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/glass-effect-597x1024.png\" class=\"attachment-large size-large wp-image-1869\" alt=\"glass-effect\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/glass-effect-597x1024.png 597w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/glass-effect-175x300.png 175w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/glass-effect-768x1318.png 768w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/glass-effect.png 795w\" sizes=\"(max-width: 597px) 100vw, 597px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbcb8e7 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"dbcb8e7\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"481\" height=\"1024\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/right-glass-481x1024.png\" class=\"attachment-large size-large wp-image-1946\" alt=\"right-glass\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/right-glass-481x1024.png 481w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/right-glass-141x300.png 141w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/right-glass-768x1635.png 768w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/right-glass-722x1536.png 722w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/right-glass.png 877w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d692585 section-relative e-flex e-con-boxed e-con e-parent\" data-id=\"d692585\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5cd4b44 e-con-full e-flex e-con e-child\" data-id=\"5cd4b44\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3a30816 e-grid e-con-full e-con e-child\" data-id=\"3a30816\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1d4462f e-con-full e-flex e-con e-child\" data-id=\"1d4462f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3fc0ba3 elementor-widget elementor-widget-heading\" data-id=\"3fc0ba3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Explore Endpoint Protection Services<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6de9129 elementor-widget elementor-widget-text-editor\" data-id=\"6de9129\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>In the pulsing heart of Dubai, where innovation meets tradition, Green Method Technologies stands as a guardian of the digital realm. Imagine a world where every click, every swipe, and every download is a potential doorway for threats lurking in the shadows. That\u2019s the reality of today\u2019s digital landscape. Our Endpoint Security services are a testament to this belief, blending advanced threat detection and prevention capabilities with the deep-seated expertise of our cybersecurity professionals to ensure your endpoints are impenetrable fortresses of data protection.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2db31af elementor-widget elementor-widget-image\" data-id=\"2db31af\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"444\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Endpoint-Protection-.png\" class=\"attachment-large size-large wp-image-5852\" alt=\"Endpoint-Protection\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Endpoint-Protection-.png 703w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Endpoint-Protection--300x208.png 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1b831ab e-con-full e-flex e-con e-child\" data-id=\"1b831ab\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-2cb5843 e-grid e-con-full e-con e-child\" data-id=\"2cb5843\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6e799cb e-con-full e-flex e-con e-child\" data-id=\"6e799cb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5788322 elementor-widget elementor-widget-image\" data-id=\"5788322\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"457\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/endpoint.png\" class=\"attachment-full size-full wp-image-5856\" alt=\"\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/endpoint.png 480w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/endpoint-300x286.png 300w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc067b0 e-con-full e-flex e-con e-child\" data-id=\"bc067b0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-47ad835 elementor-widget elementor-widget-heading\" data-id=\"47ad835\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What are the benefits of endpoint security solutions?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-823966f elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"823966f\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Comprehensive Threat Protection:<\/b> Endpoint security provides robust protection against a wide array of cyber threats, including malware, ransomware, phishing attacks, and advanced persistent threats (APTs).<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Improved Network Performance:<\/b> Effective endpoint security can also enhance the overall performance of a network by identifying and isolating infected or compromised devices, preventing them from causing widespread issues.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Operational Continuity:<\/b> By preventing attacks and quickly mitigating those that occur, endpoint security ensures that business operations can continue without significant disruption, maintaining productivity and minimizing downtime.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Scalability:<\/b> Modern endpoint security solutions are designed to be scalable, allowing organizations to easily add protection for new devices as they grow. This scalability ensures that security measures remain effective regardless of the size of the organization.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-578b8f1 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"578b8f1\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Centralized Management:<\/b> Endpoint security often includes centralized management features, allowing IT teams to monitor and manage security across all devices from a single platform.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Cost Savings:<\/b> By preventing cyber attacks and their costly consequences, endpoint security can result in significant cost savings, such as legal fees, fines, and reputational damage.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>User Education and Awareness:<\/b> Many endpoint security solutions include training and awareness programs for users, helping to reduce the risk of security breaches caused by human error.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Flexibility and Remote Work Support:<\/b> With the rise of remote work, endpoint security provides the necessary flexibility to secure devices outside the traditional office environment, ensuring that employees can work safely from any location.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6236955 e-flex e-con-boxed e-con e-parent\" data-id=\"6236955\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-69a2ae5 e-con-full e-flex e-con e-child\" data-id=\"69a2ae5\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a07a9f5 e-con-full e-flex e-con e-child\" data-id=\"a07a9f5\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e006a85 e-con-full e-flex e-con e-child\" data-id=\"e006a85\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-015b5e8 e-con-full e-flex e-con e-child\" data-id=\"015b5e8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d336866 elementor-widget elementor-widget-heading\" data-id=\"d336866\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Endpoint security consulting to secure digital assets without extensive in-house infrastructure<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a14519 elementor-widget elementor-widget-text-editor\" data-id=\"1a14519\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tAt Green Method Technologies, we offer centralized, cloud-based endpoint security management allows for the seamless deployment, monitoring, and management of endpoint security policies across all devices, regardless of their location. This facilitates easy scalability and real-time updates.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dcd464f e-con-full e-flex e-con e-child\" data-id=\"dcd464f\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-86c9ba5 e-con-full e-flex e-con e-child\" data-id=\"86c9ba5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c9715d2 elementor-widget elementor-widget-image\" data-id=\"c9715d2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"457\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/digital-assets.png\" class=\"attachment-full size-full wp-image-5858\" alt=\"digital-assets\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/digital-assets.png 480w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/digital-assets-300x286.png 300w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7646be3 section-relative e-flex e-con-boxed e-con e-parent\" data-id=\"7646be3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-15388f6 e-con-full e-flex e-con e-child\" data-id=\"15388f6\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-983d9df e-con-full e-flex e-con e-child\" data-id=\"983d9df\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9bfa522 elementor-widget elementor-widget-text-editor\" data-id=\"9bfa522\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tEndpoint Security Services for\u00a0computer networks\u00a0protection\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-639318c elementor-widget elementor-widget-heading\" data-id=\"639318c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect end-user devices from malicious threats &amp; cyberattacks<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7df017b defensive-system-sec elementor-hidden-desktop elementor-widget elementor-widget-ucaddon_card_carousel\" data-id=\"7df017b\" data-element_type=\"widget\" data-widget_type=\"ucaddon_card_carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n<!-- start Card Carousel -->\n\t\t<link id='font-awesome-css' href='https:\/\/greenmethod.net\/dev\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-all.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='font-awesome-4-shim-css' href='https:\/\/greenmethod.net\/dev\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-v4-shims.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='owl-carousel-css' href='https:\/\/greenmethod.net\/dev\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/owl-carousel-new\/assets\/owl.carousel.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='uc_ac_assets_file_animate_css_77907-css' href='https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/ac_assets\/uc_classic_carousel\/animate.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Card Carousel *\/\n\n#uc_card_carousel_elementor_7df017b-wrapper{\n  min-height:1px;\n}\n\n#uc_card_carousel_elementor_7df017b *{\n\t-webkit-box-sizing: border-box;\n\t-moz-box-sizing: border-box;\n\tbox-sizing: border-box;\n}\n\n#uc_card_carousel_elementor_7df017b .ue-carousel-item{\n  overflow:hidden;\n  transition:0.3s;\n}\n\n#uc_card_carousel_elementor_7df017b .uc_classic_carousel_container_holder{\n\tdisplay:block;\n\tposition:relative;\n\twidth:100%;\n    box-sizing: border-box;\n}\n#uc_card_carousel_elementor_7df017b .uc_classic_carousel_placeholder{\n   position:relative;\n}\n\n\n#uc_card_carousel_elementor_7df017b .uc_classic_carousel_placeholder img, #uc_card_carousel_elementor_7df017b .ue_card_carousel_image_overlay{\n  transition: all 300ms;\n}\n\n.card_carousel_title{\n\tfont-size:21px;\n}\n\n.uc_classic_carousel .uc_classic_carousel_border{\n\tdisplay:block;\n    margin:0 auto;\n}\n\n.uc_classic_carousel  .uc_classic_carousel_placeholder img{\n\twidth:100%;    \n    display:block;\n}\n\n.uc_classic_carousel .uc_classic_carousel_content{\n  display: flex;\n  flex-flow: column nowrap;\n}\n\n.uc_classic_carousel .ue_button{\n  margin-top:auto;\n}\n\n.uc_classic_carousel .uc_classic_carousel_content .uc_more_btn {\n\tdisplay:inline-block;\n\ttext-decoration:none;\n\ttransition: all 0.5s ease;\n}\n\n#uc_card_carousel_elementor_7df017b .owl-dots {\n  overflow:hidden;\n  text-align:center;\n}\n\n#uc_card_carousel_elementor_7df017b .owl-dot {\n  border-radius:50%;\n  display:inline-block;\n}\n\n#uc_card_carousel_elementor_7df017b .owl-nav .owl-prev,\n#uc_card_carousel_elementor_7df017b .owl-nav .owl-next{\n    position:absolute;\n    display:flex;\n  \tjustify-content: center;\n  \talign-items: center;\n    text-align:center;\n}\n\n#uc_card_carousel_elementor_7df017b .owl-nav .disabled{\n    display: none;  \n}\n\n\n#uc_card_carousel_elementor_7df017b .ue-item-icon{\n  line-height:1em;\n  display:inline-flex;\n  justify-content:center;\n  align-items:center;  \n}\n\n#uc_card_carousel_elementor_7df017b .ue-item-icon svg{\n  height:1em;\n  width:1em;\n}\n\n#uc_card_carousel_elementor_7df017b .ue-item-icon-wrapper{\n  display:flex;\n}\n\n#uc_card_carousel_elementor_7df017b .uc_classic_carousel_container_holder {\n\t max-width: ;\n}\n\n\n\n@media screen and (max-width: 1024px) {\n  #uc_card_carousel_elementor_7df017b .uc_classic_carousel_container_holder {\n\t max-width: ;\n  }\n}\n\n@media screen and (max-width: 767px) {\n  #uc_card_carousel_elementor_7df017b .uc_classic_carousel_container_holder {\n    max-width: ;\n  }\n}\n\n<\/style>\n\n<div class=\"uc_classic_carousel\" id=\"uc_card_carousel_elementor_7df017b-wrapper\">\n        <div class=\"uc_carousel owl-carousel uc-items-wrapper  \" id=\"uc_card_carousel_elementor_7df017b\"  >\n          \t\n\n\n<div id=\"uc_card_carousel_elementor_7df017b_item1\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-adab4a8\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">Antivirus and Anti-malware Protection<\/div>\n        <div class=\"card_carousel_text\">This foundational layer uses signatures, heuristics, and behavior analysis to detect and remove malicious software. By continuously scanning endpoints for known threats and suspicious behaviors, it prevents malware infections that can lead to more severe attacks.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n\n\n<div id=\"uc_card_carousel_elementor_7df017b_item2\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-dc29706\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">Firewall Protection<\/div>\n        <div class=\"card_carousel_text\">Firewalls act as a barrier between secured internal networks and unsecured external networks, such as the internet. They monitor and control incoming and outgoing network traffic based on predetermined security rules, blocking unauthorized access and preventing data exfiltration.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n\n\n<div id=\"uc_card_carousel_elementor_7df017b_item3\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-31bfcc8\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">Intrusion Detection and Prevention Systems (IDPS)<\/div>\n        <div class=\"card_carousel_text\">These systems monitor network traffic to detect potential threats like unauthorized entries and malicious activities. Once a threat is detected, the prevention mechanisms are activated to block the attack and mitigate its impact.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n\n\n<div id=\"uc_card_carousel_elementor_7df017b_item4\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-815a0cd\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">Endpoint Detection and Response (EDR)<\/div>\n        <div class=\"card_carousel_text\">EDR tools provide advanced threat detection by continuously monitoring endpoints for unusual activities. They collect and analyze data to identify patterns indicative of cyber threats, enabling rapid response and remediation actions to contain and eliminate threats.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n\n\n<div id=\"uc_card_carousel_elementor_7df017b_item5\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-a2c2299\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">Data Loss Prevention (DLP)<\/div>\n        <div class=\"card_carousel_text\">DLP technologies identify, monitor, and protect data in use, data in motion on the network, and data at rest on endpoints. By enforcing policies for data transfers and access, DLP prevents the accidental or malicious exfiltration of sensitive information.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n\n\n<div id=\"uc_card_carousel_elementor_7df017b_item6\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-69c92ed\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">Encryption<\/div>\n        <div class=\"card_carousel_text\">Encrypting data stored on endpoints ensures that, even if the device is compromised, the data remains inaccessible to unauthorized users. This is particularly important for protecting sensitive information on mobile devices that can be easily lost or stolen.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n      <\/div>\n<\/div>\n<!-- end Card Carousel -->\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-523eb55 e-grid e-con-full vinerbility-sec elementor-hidden-tablet elementor-hidden-mobile e-con e-child\" data-id=\"523eb55\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a01c232 e-con-full card-box e-flex e-con e-child\" data-id=\"a01c232\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4081ed6 vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"4081ed6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Antivirus and Anti-malware Protection<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e8a11d vinerbility-sec-text elementor-widget elementor-widget-text-editor\" data-id=\"0e8a11d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>This foundational layer uses signatures, heuristics, and behavior analysis to detect and remove malicious software. By continuously scanning endpoints for known threats and suspicious behaviors, it prevents malware infections that can lead to more severe attacks.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9f1ddba e-con-full card-box e-flex e-con e-child\" data-id=\"9f1ddba\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cee472b vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"cee472b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Firewall Protection<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd780b5 vinerbility-sec-text elementor-widget elementor-widget-text-editor\" data-id=\"fd780b5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Firewalls act as a barrier between secured internal networks and unsecured external networks, such as the internet. They monitor and control incoming and outgoing network traffic based on predetermined security rules, blocking unauthorized access and preventing data exfiltration.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0f3f5e7 e-con-full card-box e-flex e-con e-child\" data-id=\"0f3f5e7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-64f4332 vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"64f4332\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Intrusion Detection and Prevention Systems (IDPS)<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba3dd5a vinerbility-sec-text elementor-widget elementor-widget-text-editor\" data-id=\"ba3dd5a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tThese systems monitor network traffic to detect potential threats like unauthorized entries and malicious activities. Once a threat is detected, the prevention mechanisms are activated to block the attack and mitigate its impact.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ed92106 e-grid e-con-full vinerbility-sec elementor-hidden-tablet elementor-hidden-mobile e-con e-child\" data-id=\"ed92106\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2882b2f e-con-full card-box e-flex e-con e-child\" data-id=\"2882b2f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-08f4d59 vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"08f4d59\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Endpoint Detection and Response (EDR)<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee7af39 vinerbility-sec-text elementor-widget elementor-widget-text-editor\" data-id=\"ee7af39\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tEDR tools provide advanced threat detection by continuously monitoring endpoints for unusual activities. They collect and analyze data to identify patterns indicative of cyber threats, enabling rapid response and remediation actions to contain and eliminate threats.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aead049 e-con-full card-box e-flex e-con e-child\" data-id=\"aead049\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b9e2f1f vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"b9e2f1f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Loss Prevention (DLP)<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2736d6 vinerbility-sec-text elementor-widget elementor-widget-text-editor\" data-id=\"a2736d6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>DLP technologies identify, monitor, and protect data in use, data in motion on the network, and data at rest on endpoints. By enforcing policies for data transfers and access, DLP prevents the accidental or malicious exfiltration of sensitive information.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e62797f e-con-full card-box e-flex e-con e-child\" data-id=\"e62797f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a5f71fc vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"a5f71fc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Encryption<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-827cb58 vinerbility-sec-text elementor-widget elementor-widget-text-editor\" data-id=\"827cb58\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tEncrypting data stored on endpoints ensures that, even if the device is compromised, the data remains inaccessible to unauthorized users. This is particularly important for protecting sensitive information on mobile devices that can be easily lost or stolen.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a819fc5 e-flex e-con-boxed e-con e-parent\" data-id=\"a819fc5\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a3a2166 e-con-full e-flex e-con e-child\" data-id=\"a3a2166\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d917c3a e-con-full e-flex e-con e-child\" data-id=\"d917c3a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-60c1e43 elementor-widget elementor-widget-heading\" data-id=\"60c1e43\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Manage and Secure Your Endpoints from a Central Location<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48f10ad elementor-widget elementor-widget-text-editor\" data-id=\"48f10ad\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tEnforce security policies for attack surface reduction, and attack prevention\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b1c0ef2 e-con-full e-flex e-con e-child\" data-id=\"b1c0ef2\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0362a3f e-con-full e-flex e-con e-child\" data-id=\"0362a3f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a4c2202 elementor-align-right elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"a4c2202\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d5827ff section-relative e-flex e-con-boxed e-con e-parent\" data-id=\"d5827ff\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-07dad0d e-con-full e-flex e-con e-child\" data-id=\"07dad0d\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-bcd3e8d e-grid e-con-full e-con e-child\" data-id=\"bcd3e8d\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d5d354d e-con-full e-flex e-con e-child\" data-id=\"d5d354d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d6750e elementor-widget elementor-widget-image\" data-id=\"1d6750e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"535\" height=\"457\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/endpoint-security.png\" class=\"attachment-large size-large wp-image-5864\" alt=\"endpoint-security.png\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/endpoint-security.png 535w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/endpoint-security-300x256.png 300w\" sizes=\"(max-width: 535px) 100vw, 535px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6210b95 e-con-full e-flex e-con e-child\" data-id=\"6210b95\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8870c7e elementor-widget elementor-widget-heading\" data-id=\"8870c7e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The advantage of Green Method Endpoint security as a service<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fbd841 elementor-widget elementor-widget-text-editor\" data-id=\"6fbd841\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tGreen Method technologies Endpoint Security as a Service (ESaaS) provides a comprehensive, cloud-based approach to securing organizational endpoints, integrating various components to protect against cyber threats effectively. These components work together within the ESaaS framework to provide robust, scalable, and flexible endpoint security, allowing organizations to protect their digital assets effectively without the need for extensive in-house security infrastructure.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d6b22b7 section-relative-sec e-flex e-con-boxed e-con e-parent\" data-id=\"d6b22b7\" data-element_type=\"container\" id=\"expert-led-sec\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1efc183 e-con-full e-flex e-con e-child\" data-id=\"1efc183\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-78e97d6 e-con-full e-flex e-con e-child\" data-id=\"78e97d6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f204ac9 defensive-system-sec elementor-hidden-desktop elementor-widget elementor-widget-ucaddon_card_carousel\" data-id=\"f204ac9\" data-element_type=\"widget\" data-widget_type=\"ucaddon_card_carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n<!-- start Card Carousel -->\n\n<style>\/* widget: Card Carousel *\/\n\n#uc_card_carousel_elementor_f204ac9-wrapper{\n  min-height:1px;\n}\n\n#uc_card_carousel_elementor_f204ac9 *{\n\t-webkit-box-sizing: border-box;\n\t-moz-box-sizing: border-box;\n\tbox-sizing: border-box;\n}\n\n#uc_card_carousel_elementor_f204ac9 .ue-carousel-item{\n  overflow:hidden;\n  transition:0.3s;\n}\n\n#uc_card_carousel_elementor_f204ac9 .uc_classic_carousel_container_holder{\n\tdisplay:block;\n\tposition:relative;\n\twidth:100%;\n    box-sizing: border-box;\n}\n#uc_card_carousel_elementor_f204ac9 .uc_classic_carousel_placeholder{\n   position:relative;\n}\n\n\n#uc_card_carousel_elementor_f204ac9 .uc_classic_carousel_placeholder img, #uc_card_carousel_elementor_f204ac9 .ue_card_carousel_image_overlay{\n  transition: all 300ms;\n}\n\n.card_carousel_title{\n\tfont-size:21px;\n}\n\n.uc_classic_carousel .uc_classic_carousel_border{\n\tdisplay:block;\n    margin:0 auto;\n}\n\n.uc_classic_carousel  .uc_classic_carousel_placeholder img{\n\twidth:100%;    \n    display:block;\n}\n\n.uc_classic_carousel .uc_classic_carousel_content{\n  display: flex;\n  flex-flow: column nowrap;\n}\n\n.uc_classic_carousel .ue_button{\n  margin-top:auto;\n}\n\n.uc_classic_carousel .uc_classic_carousel_content .uc_more_btn {\n\tdisplay:inline-block;\n\ttext-decoration:none;\n\ttransition: all 0.5s ease;\n}\n\n#uc_card_carousel_elementor_f204ac9 .owl-dots {\n  overflow:hidden;\n  text-align:center;\n}\n\n#uc_card_carousel_elementor_f204ac9 .owl-dot {\n  border-radius:50%;\n  display:inline-block;\n}\n\n#uc_card_carousel_elementor_f204ac9 .owl-nav .owl-prev,\n#uc_card_carousel_elementor_f204ac9 .owl-nav .owl-next{\n    position:absolute;\n    display:flex;\n  \tjustify-content: center;\n  \talign-items: center;\n    text-align:center;\n}\n\n#uc_card_carousel_elementor_f204ac9 .owl-nav .disabled{\n    display: none;  \n}\n\n\n#uc_card_carousel_elementor_f204ac9 .ue-item-icon{\n  line-height:1em;\n  display:inline-flex;\n  justify-content:center;\n  align-items:center;  \n}\n\n#uc_card_carousel_elementor_f204ac9 .ue-item-icon svg{\n  height:1em;\n  width:1em;\n}\n\n#uc_card_carousel_elementor_f204ac9 .ue-item-icon-wrapper{\n  display:flex;\n}\n\n#uc_card_carousel_elementor_f204ac9 .uc_classic_carousel_container_holder {\n\t max-width: ;\n}\n\n\n\n@media screen and (max-width: 1024px) {\n  #uc_card_carousel_elementor_f204ac9 .uc_classic_carousel_container_holder {\n\t max-width: ;\n  }\n}\n\n@media screen and (max-width: 767px) {\n  #uc_card_carousel_elementor_f204ac9 .uc_classic_carousel_container_holder {\n    max-width: ;\n  }\n}\n\n<\/style>\n\n<div class=\"uc_classic_carousel\" id=\"uc_card_carousel_elementor_f204ac9-wrapper\">\n        <div class=\"uc_carousel owl-carousel uc-items-wrapper  \" id=\"uc_card_carousel_elementor_f204ac9\"  >\n          \t\n\n\n<div id=\"uc_card_carousel_elementor_f204ac9_item1\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-adab4a8\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">Mastering Threat Detection with CrowdStrike EDR Expertise<\/div>\n        <div class=\"card_carousel_text\">Our collaboration with CrowdStrike EDR isn\u2019t merely about deploying state-of-the-art technology; it\u2019s about enriching it with our team\u2019s expertise. Our security analysts bring to the table unparalleled skills in interpreting CrowdStrike\u2019s AI-powered detections, enabling us to not just identify but outmaneuver sophisticated threats. Their proficiency in leveraging CrowdStrike\u2019s comprehensive endpoint data ensures that we see every detail of potential threats, with the ability to investigate and respond with unmatched speed and precision.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n\n\n<div id=\"uc_card_carousel_elementor_f204ac9_item2\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-dc29706\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">ESET EPP: A Symphony of Expertise and Technology<\/div>\n        <div class=\"card_carousel_text\">ESET\u2019s powerful, multilayered protection is enhanced by our team\u2019s deep understanding of ESET\u2019s unique global threat detection network. Our specialists, with years of experience in cybersecurity, leverage ESET\u2019s machine learning capabilities and real-time defence updates to fortify your endpoints against emerging threats. This combination of ESET\u2019s advanced solutions and our team\u2019s expertise has continuously safeguarded businesses, maintaining operational integrity without interruption.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n\n\n<div id=\"uc_card_carousel_elementor_f204ac9_item3\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-31bfcc8\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">Elevating Security with Ivanti\u2019s Advanced Solutions and Our Know-How<\/div>\n        <div class=\"card_carousel_text\">Ivanti\u2019s comprehensive cybersecurity and endpoint management solutions gain an additional layer of effectiveness through our specialists\u2019 strategic application. Our experts excel in utilizing Ivanti\u2019s cloud-native patch management system to prioritize and apply patches effectively, ensuring your defenses are always up to date. With a profound understanding of Ivanti Neurons and Zero Sign-On, our team streamlines endpoint management and enhances security protocols, protecting against the most cunning of cyberattacks.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n      <\/div>\n<\/div>\n<!-- end Card Carousel -->\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a6bd4b e-grid e-con-full vinerbility-sec elementor-hidden-tablet elementor-hidden-mobile e-con e-child\" data-id=\"2a6bd4b\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-60e4979 e-con-full card-box e-flex e-con e-child\" data-id=\"60e4979\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-117644b vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"117644b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mastering Threat Detection with CrowdStrike EDR Expertise<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57332a4 vinerbility-sec-text elementor-widget elementor-widget-text-editor\" data-id=\"57332a4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Our collaboration with CrowdStrike EDR isn\u2019t merely about deploying state-of-the-art technology; it\u2019s about enriching it with our team\u2019s expertise. Our security analysts bring to the table unparalleled skills in interpreting CrowdStrike\u2019s AI-powered detections, enabling us to not just identify but outmaneuver sophisticated threats. Their proficiency in leveraging CrowdStrike\u2019s comprehensive endpoint data ensures that we see every detail of potential threats, with the ability to investigate and respond with unmatched speed and precision.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0d92b89 e-con-full card-box e-flex e-con e-child\" data-id=\"0d92b89\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4724fe3 vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"4724fe3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ESET EPP: A Symphony of Expertise and Technology<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e588715 vinerbility-sec-text elementor-widget elementor-widget-text-editor\" data-id=\"e588715\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>ESET\u2019s powerful, multilayered protection is enhanced by our team\u2019s deep understanding of ESET\u2019s unique global threat detection network. Our specialists, with years of experience in cybersecurity, leverage ESET\u2019s machine learning capabilities and real-time defence updates to fortify your endpoints against emerging threats. This combination of ESET\u2019s advanced solutions and our team\u2019s expertise has continuously safeguarded businesses, maintaining operational integrity without interruption.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-783f01b e-con-full card-box e-flex e-con e-child\" data-id=\"783f01b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb5798a vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"cb5798a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Elevating Security with Ivanti\u2019s Advanced Solutions and Our Know-How<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22dd2d2 vinerbility-sec-text elementor-widget elementor-widget-text-editor\" data-id=\"22dd2d2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tIvanti\u2019s comprehensive cybersecurity and endpoint management solutions gain an additional layer of effectiveness through our specialists\u2019 strategic application. Our experts excel in utilizing Ivanti\u2019s cloud-native patch management system to prioritize and apply patches effectively, ensuring your defenses are always up to date. With a profound understanding of Ivanti Neurons and Zero Sign-On, our team streamlines endpoint management and enhances security protocols, protecting against the most cunning of cyberattacks.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9822ad2 section-relative e-flex e-con-boxed e-con e-parent\" data-id=\"9822ad2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-10c265a e-con-full e-flex e-con e-child\" data-id=\"10c265a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5cb093a elementor-widget elementor-widget-heading\" data-id=\"5cb093a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Partner with Green Method Technologies for Endpoint Security?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-adefa7c elementor-widget elementor-widget-heading\" data-id=\"adefa7c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Providing scalable and flexible endpoint protection solutions<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bde6b7 accordion-custom elementor-widget elementor-widget-n-accordion\" data-id=\"4bde6b7\" data-element_type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7950\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-7950\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Expert-Led Solutions <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7950\" class=\"elementor-element elementor-element-32b34da e-con-full e-flex e-con e-child\" data-id=\"32b34da\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7950\" class=\"elementor-element elementor-element-938f3fd e-flex e-con-boxed e-con e-child\" data-id=\"938f3fd\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a62231 elementor-widget elementor-widget-heading\" data-id=\"2a62231\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Expert-Led Solutions<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e8bafe elementor-widget elementor-widget-text-editor\" data-id=\"4e8bafe\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tIdentifying the personal data in all the organizational workflows are critical to defining the GDPR compliance strategy for your organization.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd53528 elementor-widget elementor-widget-button\" data-id=\"bd53528\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Discover Internal Threats<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7950\" class=\"elementor-element elementor-element-348d42a e-flex e-con-boxed e-con e-child\" data-id=\"348d42a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ee37be elementor-widget elementor-widget-image\" data-id=\"8ee37be\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"275\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/person-working-html-computer-1.png\" class=\"attachment-large size-large wp-image-5866\" alt=\"\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/person-working-html-computer-1.png 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/person-working-html-computer-1-300x143.png 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7951\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7951\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Comprehensive Defense Mechanisms <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7951\" class=\"elementor-element elementor-element-501dcbd e-con-full e-flex e-con e-child\" data-id=\"501dcbd\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7951\" class=\"elementor-element elementor-element-107d779 e-flex e-con-boxed e-con e-child\" data-id=\"107d779\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1149511 elementor-widget elementor-widget-heading\" data-id=\"1149511\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Comprehensive Defense Mechanisms<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b90ff1 elementor-widget elementor-widget-text-editor\" data-id=\"8b90ff1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tFrom advanced threat detection to automated patch management, our experts deploy a full spectrum of defenses, safeguarding your endpoints from every conceivable angle.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-159d5ed elementor-widget elementor-widget-button\" data-id=\"159d5ed\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Discuss your Secure Remote Access Solution<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7951\" class=\"elementor-element elementor-element-f2d9dad e-flex e-con-boxed e-con e-child\" data-id=\"f2d9dad\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54256a5 elementor-widget elementor-widget-image\" data-id=\"54256a5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"325\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/freepik_edit_35mm-film-photography-An-advanced-cybersecurity-op.png\" class=\"attachment-large size-large wp-image-5867\" alt=\"\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/freepik_edit_35mm-film-photography-An-advanced-cybersecurity-op.png 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/freepik_edit_35mm-film-photography-An-advanced-cybersecurity-op-300x169.png 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7952\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7952\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Proactive Threat Management <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7952\" class=\"elementor-element elementor-element-8e3c7c5 e-con-full e-flex e-con e-child\" data-id=\"8e3c7c5\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7952\" class=\"elementor-element elementor-element-5c79510 e-flex e-con-boxed e-con e-child\" data-id=\"5c79510\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-251381e elementor-widget elementor-widget-heading\" data-id=\"251381e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Proactive Threat Management<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5430645 elementor-widget elementor-widget-text-editor\" data-id=\"5430645\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tOur specialists are not just reactive; they anticipate and neutralize threats before they materialize, ensuring your business remains unscathed.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-135d3df elementor-widget elementor-widget-button\" data-id=\"135d3df\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Seamless Passwordless Authentication<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7952\" class=\"elementor-element elementor-element-72eb900 e-flex e-con-boxed e-con e-child\" data-id=\"72eb900\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a4cbdb0 elementor-widget elementor-widget-image\" data-id=\"a4cbdb0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"275\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/threats.png\" class=\"attachment-large size-large wp-image-5872\" alt=\"threats\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/threats.png 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/threats-300x143.png 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7953\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7953\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Tailored Security Posture <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7953\" class=\"elementor-element elementor-element-a6f924e e-con-full e-flex e-con e-child\" data-id=\"a6f924e\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7953\" class=\"elementor-element elementor-element-f55c57e e-flex e-con-boxed e-con e-child\" data-id=\"f55c57e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bff2c5d elementor-widget elementor-widget-heading\" data-id=\"bff2c5d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Tailored Security Posture<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b3b8a4 elementor-widget elementor-widget-text-editor\" data-id=\"6b3b8a4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tWe recognize the uniqueness of each organization\u2019s security needs. Our experts work closely with you to develop and implement a security strategy that aligns perfectly with your objectives.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b8d6f2 elementor-widget elementor-widget-button\" data-id=\"6b8d6f2\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Discuss Scalability and Customization Options<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7953\" class=\"elementor-element elementor-element-23df0fe e-flex e-con-boxed e-con e-child\" data-id=\"23df0fe\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2af322c elementor-widget elementor-widget-image\" data-id=\"2af322c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"275\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Tailored-Security-Posture.png\" class=\"attachment-large size-large wp-image-5873\" alt=\"\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Tailored-Security-Posture.png 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Tailored-Security-Posture-300x143.png 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7954\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7954\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Behavioral Analytics <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7954\" class=\"elementor-element elementor-element-a76ec95 e-con-full e-flex e-con e-child\" data-id=\"a76ec95\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7954\" class=\"elementor-element elementor-element-afaf084 e-flex e-con-boxed e-con e-child\" data-id=\"afaf084\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b0b9757 elementor-widget elementor-widget-heading\" data-id=\"b0b9757\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Behavioral Analytics<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdd22dc elementor-widget elementor-widget-text-editor\" data-id=\"fdd22dc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tBy analyzing the behavior of users and endpoints, Green Method endpoint security service can identify deviations from normal activities that may indicate a security breach. This behavioral approach helps in catching sophisticated attacks that might not be detected by traditional signature-based methods.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4dc9ee elementor-widget elementor-widget-button\" data-id=\"d4dc9ee\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Expert Support<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7954\" class=\"elementor-element elementor-element-c22a1b1 e-flex e-con-boxed e-con e-child\" data-id=\"c22a1b1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ccc895e elementor-widget elementor-widget-image\" data-id=\"ccc895e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"345\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Behavioral-Analytics.png\" class=\"attachment-large size-large wp-image-5877\" alt=\"Behavioral-Analytics\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Behavioral-Analytics.png 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Behavioral-Analytics-300x179.png 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7955\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7955\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Patch Management <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7955\" class=\"elementor-element elementor-element-3705ac7 e-con-full e-flex e-con e-child\" data-id=\"3705ac7\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7955\" class=\"elementor-element elementor-element-464c777 e-flex e-con-boxed e-con e-child\" data-id=\"464c777\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0bb9d4f elementor-widget elementor-widget-heading\" data-id=\"0bb9d4f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Patch Management<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46d4661 elementor-widget elementor-widget-text-editor\" data-id=\"46d4661\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tIn partnership with Ivanti, Green Method implements effective patch management strategies to ensure that all software on endpoints is up-to-date with the latest security patches. This reduces vulnerabilities that can be exploited by attackers and helps maintain the overall security of the system.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47c6704 elementor-widget elementor-widget-button\" data-id=\"47c6704\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Comply with Security Regulations<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7955\" class=\"elementor-element elementor-element-81945d9 e-flex e-con-boxed e-con e-child\" data-id=\"81945d9\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8da7af elementor-widget elementor-widget-image\" data-id=\"b8da7af\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"338\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Patch-Management.png\" class=\"attachment-large size-large wp-image-5878\" alt=\"Patch Management\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Patch-Management.png 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Patch-Management-300x176.png 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7956\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7956\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Customized Security Policies <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7956\" class=\"elementor-element elementor-element-50638a8 e-con-full e-flex e-con e-child\" data-id=\"50638a8\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7956\" class=\"elementor-element elementor-element-36f6464 e-flex e-con-boxed e-con e-child\" data-id=\"36f6464\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a43c6b elementor-widget elementor-widget-heading\" data-id=\"3a43c6b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Customized Security Policies<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0eeeac0 elementor-widget elementor-widget-text-editor\" data-id=\"0eeeac0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tGreen Method Technologies tailors security policies based on the specific needs and risk profiles of each organization. These policies govern the use and security of endpoints, ensuring that all users adhere to best practices in cybersecurity.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebc9096 elementor-widget elementor-widget-button\" data-id=\"ebc9096\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Discuss Scalability and Customization Options<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7956\" class=\"elementor-element elementor-element-4c948cf e-flex e-con-boxed e-con e-child\" data-id=\"4c948cf\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-630b704 elementor-widget elementor-widget-image\" data-id=\"630b704\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"314\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Customized-Security-Policies.png\" class=\"attachment-large size-large wp-image-5879\" alt=\"Customized Security Policies\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Customized-Security-Policies.png 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Customized-Security-Policies-300x163.png 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7957\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"8\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7957\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Regulatory Compliance <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7957\" class=\"elementor-element elementor-element-a97c696 e-con-full e-flex e-con e-child\" data-id=\"a97c696\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7957\" class=\"elementor-element elementor-element-3d1e3ac e-flex e-con-boxed e-con e-child\" data-id=\"3d1e3ac\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88f8703 elementor-widget elementor-widget-heading\" data-id=\"88f8703\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Regulatory Compliance<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89c0027 elementor-widget elementor-widget-text-editor\" data-id=\"89c0027\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tGreen Method ensures that endpoint security measures comply with relevant laws and regulations, helping organizations avoid legal penalties and reputational damage associated with data breaches.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de22e43 elementor-widget elementor-widget-button\" data-id=\"de22e43\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Expert Support<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7957\" class=\"elementor-element elementor-element-436af68 e-flex e-con-boxed e-con e-child\" data-id=\"436af68\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-43b8f71 elementor-widget elementor-widget-image\" data-id=\"43b8f71\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"275\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/business-man-working-office-desktop.png\" class=\"attachment-large size-large wp-image-5881\" alt=\"\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/business-man-working-office-desktop.png 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/business-man-working-office-desktop-300x143.png 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7958\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"9\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7958\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> User Training and Awareness <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7958\" class=\"elementor-element elementor-element-8fa1f36 e-con-full e-flex e-con e-child\" data-id=\"8fa1f36\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7958\" class=\"elementor-element elementor-element-99c5f65 e-flex e-con-boxed e-con e-child\" data-id=\"99c5f65\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-49910eb elementor-widget elementor-widget-heading\" data-id=\"49910eb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">User Training and Awareness<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63d4936 elementor-widget elementor-widget-text-editor\" data-id=\"63d4936\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tGreen Method technologies also focuses on the human aspect of cybersecurity by providing training and awareness programs. These programs educate employees about the latest cyber threats and safe computing practices, reducing the risk of security breaches due to human error.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51dec63 elementor-widget elementor-widget-button\" data-id=\"51dec63\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Comply with Security Regulations<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7958\" class=\"elementor-element elementor-element-a1b4a11 e-flex e-con-boxed e-con e-child\" data-id=\"a1b4a11\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5146772 elementor-widget elementor-widget-image\" data-id=\"5146772\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"322\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/User-Training-and-Awareness.png\" class=\"attachment-large size-large wp-image-5882\" alt=\"\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/User-Training-and-Awareness.png 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/User-Training-and-Awareness-300x167.png 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bca07ba e-flex e-con-boxed e-con e-parent\" data-id=\"bca07ba\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-055e678 e-con-full e-flex e-con e-child\" data-id=\"055e678\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-54d87dd e-con-full e-flex e-con e-child\" data-id=\"54d87dd\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-478b662 elementor-widget elementor-widget-heading\" data-id=\"478b662\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Get fully managed endpoint protection<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46fa04a e-con-full e-flex e-con e-child\" data-id=\"46fa04a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b3fa2b6 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"b3fa2b6\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk To Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7716970 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"7716970\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Expert-Led Endpoint Protection Services Secure Your Digital World with Green Method Technologies Access Management Explore Endpoint Protection Services In the pulsing heart of Dubai, where innovation meets tradition, Green Method Technologies stands as a guardian of the digital realm. Imagine a world where every click, every swipe, and every download is a potential doorway for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-3301","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/pages\/3301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/comments?post=3301"}],"version-history":[{"count":0,"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/pages\/3301\/revisions"}],"wp:attachment":[{"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/media?parent=3301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}