{"id":3699,"date":"2024-11-18T06:34:06","date_gmt":"2024-11-18T06:34:06","guid":{"rendered":"https:\/\/greenmethod.net\/dev\/?page_id=3699"},"modified":"2024-12-07T16:57:32","modified_gmt":"2024-12-07T16:57:32","slug":"vulnerability-management-for-a-holistic-security-posture","status":"publish","type":"page","link":"https:\/\/greenmethod.net\/dev\/vulnerability-management-for-a-holistic-security-posture\/","title":{"rendered":"Vulnerability management for a holistic security posture"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3699\" class=\"elementor elementor-3699\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eca7fcc e-flex e-con-boxed e-con e-parent\" data-id=\"eca7fcc\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-221330b elementor-widget elementor-widget-heading\" data-id=\"221330b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Vulnerability management for a holistic security posture<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b5d9b0 elementor-widget elementor-widget-heading\" data-id=\"4b5d9b0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Vulnerability Management services are designed to enhance your organization\u2019s security posture, protect your brand reputation, and reduce security debt through a strategic, risk-based approach.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-10996ddd section-relative e-con-full e-flex e-con e-parent\" data-id=\"10996ddd\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-760c7fdd elementor-absolute elementor-widget elementor-widget-image\" data-id=\"760c7fdd\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"597\" height=\"1024\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/glass-effect-597x1024.png\" class=\"attachment-large size-large wp-image-1869\" alt=\"glass-effect\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/glass-effect-597x1024.png 597w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/glass-effect-175x300.png 175w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/glass-effect-768x1318.png 768w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/glass-effect.png 795w\" sizes=\"(max-width: 597px) 100vw, 597px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32161e26 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"32161e26\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"481\" height=\"1024\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/right-glass-481x1024.png\" class=\"attachment-large size-large wp-image-1946\" alt=\"right-glass\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/right-glass-481x1024.png 481w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/right-glass-141x300.png 141w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/right-glass-768x1635.png 768w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/right-glass-722x1536.png 722w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/right-glass.png 877w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-620b8fcc section-relative e-flex e-con-boxed e-con e-parent\" data-id=\"620b8fcc\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1dc61090 e-con-full e-flex e-con e-child\" data-id=\"1dc61090\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2600954c e-grid e-con-full e-con e-child\" data-id=\"2600954c\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-77796d92 e-con-full e-flex e-con e-child\" data-id=\"77796d92\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b215e70 elementor-widget elementor-widget-heading\" data-id=\"7b215e70\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Explore Vulnerability Management Services<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6069b0ad elementor-widget elementor-widget-text-editor\" data-id=\"6069b0ad\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tIn a digital landscape that\u2019s evolving faster than ever, your organization\u2019s cybersecurity cannot lag behind. At Green Method Technologies, we don\u2019t just respond to threats\u2014we anticipate them. Our premier Vulnerability Management services, based out of Dubai, are designed to not only detect vulnerabilities but to outsmart them. With us, you safeguard your digital assets through proactive risk management, harnessing cutting-edge technology and unparalleled expertise to fortify your defenses before threats even emerge. Unlock the power of security that\u2019s predictive, not just protective.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79474871 elementor-widget elementor-widget-image\" data-id=\"79474871\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"444\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Explore-Vulnerability-Management-Services.webp\" class=\"attachment-large size-large wp-image-6480\" alt=\"Explore Vulnerability Management Services\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Explore-Vulnerability-Management-Services.webp 703w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Explore-Vulnerability-Management-Services-300x208.webp 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32f7804c e-con-full e-flex e-con e-child\" data-id=\"32f7804c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-7ce8999 e-grid e-con-full e-con e-child\" data-id=\"7ce8999\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2d45f85 e-con-full e-flex e-con e-child\" data-id=\"2d45f85\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74602437 elementor-widget elementor-widget-image\" data-id=\"74602437\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"475\" height=\"453\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/cloud-computing-software-modish-remote-work.webp\" class=\"attachment-full size-full wp-image-6475\" alt=\"cloud-computing-software-modish-remote-work\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/cloud-computing-software-modish-remote-work.webp 475w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/cloud-computing-software-modish-remote-work-300x286.webp 300w\" sizes=\"(max-width: 475px) 100vw, 475px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-440722a1 e-con-full e-flex e-con e-child\" data-id=\"440722a1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c17b124 elementor-widget elementor-widget-heading\" data-id=\"6c17b124\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What are the benefits of Green Method email and browser security solutions?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47d9187d elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"47d9187d\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Automation: <\/b>Green Method\u2019s VMaaS provides automated tools and processes to regularly scan for vulnerabilities, which helps in identifying and addressing potential security issues more quickly and efficiently .<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Scalability:<\/b> Our vulnerability management services can be scaled to meet the requirements of organizations of all sizes, making it a cost-effective option for businesses regardless of their size<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Compliance:<\/b> We\u00a0can aid organizations\u00a0in meeting compliance\u00a0requirements\u00a0by identifying\u00a0vulnerabilities\u00a0and ensuring\u00a0they are addressed, thereby helping\u00a0to maintain regulatory\u00a0compliance<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-611511f7 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"611511f7\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Continuous Protection: <\/b>Our VMaaS provides\u00a0ongoing, automated\u00a0scanning and\u00a0expert assessment, unlike manual\u00a0scans with occasional\u00a0updates, ensuring\u00a0continuous protection\u00a0against vulnerabilities.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Risk-Based Prioritization:<\/b> Our VMaaS helps in prioritizing vulnerabilities based on their potential risk to the business, workforce, and customers, ensuring that the most critical vulnerabilities are addressed first.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-69dbeb50 e-flex e-con-boxed e-con e-parent\" data-id=\"69dbeb50\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1b04824a e-con-full e-flex e-con e-child\" data-id=\"1b04824a\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-481569ff e-con-full e-flex e-con e-child\" data-id=\"481569ff\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-565fae6a e-con-full e-flex e-con e-child\" data-id=\"565fae6a\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7ee42546 e-con-full e-flex e-con e-child\" data-id=\"7ee42546\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c98da86 elementor-widget elementor-widget-heading\" data-id=\"3c98da86\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Advanced vulnerability management, scanning capabilities and real-time monitoring<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c57336c elementor-widget elementor-widget-text-editor\" data-id=\"1c57336c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tAt Green Method Technologies, our vulnerability management service is designed to help businesses identify and remediate vulnerabilities effectively across their systems, networks, and applications. We have strategically partnered with leading security technology providers including Qualys, Ivanti RiskSense, ISSQUARED, and Securin to enhance our service offerings.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b170da6 e-con-full e-flex e-con e-child\" data-id=\"7b170da6\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-449110cc e-con-full e-flex e-con e-child\" data-id=\"449110cc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-283e5375 elementor-widget elementor-widget-image\" data-id=\"283e5375\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"475\" height=\"453\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/business-corporate-protection-safety-security-concept.webp\" class=\"attachment-full size-full wp-image-6482\" alt=\"business-corporate-protection-safety-security-concept\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/business-corporate-protection-safety-security-concept.webp 475w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/business-corporate-protection-safety-security-concept-300x286.webp 300w\" sizes=\"(max-width: 475px) 100vw, 475px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-462a2740 section-relative e-flex e-con-boxed e-con e-parent\" data-id=\"462a2740\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5082dee1 e-con-full e-flex e-con e-child\" data-id=\"5082dee1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-27993140 e-con-full e-flex e-con e-child\" data-id=\"27993140\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1106e9fa elementor-widget elementor-widget-text-editor\" data-id=\"1106e9fa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tVMaaS that safeguards businesses against potential security threats\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cc27bd8 elementor-widget elementor-widget-heading\" data-id=\"2cc27bd8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect end-user devices from malicious threats &amp; cyberattacks<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e5bf69 defensive-system-sec elementor-hidden-desktop elementor-widget elementor-widget-ucaddon_card_carousel\" data-id=\"1e5bf69\" data-element_type=\"widget\" data-widget_type=\"ucaddon_card_carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n<!-- start Card Carousel -->\n\t\t<link id='font-awesome-css' href='https:\/\/greenmethod.net\/dev\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-all.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='font-awesome-4-shim-css' href='https:\/\/greenmethod.net\/dev\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-v4-shims.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='owl-carousel-css' href='https:\/\/greenmethod.net\/dev\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/owl-carousel-new\/assets\/owl.carousel.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='uc_ac_assets_file_animate_css_77907-css' href='https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/ac_assets\/uc_classic_carousel\/animate.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Card Carousel *\/\n\n#uc_card_carousel_elementor_1e5bf69-wrapper{\n  min-height:1px;\n}\n\n#uc_card_carousel_elementor_1e5bf69 *{\n\t-webkit-box-sizing: border-box;\n\t-moz-box-sizing: border-box;\n\tbox-sizing: border-box;\n}\n\n#uc_card_carousel_elementor_1e5bf69 .ue-carousel-item{\n  overflow:hidden;\n  transition:0.3s;\n}\n\n#uc_card_carousel_elementor_1e5bf69 .uc_classic_carousel_container_holder{\n\tdisplay:block;\n\tposition:relative;\n\twidth:100%;\n    box-sizing: border-box;\n}\n#uc_card_carousel_elementor_1e5bf69 .uc_classic_carousel_placeholder{\n   position:relative;\n}\n\n\n#uc_card_carousel_elementor_1e5bf69 .uc_classic_carousel_placeholder img, #uc_card_carousel_elementor_1e5bf69 .ue_card_carousel_image_overlay{\n  transition: all 300ms;\n}\n\n.card_carousel_title{\n\tfont-size:21px;\n}\n\n.uc_classic_carousel .uc_classic_carousel_border{\n\tdisplay:block;\n    margin:0 auto;\n}\n\n.uc_classic_carousel  .uc_classic_carousel_placeholder img{\n\twidth:100%;    \n    display:block;\n}\n\n.uc_classic_carousel .uc_classic_carousel_content{\n  display: flex;\n  flex-flow: column nowrap;\n}\n\n.uc_classic_carousel .ue_button{\n  margin-top:auto;\n}\n\n.uc_classic_carousel .uc_classic_carousel_content .uc_more_btn {\n\tdisplay:inline-block;\n\ttext-decoration:none;\n\ttransition: all 0.5s ease;\n}\n\n#uc_card_carousel_elementor_1e5bf69 .owl-dots {\n  overflow:hidden;\n  text-align:center;\n}\n\n#uc_card_carousel_elementor_1e5bf69 .owl-dot {\n  border-radius:50%;\n  display:inline-block;\n}\n\n#uc_card_carousel_elementor_1e5bf69 .owl-nav .owl-prev,\n#uc_card_carousel_elementor_1e5bf69 .owl-nav .owl-next{\n    position:absolute;\n    display:flex;\n  \tjustify-content: center;\n  \talign-items: center;\n    text-align:center;\n}\n\n#uc_card_carousel_elementor_1e5bf69 .owl-nav .disabled{\n    display: none;  \n}\n\n\n#uc_card_carousel_elementor_1e5bf69 .ue-item-icon{\n  line-height:1em;\n  display:inline-flex;\n  justify-content:center;\n  align-items:center;  \n}\n\n#uc_card_carousel_elementor_1e5bf69 .ue-item-icon svg{\n  height:1em;\n  width:1em;\n}\n\n#uc_card_carousel_elementor_1e5bf69 .ue-item-icon-wrapper{\n  display:flex;\n}\n\n#uc_card_carousel_elementor_1e5bf69 .uc_classic_carousel_container_holder {\n\t max-width: ;\n}\n\n\n\n@media screen and (max-width: 1024px) {\n  #uc_card_carousel_elementor_1e5bf69 .uc_classic_carousel_container_holder {\n\t max-width: ;\n  }\n}\n\n@media screen and (max-width: 767px) {\n  #uc_card_carousel_elementor_1e5bf69 .uc_classic_carousel_container_holder {\n    max-width: ;\n  }\n}\n\n<\/style>\n\n<div class=\"uc_classic_carousel\" id=\"uc_card_carousel_elementor_1e5bf69-wrapper\">\n        <div class=\"uc_carousel owl-carousel uc-items-wrapper  \" id=\"uc_card_carousel_elementor_1e5bf69\"  >\n          \t\n\n\n<div id=\"uc_card_carousel_elementor_1e5bf69_item1\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-adab4a8\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">Continuous, Scanning<\/div>\n        <div class=\"card_carousel_text\">Utilizing cloud-native APIs, Green Method\u2019s VMaaS performs continuous, agentless vulnerability scanning. This approach ensures minimal disruption to operations while providing constant visibility into the security posture of all IT assets.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n\n\n<div id=\"uc_card_carousel_elementor_1e5bf69_item2\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-dc29706\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">Integration with Security Systems<\/div>\n        <div class=\"card_carousel_text\">Our solution integrates advanced features like real-time alerts and analytics to monitor privileged user activities, helping prevent insider threats and external attacks. This proactive approach to security keeps your critical systems and sensitive data under vigilant watch.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n\n\n<div id=\"uc_card_carousel_elementor_1e5bf69_item3\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-31bfcc8\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">Proactive Threat Identification<\/div>\n        <div class=\"card_carousel_text\">By continuously scanning and assessing vulnerabilities, our VMaaS identifies potential security threats before they can be exploited by attackers. This proactive approach significantly reduces the likelihood of successful cyber attacks.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n\n\n<div id=\"uc_card_carousel_elementor_1e5bf69_item4\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-815a0cd\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">Enhanced Risk Management<\/div>\n        <div class=\"card_carousel_text\">By prioritizing vulnerabilities based on their risk, our VMaaS helps businesses focus their resources on the most critical issues. This risk-based approach not only improves security but also optimizes the allocation of security resources.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n\n\n<div id=\"uc_card_carousel_elementor_1e5bf69_item5\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-a2c2299\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">Reduced Attack Surface<\/div>\n        <div class=\"card_carousel_text\">Through comprehensive assessments and continuous monitoring, our vulnerability management service minimizes the attack surface, making it harder for attackers to find and exploit vulnerabilities. This significantly enhances the overall security of the business.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n\n\n<div id=\"uc_card_carousel_elementor_1e5bf69_item6\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-69c92ed\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">Regulatory Compliance<\/div>\n        <div class=\"card_carousel_text\">By ensuring compliance with relevant standards and regulations, our VMaaS helps businesses avoid penalties and reputational damage that can result from compliance failures. This is particularly important for industries that are heavily regulated.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n      <\/div>\n<\/div>\n<!-- end Card Carousel -->\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3dc5f936 e-grid e-con-full vinerbility-sec elementor-hidden-tablet elementor-hidden-mobile e-con e-child\" data-id=\"3dc5f936\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7ebcbbfa e-con-full card-box e-flex e-con e-child\" data-id=\"7ebcbbfa\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-30c03d16 vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"30c03d16\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Continuous, Scanning<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c8a25b4 vinerbility-sec-text elementor-widget elementor-widget-text-editor\" data-id=\"6c8a25b4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tUtilizing cloud-native APIs, Green Method\u2019s VMaaS performs continuous, agentless vulnerability scanning. This approach ensures minimal disruption to operations while providing constant visibility into the security posture of all IT assets.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-739440ff e-con-full card-box e-flex e-con e-child\" data-id=\"739440ff\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-273ea1e6 vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"273ea1e6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Integration with Security Systems<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7cf2b1ec vinerbility-sec-text elementor-widget elementor-widget-text-editor\" data-id=\"7cf2b1ec\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tIntegration with Security Systems\nOur VMaaS integrates seamlessly with existing security systems such as SIEM, SOAR, and SCM. This integration facilitates better communication and coordination across security platforms, enhancing the overall security strategy.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b08f8d0 e-con-full card-box e-flex e-con e-child\" data-id=\"6b08f8d0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7bba3b52 vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"7bba3b52\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Proactive Threat Identification<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18287d3a vinerbility-sec-text elementor-widget elementor-widget-text-editor\" data-id=\"18287d3a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tBy continuously scanning and assessing vulnerabilities, our VMaaS identifies potential security threats before they can be exploited by attackers. This proactive approach significantly reduces the likelihood of successful cyber attacks.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb5f3fc e-grid e-con-full vinerbility-sec elementor-hidden-tablet elementor-hidden-mobile e-con e-child\" data-id=\"cb5f3fc\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-47a11902 e-con-full card-box e-flex e-con e-child\" data-id=\"47a11902\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42a13e46 vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"42a13e46\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Enhanced Risk Management<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16393fb0 vinerbility-sec-text elementor-widget elementor-widget-text-editor\" data-id=\"16393fb0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tBy prioritizing vulnerabilities based on their risk, our VMaaS helps businesses focus their resources on the most critical issues. This risk-based approach not only improves security but also optimizes the allocation of security resources.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53522c41 e-con-full card-box e-flex e-con e-child\" data-id=\"53522c41\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16443bd5 vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"16443bd5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Reduced Attack Surface<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75b3c07d vinerbility-sec-text elementor-widget elementor-widget-text-editor\" data-id=\"75b3c07d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tThrough comprehensive assessments and continuous monitoring, our vulnerability management service minimizes the attack surface, making it harder for attackers to find and exploit vulnerabilities. This significantly enhances the overall security of the business.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c93eb84 e-con-full card-box e-flex e-con e-child\" data-id=\"4c93eb84\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77627463 vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"77627463\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Regulatory Compliance<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34da1007 vinerbility-sec-text elementor-widget elementor-widget-text-editor\" data-id=\"34da1007\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tBy ensuring compliance with relevant standards and regulations, our VMaaS helps businesses avoid penalties and reputational damage that can result from compliance failures. This is particularly important for industries that are heavily regulated.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-361e3c2f e-flex e-con-boxed e-con e-parent\" data-id=\"361e3c2f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-84c2050 e-con-full e-flex e-con e-child\" data-id=\"84c2050\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-206bd45f e-con-full e-flex e-con e-child\" data-id=\"206bd45f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7dac174e elementor-widget elementor-widget-heading\" data-id=\"7dac174e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect your business against potential security threats<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3288931 elementor-widget elementor-widget-text-editor\" data-id=\"3288931\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tEnforce security policies for attack surface reduction, and attack prevention\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-78e5382f e-con-full e-flex e-con e-child\" data-id=\"78e5382f\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-57cc28d6 e-con-full e-flex e-con e-child\" data-id=\"57cc28d6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-267dac74 elementor-align-right elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"267dac74\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3883669e section-relative e-flex e-con-boxed e-con e-parent\" data-id=\"3883669e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3d57cce9 e-con-full e-flex e-con e-child\" data-id=\"3d57cce9\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3b75c1af e-grid e-con-full e-con e-child\" data-id=\"3b75c1af\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-384e7aa1 e-con-full e-flex e-con e-child\" data-id=\"384e7aa1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16bdf74b elementor-widget elementor-widget-image\" data-id=\"16bdf74b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"475\" height=\"453\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/cloud-computing-software-modish-remote-work-1.webp\" class=\"attachment-full size-full wp-image-6474\" alt=\"cloud-computing-software-modish-remote-work (1)\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/cloud-computing-software-modish-remote-work-1.webp 475w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/cloud-computing-software-modish-remote-work-1-300x286.webp 300w\" sizes=\"(max-width: 475px) 100vw, 475px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6015e349 e-con-full e-flex e-con e-child\" data-id=\"6015e349\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4913bdf7 elementor-widget elementor-widget-heading\" data-id=\"4913bdf7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The advantage of Green Method Comprehensive Vulnerability Management as a Service<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c01ea1a elementor-widget elementor-widget-text-editor\" data-id=\"c01ea1a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tOur Vulnerability Management as a Service (VMaaS) extends your security capabilities by providing full-stack scanning and integrated threat analysis. We act as an extension of your team, helping you not only to identify and prioritize risks but also to measure and track the impact of your vulnerability management efforts over time.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73e6070d section-relative-sec e-flex e-con-boxed e-con e-parent\" data-id=\"73e6070d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-37b98142 e-con-full e-flex e-con e-child\" data-id=\"37b98142\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-788a679a e-con-full e-flex e-con e-child\" data-id=\"788a679a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7517ed5 elementor-widget elementor-widget-text-editor\" data-id=\"7517ed5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tAligned with vulnerability management leaders\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff4582a elementor-widget elementor-widget-heading\" data-id=\"ff4582a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Partnered Precision for\u00a0the best-in-class vulnerability Management<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8187b1c defensive-system-sec elementor-hidden-desktop elementor-widget elementor-widget-ucaddon_card_carousel\" data-id=\"8187b1c\" data-element_type=\"widget\" data-widget_type=\"ucaddon_card_carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n<!-- start Card Carousel -->\n\n<style>\/* widget: Card Carousel *\/\n\n#uc_card_carousel_elementor_8187b1c-wrapper{\n  min-height:1px;\n}\n\n#uc_card_carousel_elementor_8187b1c *{\n\t-webkit-box-sizing: border-box;\n\t-moz-box-sizing: border-box;\n\tbox-sizing: border-box;\n}\n\n#uc_card_carousel_elementor_8187b1c .ue-carousel-item{\n  overflow:hidden;\n  transition:0.3s;\n}\n\n#uc_card_carousel_elementor_8187b1c .uc_classic_carousel_container_holder{\n\tdisplay:block;\n\tposition:relative;\n\twidth:100%;\n    box-sizing: border-box;\n}\n#uc_card_carousel_elementor_8187b1c .uc_classic_carousel_placeholder{\n   position:relative;\n}\n\n\n#uc_card_carousel_elementor_8187b1c .uc_classic_carousel_placeholder img, #uc_card_carousel_elementor_8187b1c .ue_card_carousel_image_overlay{\n  transition: all 300ms;\n}\n\n.card_carousel_title{\n\tfont-size:21px;\n}\n\n.uc_classic_carousel .uc_classic_carousel_border{\n\tdisplay:block;\n    margin:0 auto;\n}\n\n.uc_classic_carousel  .uc_classic_carousel_placeholder img{\n\twidth:100%;    \n    display:block;\n}\n\n.uc_classic_carousel .uc_classic_carousel_content{\n  display: flex;\n  flex-flow: column nowrap;\n}\n\n.uc_classic_carousel .ue_button{\n  margin-top:auto;\n}\n\n.uc_classic_carousel .uc_classic_carousel_content .uc_more_btn {\n\tdisplay:inline-block;\n\ttext-decoration:none;\n\ttransition: all 0.5s ease;\n}\n\n#uc_card_carousel_elementor_8187b1c .owl-dots {\n  overflow:hidden;\n  text-align:center;\n}\n\n#uc_card_carousel_elementor_8187b1c .owl-dot {\n  border-radius:50%;\n  display:inline-block;\n}\n\n#uc_card_carousel_elementor_8187b1c .owl-nav .owl-prev,\n#uc_card_carousel_elementor_8187b1c .owl-nav .owl-next{\n    position:absolute;\n    display:flex;\n  \tjustify-content: center;\n  \talign-items: center;\n    text-align:center;\n}\n\n#uc_card_carousel_elementor_8187b1c .owl-nav .disabled{\n    display: none;  \n}\n\n\n#uc_card_carousel_elementor_8187b1c .ue-item-icon{\n  line-height:1em;\n  display:inline-flex;\n  justify-content:center;\n  align-items:center;  \n}\n\n#uc_card_carousel_elementor_8187b1c .ue-item-icon svg{\n  height:1em;\n  width:1em;\n}\n\n#uc_card_carousel_elementor_8187b1c .ue-item-icon-wrapper{\n  display:flex;\n}\n\n#uc_card_carousel_elementor_8187b1c .uc_classic_carousel_container_holder {\n\t max-width: ;\n}\n\n\n\n@media screen and (max-width: 1024px) {\n  #uc_card_carousel_elementor_8187b1c .uc_classic_carousel_container_holder {\n\t max-width: ;\n  }\n}\n\n@media screen and (max-width: 767px) {\n  #uc_card_carousel_elementor_8187b1c .uc_classic_carousel_container_holder {\n    max-width: ;\n  }\n}\n\n<\/style>\n\n<div class=\"uc_classic_carousel\" id=\"uc_card_carousel_elementor_8187b1c-wrapper\">\n        <div class=\"uc_carousel owl-carousel uc-items-wrapper  \" id=\"uc_card_carousel_elementor_8187b1c\"  >\n          \t\n\n\n<div id=\"uc_card_carousel_elementor_8187b1c_item1\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-adab4a8\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">ARCON PAM Suite<\/div>\n        <div class=\"card_carousel_text\">Mitigates insider and advanced cyber threats through real-time alerts, analytics, and monitoring of privileged users. Deployable on-premises and on-cloud.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n\n\n<div id=\"uc_card_carousel_elementor_8187b1c_item2\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-dc29706\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">Accops Workspace Virtualization<\/div>\n        <div class=\"card_carousel_text\">Solve remote access challenges, and enable enterprises to work from home securely without compromising on security. It offers solutions like \u2018Office PC Access From Home\u2019 and \u2018Virtual Apps\/Desktops Access\u2019.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n\n\n<div id=\"uc_card_carousel_elementor_8187b1c_item3\" class=\"uc_classic_carousel_container_holder ue-item elementor-repeater-item-31bfcc8\" data-hide-item=\"false\">  \n  <div class=\"ue-carousel-item\">\n    \n        \n    \n    \n    <div class=\"uc_classic_carousel_content\" style=\"direction:ltr;\">    \n\n      \n          <div  class=\"card_carousel_title\">Illustrations<\/div>\n        <div class=\"card_carousel_text\">Orci varius natoque penatibus et magnis dis.<\/div>      \t\n\n      \t\n      \n    <\/div>\n    \n  <\/div>\n<\/div>\n\n      <\/div>\n<\/div>\n<!-- end Card Carousel -->\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e9d7d9f e-grid e-con-full vinerbility-sec elementor-hidden-tablet elementor-hidden-mobile e-con e-child\" data-id=\"e9d7d9f\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7cc81f1d e-con-full card-box e-flex e-con e-child\" data-id=\"7cc81f1d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f3cd09c vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"1f3cd09c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Qualys Vulnerability Scanner<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3517a462 elementor-widget elementor-widget-text-editor\" data-id=\"3517a462\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tOur partnership with Qualys leverages their renowned Vulnerability Management Detection and Response (VMDR) capabilities. Qualys is a cornerstone of our VMaaS, providing critical functionalities such as:\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9841fa vinerbility-sec-text elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"e9841fa\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"8\" viewBox=\"0 0 9 8\" fill=\"none\"><path d=\"M6.80912 4.66928C6.71769 4.66928 6.65674 4.66928 6.59783 4.66928C2.91851 4.66928 4.36301 4.66928 0.68369 4.66928C0.34034 4.66928 0.076226 4.46259 0.0152767 4.15256C-0.0720846 3.70966 0.224537 3.33847 0.667436 3.33637C1.58371 3.33637 3.90183 3.33637 6.70347 3.33637C6.72785 3.33637 6.7502 3.33637 6.79896 3.33637C6.76239 3.29629 6.74004 3.26888 6.71566 3.24357C6.05538 2.55813 5.39509 1.87058 4.7348 1.18515C4.57836 1.02275 4.48491 0.837155 4.51132 0.598833C4.53976 0.339422 4.67182 0.158044 4.8953 0.0589195C5.11269 -0.0380963 5.32804 -0.0170059 5.52105 0.134845C5.582 0.183353 5.63889 0.240297 5.69374 0.297241C6.71769 1.3602 7.73961 2.42315 8.76357 3.48611C9.07847 3.81301 9.07847 4.19264 8.7656 4.51743C7.72539 5.59725 6.68519 6.67708 5.64701 7.75691C5.4601 7.95094 5.24678 8.04585 4.98469 7.97836C4.52554 7.85814 4.31831 7.24652 4.71652 6.83737C5.22443 6.31644 5.72625 5.78918 6.2301 5.26614C6.41498 5.07421 6.60189 4.8844 6.80912 4.66928Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Get comprehensive visibility into cyber risk exposure across all assets.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"8\" viewBox=\"0 0 9 8\" fill=\"none\"><path d=\"M6.80912 4.66928C6.71769 4.66928 6.65674 4.66928 6.59783 4.66928C2.91851 4.66928 4.36301 4.66928 0.68369 4.66928C0.34034 4.66928 0.076226 4.46259 0.0152767 4.15256C-0.0720846 3.70966 0.224537 3.33847 0.667436 3.33637C1.58371 3.33637 3.90183 3.33637 6.70347 3.33637C6.72785 3.33637 6.7502 3.33637 6.79896 3.33637C6.76239 3.29629 6.74004 3.26888 6.71566 3.24357C6.05538 2.55813 5.39509 1.87058 4.7348 1.18515C4.57836 1.02275 4.48491 0.837155 4.51132 0.598833C4.53976 0.339422 4.67182 0.158044 4.8953 0.0589195C5.11269 -0.0380963 5.32804 -0.0170059 5.52105 0.134845C5.582 0.183353 5.63889 0.240297 5.69374 0.297241C6.71769 1.3602 7.73961 2.42315 8.76357 3.48611C9.07847 3.81301 9.07847 4.19264 8.7656 4.51743C7.72539 5.59725 6.68519 6.67708 5.64701 7.75691C5.4601 7.95094 5.24678 8.04585 4.98469 7.97836C4.52554 7.85814 4.31831 7.24652 4.71652 6.83737C5.22443 6.31644 5.72625 5.78918 6.2301 5.26614C6.41498 5.07421 6.60189 4.8844 6.80912 4.66928Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Prioritize vulnerabilities and assets based on business risk.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"8\" viewBox=\"0 0 9 8\" fill=\"none\"><path d=\"M6.80912 4.66928C6.71769 4.66928 6.65674 4.66928 6.59783 4.66928C2.91851 4.66928 4.36301 4.66928 0.68369 4.66928C0.34034 4.66928 0.076226 4.46259 0.0152767 4.15256C-0.0720846 3.70966 0.224537 3.33847 0.667436 3.33637C1.58371 3.33637 3.90183 3.33637 6.70347 3.33637C6.72785 3.33637 6.7502 3.33637 6.79896 3.33637C6.76239 3.29629 6.74004 3.26888 6.71566 3.24357C6.05538 2.55813 5.39509 1.87058 4.7348 1.18515C4.57836 1.02275 4.48491 0.837155 4.51132 0.598833C4.53976 0.339422 4.67182 0.158044 4.8953 0.0589195C5.11269 -0.0380963 5.32804 -0.0170059 5.52105 0.134845C5.582 0.183353 5.63889 0.240297 5.69374 0.297241C6.71769 1.3602 7.73961 2.42315 8.76357 3.48611C9.07847 3.81301 9.07847 4.19264 8.7656 4.51743C7.72539 5.59725 6.68519 6.67708 5.64701 7.75691C5.4601 7.95094 5.24678 8.04585 4.98469 7.97836C4.52554 7.85814 4.31831 7.24652 4.71652 6.83737C5.22443 6.31644 5.72625 5.78918 6.2301 5.26614C6.41498 5.07421 6.60189 4.8844 6.80912 4.66928Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Streamline remediation with automated workflows for quicker risk mitigation.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"8\" viewBox=\"0 0 9 8\" fill=\"none\"><path d=\"M6.80912 4.66928C6.71769 4.66928 6.65674 4.66928 6.59783 4.66928C2.91851 4.66928 4.36301 4.66928 0.68369 4.66928C0.34034 4.66928 0.076226 4.46259 0.0152767 4.15256C-0.0720846 3.70966 0.224537 3.33847 0.667436 3.33637C1.58371 3.33637 3.90183 3.33637 6.70347 3.33637C6.72785 3.33637 6.7502 3.33637 6.79896 3.33637C6.76239 3.29629 6.74004 3.26888 6.71566 3.24357C6.05538 2.55813 5.39509 1.87058 4.7348 1.18515C4.57836 1.02275 4.48491 0.837155 4.51132 0.598833C4.53976 0.339422 4.67182 0.158044 4.8953 0.0589195C5.11269 -0.0380963 5.32804 -0.0170059 5.52105 0.134845C5.582 0.183353 5.63889 0.240297 5.69374 0.297241C6.71769 1.3602 7.73961 2.42315 8.76357 3.48611C9.07847 3.81301 9.07847 4.19264 8.7656 4.51743C7.72539 5.59725 6.68519 6.67708 5.64701 7.75691C5.4601 7.95094 5.24678 8.04585 4.98469 7.97836C4.52554 7.85814 4.31831 7.24652 4.71652 6.83737C5.22443 6.31644 5.72625 5.78918 6.2301 5.26614C6.41498 5.07421 6.60189 4.8844 6.80912 4.66928Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Enable dynamic cyber risk measurement and tracking over time.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"8\" viewBox=\"0 0 9 8\" fill=\"none\"><path d=\"M6.80912 4.66928C6.71769 4.66928 6.65674 4.66928 6.59783 4.66928C2.91851 4.66928 4.36301 4.66928 0.68369 4.66928C0.34034 4.66928 0.076226 4.46259 0.0152767 4.15256C-0.0720846 3.70966 0.224537 3.33847 0.667436 3.33637C1.58371 3.33637 3.90183 3.33637 6.70347 3.33637C6.72785 3.33637 6.7502 3.33637 6.79896 3.33637C6.76239 3.29629 6.74004 3.26888 6.71566 3.24357C6.05538 2.55813 5.39509 1.87058 4.7348 1.18515C4.57836 1.02275 4.48491 0.837155 4.51132 0.598833C4.53976 0.339422 4.67182 0.158044 4.8953 0.0589195C5.11269 -0.0380963 5.32804 -0.0170059 5.52105 0.134845C5.582 0.183353 5.63889 0.240297 5.69374 0.297241C6.71769 1.3602 7.73961 2.42315 8.76357 3.48611C9.07847 3.81301 9.07847 4.19264 8.7656 4.51743C7.72539 5.59725 6.68519 6.67708 5.64701 7.75691C5.4601 7.95094 5.24678 8.04585 4.98469 7.97836C4.52554 7.85814 4.31831 7.24652 4.71652 6.83737C5.22443 6.31644 5.72625 5.78918 6.2301 5.26614C6.41498 5.07421 6.60189 4.8844 6.80912 4.66928Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Empower security teams to manage cyber threats effectively.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-19a1b260 e-con-full card-box e-flex e-con e-child\" data-id=\"19a1b260\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33d6b539 vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"33d6b539\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ivanti Risk Sence<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e09581 elementor-widget elementor-widget-text-editor\" data-id=\"3e09581\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tIvanti Neurons for RBVM equips you with the tools to adopt a more strategic, risk-focused approach to vulnerability management, significantly enhancing ability to protect against cyber threats.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9324673 vinerbility-sec-text elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"9324673\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"8\" viewBox=\"0 0 9 8\" fill=\"none\"><path d=\"M6.80912 4.66928C6.71769 4.66928 6.65674 4.66928 6.59783 4.66928C2.91851 4.66928 4.36301 4.66928 0.68369 4.66928C0.34034 4.66928 0.076226 4.46259 0.0152767 4.15256C-0.0720846 3.70966 0.224537 3.33847 0.667436 3.33637C1.58371 3.33637 3.90183 3.33637 6.70347 3.33637C6.72785 3.33637 6.7502 3.33637 6.79896 3.33637C6.76239 3.29629 6.74004 3.26888 6.71566 3.24357C6.05538 2.55813 5.39509 1.87058 4.7348 1.18515C4.57836 1.02275 4.48491 0.837155 4.51132 0.598833C4.53976 0.339422 4.67182 0.158044 4.8953 0.0589195C5.11269 -0.0380963 5.32804 -0.0170059 5.52105 0.134845C5.582 0.183353 5.63889 0.240297 5.69374 0.297241C6.71769 1.3602 7.73961 2.42315 8.76357 3.48611C9.07847 3.81301 9.07847 4.19264 8.7656 4.51743C7.72539 5.59725 6.68519 6.67708 5.64701 7.75691C5.4601 7.95094 5.24678 8.04585 4.98469 7.97836C4.52554 7.85814 4.31831 7.24652 4.71652 6.83737C5.22443 6.31644 5.72625 5.78918 6.2301 5.26614C6.41498 5.07421 6.60189 4.8844 6.80912 4.66928Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Get actionable insights and Threat Intelligence for making informed decisions about remediation.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"8\" viewBox=\"0 0 9 8\" fill=\"none\"><path d=\"M6.80912 4.66928C6.71769 4.66928 6.65674 4.66928 6.59783 4.66928C2.91851 4.66928 4.36301 4.66928 0.68369 4.66928C0.34034 4.66928 0.076226 4.46259 0.0152767 4.15256C-0.0720846 3.70966 0.224537 3.33847 0.667436 3.33637C1.58371 3.33637 3.90183 3.33637 6.70347 3.33637C6.72785 3.33637 6.7502 3.33637 6.79896 3.33637C6.76239 3.29629 6.74004 3.26888 6.71566 3.24357C6.05538 2.55813 5.39509 1.87058 4.7348 1.18515C4.57836 1.02275 4.48491 0.837155 4.51132 0.598833C4.53976 0.339422 4.67182 0.158044 4.8953 0.0589195C5.11269 -0.0380963 5.32804 -0.0170059 5.52105 0.134845C5.582 0.183353 5.63889 0.240297 5.69374 0.297241C6.71769 1.3602 7.73961 2.42315 8.76357 3.48611C9.07847 3.81301 9.07847 4.19264 8.7656 4.51743C7.72539 5.59725 6.68519 6.67708 5.64701 7.75691C5.4601 7.95094 5.24678 8.04585 4.98469 7.97836C4.52554 7.85814 4.31831 7.24652 4.71652 6.83737C5.22443 6.31644 5.72625 5.78918 6.2301 5.26614C6.41498 5.07421 6.60189 4.8844 6.80912 4.66928Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Get customizable dashboards and reports to monitor security posture and make data-driven decisions.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"8\" viewBox=\"0 0 9 8\" fill=\"none\"><path d=\"M6.80912 4.66928C6.71769 4.66928 6.65674 4.66928 6.59783 4.66928C2.91851 4.66928 4.36301 4.66928 0.68369 4.66928C0.34034 4.66928 0.076226 4.46259 0.0152767 4.15256C-0.0720846 3.70966 0.224537 3.33847 0.667436 3.33637C1.58371 3.33637 3.90183 3.33637 6.70347 3.33637C6.72785 3.33637 6.7502 3.33637 6.79896 3.33637C6.76239 3.29629 6.74004 3.26888 6.71566 3.24357C6.05538 2.55813 5.39509 1.87058 4.7348 1.18515C4.57836 1.02275 4.48491 0.837155 4.51132 0.598833C4.53976 0.339422 4.67182 0.158044 4.8953 0.0589195C5.11269 -0.0380963 5.32804 -0.0170059 5.52105 0.134845C5.582 0.183353 5.63889 0.240297 5.69374 0.297241C6.71769 1.3602 7.73961 2.42315 8.76357 3.48611C9.07847 3.81301 9.07847 4.19264 8.7656 4.51743C7.72539 5.59725 6.68519 6.67708 5.64701 7.75691C5.4601 7.95094 5.24678 8.04585 4.98469 7.97836C4.52554 7.85814 4.31831 7.24652 4.71652 6.83737C5.22443 6.31644 5.72625 5.78918 6.2301 5.26614C6.41498 5.07421 6.60189 4.8844 6.80912 4.66928Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">View cyber risk from multiple sources, including network scanners and manual findings.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"8\" viewBox=\"0 0 9 8\" fill=\"none\"><path d=\"M6.80912 4.66928C6.71769 4.66928 6.65674 4.66928 6.59783 4.66928C2.91851 4.66928 4.36301 4.66928 0.68369 4.66928C0.34034 4.66928 0.076226 4.46259 0.0152767 4.15256C-0.0720846 3.70966 0.224537 3.33847 0.667436 3.33637C1.58371 3.33637 3.90183 3.33637 6.70347 3.33637C6.72785 3.33637 6.7502 3.33637 6.79896 3.33637C6.76239 3.29629 6.74004 3.26888 6.71566 3.24357C6.05538 2.55813 5.39509 1.87058 4.7348 1.18515C4.57836 1.02275 4.48491 0.837155 4.51132 0.598833C4.53976 0.339422 4.67182 0.158044 4.8953 0.0589195C5.11269 -0.0380963 5.32804 -0.0170059 5.52105 0.134845C5.582 0.183353 5.63889 0.240297 5.69374 0.297241C6.71769 1.3602 7.73961 2.42315 8.76357 3.48611C9.07847 3.81301 9.07847 4.19264 8.7656 4.51743C7.72539 5.59725 6.68519 6.67708 5.64701 7.75691C5.4601 7.95094 5.24678 8.04585 4.98469 7.97836C4.52554 7.85814 4.31831 7.24652 4.71652 6.83737C5.22443 6.31644 5.72625 5.78918 6.2301 5.26614C6.41498 5.07421 6.60189 4.8844 6.80912 4.66928Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Get ole-based access and integrating with other systems like ITSM for better collaboration between security and IT teams.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b6c4989 e-con-full card-box e-flex e-con e-child\" data-id=\"b6c4989\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3933116 vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"3933116\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ISSQUARED\u00ae IAM Solutions<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-029e4d1 sol-sec elementor-widget elementor-widget-text-editor\" data-id=\"029e4d1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Through ISSQUARED\u00ae, we provide a wide range of IAM services that cover everything from basic identity administration to advanced governance.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81fb01c vinerbility-sec-text elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"81fb01c\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"8\" viewBox=\"0 0 9 8\" fill=\"none\"><path d=\"M6.80912 4.66928C6.71769 4.66928 6.65674 4.66928 6.59783 4.66928C2.91851 4.66928 4.36301 4.66928 0.68369 4.66928C0.34034 4.66928 0.076226 4.46259 0.0152767 4.15256C-0.0720846 3.70966 0.224537 3.33847 0.667436 3.33637C1.58371 3.33637 3.90183 3.33637 6.70347 3.33637C6.72785 3.33637 6.7502 3.33637 6.79896 3.33637C6.76239 3.29629 6.74004 3.26888 6.71566 3.24357C6.05538 2.55813 5.39509 1.87058 4.7348 1.18515C4.57836 1.02275 4.48491 0.837155 4.51132 0.598833C4.53976 0.339422 4.67182 0.158044 4.8953 0.0589195C5.11269 -0.0380963 5.32804 -0.0170059 5.52105 0.134845C5.582 0.183353 5.63889 0.240297 5.69374 0.297241C6.71769 1.3602 7.73961 2.42315 8.76357 3.48611C9.07847 3.81301 9.07847 4.19264 8.7656 4.51743C7.72539 5.59725 6.68519 6.67708 5.64701 7.75691C5.4601 7.95094 5.24678 8.04585 4.98469 7.97836C4.52554 7.85814 4.31831 7.24652 4.71652 6.83737C5.22443 6.31644 5.72625 5.78918 6.2301 5.26614C6.41498 5.07421 6.60189 4.8844 6.80912 4.66928Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Simplify and streamline identity and access management processes from administration to governance.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"8\" viewBox=\"0 0 9 8\" fill=\"none\"><path d=\"M6.80912 4.66928C6.71769 4.66928 6.65674 4.66928 6.59783 4.66928C2.91851 4.66928 4.36301 4.66928 0.68369 4.66928C0.34034 4.66928 0.076226 4.46259 0.0152767 4.15256C-0.0720846 3.70966 0.224537 3.33847 0.667436 3.33637C1.58371 3.33637 3.90183 3.33637 6.70347 3.33637C6.72785 3.33637 6.7502 3.33637 6.79896 3.33637C6.76239 3.29629 6.74004 3.26888 6.71566 3.24357C6.05538 2.55813 5.39509 1.87058 4.7348 1.18515C4.57836 1.02275 4.48491 0.837155 4.51132 0.598833C4.53976 0.339422 4.67182 0.158044 4.8953 0.0589195C5.11269 -0.0380963 5.32804 -0.0170059 5.52105 0.134845C5.582 0.183353 5.63889 0.240297 5.69374 0.297241C6.71769 1.3602 7.73961 2.42315 8.76357 3.48611C9.07847 3.81301 9.07847 4.19264 8.7656 4.51743C7.72539 5.59725 6.68519 6.67708 5.64701 7.75691C5.4601 7.95094 5.24678 8.04585 4.98469 7.97836C4.52554 7.85814 4.31831 7.24652 4.71652 6.83737C5.22443 6.31644 5.72625 5.78918 6.2301 5.26614C6.41498 5.07421 6.60189 4.8844 6.80912 4.66928Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Leverage a comprehensive suite of IAM solutions<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"8\" viewBox=\"0 0 9 8\" fill=\"none\"><path d=\"M6.80912 4.66928C6.71769 4.66928 6.65674 4.66928 6.59783 4.66928C2.91851 4.66928 4.36301 4.66928 0.68369 4.66928C0.34034 4.66928 0.076226 4.46259 0.0152767 4.15256C-0.0720846 3.70966 0.224537 3.33847 0.667436 3.33637C1.58371 3.33637 3.90183 3.33637 6.70347 3.33637C6.72785 3.33637 6.7502 3.33637 6.79896 3.33637C6.76239 3.29629 6.74004 3.26888 6.71566 3.24357C6.05538 2.55813 5.39509 1.87058 4.7348 1.18515C4.57836 1.02275 4.48491 0.837155 4.51132 0.598833C4.53976 0.339422 4.67182 0.158044 4.8953 0.0589195C5.11269 -0.0380963 5.32804 -0.0170059 5.52105 0.134845C5.582 0.183353 5.63889 0.240297 5.69374 0.297241C6.71769 1.3602 7.73961 2.42315 8.76357 3.48611C9.07847 3.81301 9.07847 4.19264 8.7656 4.51743C7.72539 5.59725 6.68519 6.67708 5.64701 7.75691C5.4601 7.95094 5.24678 8.04585 4.98469 7.97836C4.52554 7.85814 4.31831 7.24652 4.71652 6.83737C5.22443 6.31644 5.72625 5.78918 6.2301 5.26614C6.41498 5.07421 6.60189 4.8844 6.80912 4.66928Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Adopt a business-centric approach to tailor security processes that support specific business needs<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"8\" viewBox=\"0 0 9 8\" fill=\"none\"><path d=\"M6.80912 4.66928C6.71769 4.66928 6.65674 4.66928 6.59783 4.66928C2.91851 4.66928 4.36301 4.66928 0.68369 4.66928C0.34034 4.66928 0.076226 4.46259 0.0152767 4.15256C-0.0720846 3.70966 0.224537 3.33847 0.667436 3.33637C1.58371 3.33637 3.90183 3.33637 6.70347 3.33637C6.72785 3.33637 6.7502 3.33637 6.79896 3.33637C6.76239 3.29629 6.74004 3.26888 6.71566 3.24357C6.05538 2.55813 5.39509 1.87058 4.7348 1.18515C4.57836 1.02275 4.48491 0.837155 4.51132 0.598833C4.53976 0.339422 4.67182 0.158044 4.8953 0.0589195C5.11269 -0.0380963 5.32804 -0.0170059 5.52105 0.134845C5.582 0.183353 5.63889 0.240297 5.69374 0.297241C6.71769 1.3602 7.73961 2.42315 8.76357 3.48611C9.07847 3.81301 9.07847 4.19264 8.7656 4.51743C7.72539 5.59725 6.68519 6.67708 5.64701 7.75691C5.4601 7.95094 5.24678 8.04585 4.98469 7.97836C4.52554 7.85814 4.31831 7.24652 4.71652 6.83737C5.22443 6.31644 5.72625 5.78918 6.2301 5.26614C6.41498 5.07421 6.60189 4.8844 6.80912 4.66928Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Enhance the governance of security management, ensuring robust control over access and identity processes<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1b8dbae1 e-con-full card-box e-flex e-con e-child\" data-id=\"1b8dbae1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5305f5d0 vulnerability-sec-heading elementor-widget elementor-widget-heading\" data-id=\"5305f5d0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Securin\u2019s VMaaS<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-518d891 sol-sec elementor-widget elementor-widget-text-editor\" data-id=\"518d891\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tSecurin\u2019s VMaaS methodology involves identifying and prioritizing vulnerabilities based on their potential for weaponization and the risk they pose to the business, ensuring that the most critical vulnerabilities are addressed promptly.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce7d27f vinerbility-sec-text elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"ce7d27f\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"8\" viewBox=\"0 0 9 8\" fill=\"none\"><path d=\"M6.80912 4.66928C6.71769 4.66928 6.65674 4.66928 6.59783 4.66928C2.91851 4.66928 4.36301 4.66928 0.68369 4.66928C0.34034 4.66928 0.076226 4.46259 0.0152767 4.15256C-0.0720846 3.70966 0.224537 3.33847 0.667436 3.33637C1.58371 3.33637 3.90183 3.33637 6.70347 3.33637C6.72785 3.33637 6.7502 3.33637 6.79896 3.33637C6.76239 3.29629 6.74004 3.26888 6.71566 3.24357C6.05538 2.55813 5.39509 1.87058 4.7348 1.18515C4.57836 1.02275 4.48491 0.837155 4.51132 0.598833C4.53976 0.339422 4.67182 0.158044 4.8953 0.0589195C5.11269 -0.0380963 5.32804 -0.0170059 5.52105 0.134845C5.582 0.183353 5.63889 0.240297 5.69374 0.297241C6.71769 1.3602 7.73961 2.42315 8.76357 3.48611C9.07847 3.81301 9.07847 4.19264 8.7656 4.51743C7.72539 5.59725 6.68519 6.67708 5.64701 7.75691C5.4601 7.95094 5.24678 8.04585 4.98469 7.97836C4.52554 7.85814 4.31831 7.24652 4.71652 6.83737C5.22443 6.31644 5.72625 5.78918 6.2301 5.26614C6.41498 5.07421 6.60189 4.8844 6.80912 4.66928Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">We perform comprehensive vulnerability scanning across all layers from infrastructure to web applications, ensuring thorough security assessments.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"8\" viewBox=\"0 0 9 8\" fill=\"none\"><path d=\"M6.80912 4.66928C6.71769 4.66928 6.65674 4.66928 6.59783 4.66928C2.91851 4.66928 4.36301 4.66928 0.68369 4.66928C0.34034 4.66928 0.076226 4.46259 0.0152767 4.15256C-0.0720846 3.70966 0.224537 3.33847 0.667436 3.33637C1.58371 3.33637 3.90183 3.33637 6.70347 3.33637C6.72785 3.33637 6.7502 3.33637 6.79896 3.33637C6.76239 3.29629 6.74004 3.26888 6.71566 3.24357C6.05538 2.55813 5.39509 1.87058 4.7348 1.18515C4.57836 1.02275 4.48491 0.837155 4.51132 0.598833C4.53976 0.339422 4.67182 0.158044 4.8953 0.0589195C5.11269 -0.0380963 5.32804 -0.0170059 5.52105 0.134845C5.582 0.183353 5.63889 0.240297 5.69374 0.297241C6.71769 1.3602 7.73961 2.42315 8.76357 3.48611C9.07847 3.81301 9.07847 4.19264 8.7656 4.51743C7.72539 5.59725 6.68519 6.67708 5.64701 7.75691C5.4601 7.95094 5.24678 8.04585 4.98469 7.97836C4.52554 7.85814 4.31831 7.24652 4.71652 6.83737C5.22443 6.31644 5.72625 5.78918 6.2301 5.26614C6.41498 5.07421 6.60189 4.8844 6.80912 4.66928Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Get integrated threat contextualization of vulnerabilities, aligning remediation with current cyber threats.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"8\" viewBox=\"0 0 9 8\" fill=\"none\"><path d=\"M6.80912 4.66928C6.71769 4.66928 6.65674 4.66928 6.59783 4.66928C2.91851 4.66928 4.36301 4.66928 0.68369 4.66928C0.34034 4.66928 0.076226 4.46259 0.0152767 4.15256C-0.0720846 3.70966 0.224537 3.33847 0.667436 3.33637C1.58371 3.33637 3.90183 3.33637 6.70347 3.33637C6.72785 3.33637 6.7502 3.33637 6.79896 3.33637C6.76239 3.29629 6.74004 3.26888 6.71566 3.24357C6.05538 2.55813 5.39509 1.87058 4.7348 1.18515C4.57836 1.02275 4.48491 0.837155 4.51132 0.598833C4.53976 0.339422 4.67182 0.158044 4.8953 0.0589195C5.11269 -0.0380963 5.32804 -0.0170059 5.52105 0.134845C5.582 0.183353 5.63889 0.240297 5.69374 0.297241C6.71769 1.3602 7.73961 2.42315 8.76357 3.48611C9.07847 3.81301 9.07847 4.19264 8.7656 4.51743C7.72539 5.59725 6.68519 6.67708 5.64701 7.75691C5.4601 7.95094 5.24678 8.04585 4.98469 7.97836C4.52554 7.85814 4.31831 7.24652 4.71652 6.83737C5.22443 6.31644 5.72625 5.78918 6.2301 5.26614C6.41498 5.07421 6.60189 4.8844 6.80912 4.66928Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Prioritize vulnerabilities based on their potential for weaponization, focusing on the most critical risks.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"8\" viewBox=\"0 0 9 8\" fill=\"none\"><path d=\"M6.80912 4.66928C6.71769 4.66928 6.65674 4.66928 6.59783 4.66928C2.91851 4.66928 4.36301 4.66928 0.68369 4.66928C0.34034 4.66928 0.076226 4.46259 0.0152767 4.15256C-0.0720846 3.70966 0.224537 3.33847 0.667436 3.33637C1.58371 3.33637 3.90183 3.33637 6.70347 3.33637C6.72785 3.33637 6.7502 3.33637 6.79896 3.33637C6.76239 3.29629 6.74004 3.26888 6.71566 3.24357C6.05538 2.55813 5.39509 1.87058 4.7348 1.18515C4.57836 1.02275 4.48491 0.837155 4.51132 0.598833C4.53976 0.339422 4.67182 0.158044 4.8953 0.0589195C5.11269 -0.0380963 5.32804 -0.0170059 5.52105 0.134845C5.582 0.183353 5.63889 0.240297 5.69374 0.297241C6.71769 1.3602 7.73961 2.42315 8.76357 3.48611C9.07847 3.81301 9.07847 4.19264 8.7656 4.51743C7.72539 5.59725 6.68519 6.67708 5.64701 7.75691C5.4601 7.95094 5.24678 8.04585 4.98469 7.97836C4.52554 7.85814 4.31831 7.24652 4.71652 6.83737C5.22443 6.31644 5.72625 5.78918 6.2301 5.26614C6.41498 5.07421 6.60189 4.8844 6.80912 4.66928Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Prioritize vulnerabilities based on their potential for weaponization, focusing on the most critical risks.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-74ef3dc1 section-relative e-flex e-con-boxed e-con e-parent\" data-id=\"74ef3dc1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4993386e e-con-full e-flex e-con e-child\" data-id=\"4993386e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-516aaacd elementor-widget elementor-widget-heading\" data-id=\"516aaacd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Veracode : Application Security<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3edab1f elementor-widget elementor-widget-heading\" data-id=\"3edab1f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Trusted Source For Application Security<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16b5720e elementor-widget elementor-widget-heading\" data-id=\"16b5720e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Providing scalable and flexible vulnerability management<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73b1e4e3 accordion-custom elementor-widget elementor-widget-n-accordion\" data-id=\"73b1e4e3\" data-element_type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1940\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1940\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Comprehensive Cybersecurity Solutions <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1940\" class=\"elementor-element elementor-element-23f475a8 e-con-full e-flex e-con e-child\" data-id=\"23f475a8\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1940\" class=\"elementor-element elementor-element-e722016 e-flex e-con-boxed e-con e-child\" data-id=\"e722016\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-413fc5c1 elementor-widget elementor-widget-heading\" data-id=\"413fc5c1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Comprehensive Cybersecurity Solutions<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1752b42d elementor-widget elementor-widget-text-editor\" data-id=\"1752b42d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tGreen Method Technologies offers a wide range of cybersecurity services that provide full digital protection, ensuring that all aspects of a company\u2019s digital presence are secure. This includes advanced threat detection systems and tailored security advice to meet specific business needs\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76fd1be elementor-widget elementor-widget-button\" data-id=\"76fd1be\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Protect your Network<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1940\" class=\"elementor-element elementor-element-137e3bf0 e-flex e-con-boxed e-con e-child\" data-id=\"137e3bf0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15b3432 elementor-widget elementor-widget-image\" data-id=\"15b3432\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"400\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/cyber-security-technology-online-data-protection-innovative-perception.webp\" class=\"attachment-large size-large wp-image-6476\" alt=\"cyber-security-technology-online-data-protection-innovative-perception\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/cyber-security-technology-online-data-protection-innovative-perception.webp 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/cyber-security-technology-online-data-protection-innovative-perception-300x208.webp 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1941\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1941\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Expertise in Vulnerability Management <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1941\" class=\"elementor-element elementor-element-21f68d94 e-con-full e-flex e-con e-child\" data-id=\"21f68d94\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1941\" class=\"elementor-element elementor-element-6e4cb4a1 e-flex e-con-boxed e-con e-child\" data-id=\"6e4cb4a1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-358132c0 elementor-widget elementor-widget-heading\" data-id=\"358132c0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Expertise in Vulnerability Management<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d651a21 elementor-widget elementor-widget-text-editor\" data-id=\"2d651a21\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tUnderstanding the landscape of cyber risk is more crucial than ever. Green Method Technologies vulnerability management services integrate seamlessly with your IT infrastructure to provide continuous visibility into your cyber risk exposure. We empower your security teams with the tools needed to prioritize vulnerabilities based on actual business risk, transforming how you safeguard your assets.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ba0bcf6 elementor-widget elementor-widget-button\" data-id=\"4ba0bcf6\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to an Expert<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1941\" class=\"elementor-element elementor-element-7402c0b4 e-flex e-con-boxed e-con e-child\" data-id=\"7402c0b4\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-359a51a elementor-widget elementor-widget-image\" data-id=\"359a51a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"438\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/hacker-working-code-network.webp\" class=\"attachment-large size-large wp-image-6478\" alt=\"hacker-working-code-network\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/hacker-working-code-network.webp 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/hacker-working-code-network-300x228.webp 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1942\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1942\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Streamlined Compliance and Governance <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1942\" class=\"elementor-element elementor-element-42a7e6bd e-con-full e-flex e-con e-child\" data-id=\"42a7e6bd\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1942\" class=\"elementor-element elementor-element-6f45771d e-flex e-con-boxed e-con e-child\" data-id=\"6f45771d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66dc6963 elementor-widget elementor-widget-heading\" data-id=\"66dc6963\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Streamlined Compliance and Governance<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e3cabe3 elementor-widget elementor-widget-text-editor\" data-id=\"2e3cabe3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tNavigating the complex requirements of cybersecurity compliance and governance can be challenging. Green Method Technologies simplifies this process, enabling your organization to enforce effective policies and procedures that enhance security while aligning with industry standards and regulations.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6275cba4 elementor-widget elementor-widget-button\" data-id=\"6275cba4\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to an Expert<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1942\" class=\"elementor-element elementor-element-486d6369 e-flex e-con-boxed e-con e-child\" data-id=\"486d6369\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42c1edaa elementor-widget elementor-widget-image\" data-id=\"42c1edaa\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"378\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/fingerprint-scanner-futuristic-digital-processing-biometric-identification-secure-access-granted-by-valid-fingerprint-scan-cyber-security-internet-digital-program.webp\" class=\"attachment-large size-large wp-image-6477\" alt=\"fingerprint-scanner-futuristic-digital-processing-biometric-identification-secure-access-granted-by-valid-fingerprint-scan-cyber-security-internet-digital-program\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/fingerprint-scanner-futuristic-digital-processing-biometric-identification-secure-access-granted-by-valid-fingerprint-scan-cyber-security-internet-digital-program.webp 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/fingerprint-scanner-futuristic-digital-processing-biometric-identification-secure-access-granted-by-valid-fingerprint-scan-cyber-security-internet-digital-program-300x197.webp 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1943\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1943\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Real-Time Threat Intelligence <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1943\" class=\"elementor-element elementor-element-5e6e0905 e-con-full e-flex e-con e-child\" data-id=\"5e6e0905\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1943\" class=\"elementor-element elementor-element-67886683 e-flex e-con-boxed e-con e-child\" data-id=\"67886683\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d78ef0c elementor-widget elementor-widget-heading\" data-id=\"7d78ef0c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Real-Time Threat Intelligence<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b410564 elementor-widget elementor-widget-text-editor\" data-id=\"b410564\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tYou gain access to cutting-edge threat intelligence that helps you stay one step ahead of cyber threats. Our services include the latest Common Vulnerabilities and Exposures (CVE) checks and contextual insights about active threats in the wild, ensuring that your response to emerging threats is both swift and informed.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cb41894 elementor-widget elementor-widget-button\" data-id=\"3cb41894\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to an Expert<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1943\" class=\"elementor-element elementor-element-65901118 e-flex e-con-boxed e-con e-child\" data-id=\"65901118\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2fe4e27d elementor-widget elementor-widget-image\" data-id=\"2fe4e27d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"344\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/businessman-with-tablet-pointing-digital-s-futuristic-pattern-design-presenting-important-information-executive-displaying-symbols-crucial-data.webp\" class=\"attachment-large size-large wp-image-6472\" alt=\"businessman-with-tablet-pointing-digital-s-futuristic-pattern-design-presenting-important-information-executive-displaying-symbols-crucial-data\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/businessman-with-tablet-pointing-digital-s-futuristic-pattern-design-presenting-important-information-executive-displaying-symbols-crucial-data.webp 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/businessman-with-tablet-pointing-digital-s-futuristic-pattern-design-presenting-important-information-executive-displaying-symbols-crucial-data-300x179.webp 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1944\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1944\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Behavioral Analytics <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1944\" class=\"elementor-element elementor-element-1d6649ec e-con-full e-flex e-con e-child\" data-id=\"1d6649ec\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1944\" class=\"elementor-element elementor-element-270ca396 e-flex e-con-boxed e-con e-child\" data-id=\"270ca396\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-73600fea elementor-widget elementor-widget-heading\" data-id=\"73600fea\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Behavioral Analytics<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b1f4b91 elementor-widget elementor-widget-text-editor\" data-id=\"5b1f4b91\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tBy analyzing the behavior of users and endpoints, Green Method endpoint security service can identify deviations from normal activities that may indicate a security breach. This behavioral approach helps in catching sophisticated attacks that might not be detected by traditional signature-based methods.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71de45c2 elementor-widget elementor-widget-button\" data-id=\"71de45c2\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to an Expert<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1944\" class=\"elementor-element elementor-element-3698b840 e-flex e-con-boxed e-con e-child\" data-id=\"3698b840\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67a5abd elementor-widget elementor-widget-image\" data-id=\"67a5abd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"345\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Behavioral-Analytics.png\" class=\"attachment-large size-large wp-image-5877\" alt=\"Behavioral-Analytics\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Behavioral-Analytics.png 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Behavioral-Analytics-300x179.png 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1945\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1945\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Patch Management <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1945\" class=\"elementor-element elementor-element-9b79b4b e-con-full e-flex e-con e-child\" data-id=\"9b79b4b\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1945\" class=\"elementor-element elementor-element-44da783c e-flex e-con-boxed e-con e-child\" data-id=\"44da783c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-481c443b elementor-widget elementor-widget-heading\" data-id=\"481c443b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Patch Management<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fe2a9c4 elementor-widget elementor-widget-text-editor\" data-id=\"6fe2a9c4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tIn partnership with Ivanti, Green Method implements effective patch management strategies to ensure that all software on endpoints is up-to-date with the latest security patches. This reduces vulnerabilities that can be exploited by attackers and helps maintain the overall security of the system.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46857426 elementor-widget elementor-widget-button\" data-id=\"46857426\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to an Expert<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1945\" class=\"elementor-element elementor-element-7e564aeb e-flex e-con-boxed e-con e-child\" data-id=\"7e564aeb\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f02c8fa elementor-widget elementor-widget-image\" data-id=\"7f02c8fa\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"338\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Patch-Management.png\" class=\"attachment-large size-large wp-image-5878\" alt=\"Patch Management\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Patch-Management.png 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Patch-Management-300x176.png 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1946\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1946\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Expertise in Vulnerability Management <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1946\" class=\"elementor-element elementor-element-e603bfd e-con-full e-flex e-con e-child\" data-id=\"e603bfd\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1946\" class=\"elementor-element elementor-element-0c3c542 e-flex e-con-boxed e-con e-child\" data-id=\"0c3c542\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c3d69a5 elementor-widget elementor-widget-heading\" data-id=\"c3d69a5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Expertise in Vulnerability Management<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f19a7a elementor-widget elementor-widget-text-editor\" data-id=\"1f19a7a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tGreen Method Technologies\u2019 proficiency in vulnerability management is evident through its ability to proactively identify, prioritize, and respond to threats. This systematic approach helps in significantly reducing the risk of cyberattacks\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7011c95 elementor-widget elementor-widget-button\" data-id=\"7011c95\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to an Expert<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1946\" class=\"elementor-element elementor-element-29a22c8 e-flex e-con-boxed e-con e-child\" data-id=\"29a22c8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d0e626 elementor-widget elementor-widget-image\" data-id=\"6d0e626\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"378\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/businessman-handholding-data-protection-security-icons-with-shield-lock-network-connection.webp\" class=\"attachment-large size-large wp-image-6481\" alt=\"businessman-handholding-data-protection-security-icons-with-shield-lock-network-connection\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/businessman-handholding-data-protection-security-icons-with-shield-lock-network-connection.webp 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/businessman-handholding-data-protection-security-icons-with-shield-lock-network-connection-300x197.webp 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1947\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"8\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1947\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Regulatory Compliance <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1947\" class=\"elementor-element elementor-element-71bd9e1 e-con-full e-flex e-con e-child\" data-id=\"71bd9e1\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1947\" class=\"elementor-element elementor-element-eb12f49 e-flex e-con-boxed e-con e-child\" data-id=\"eb12f49\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2ce1ef elementor-widget elementor-widget-heading\" data-id=\"e2ce1ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Regulatory Compliance<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a4c6ca elementor-widget elementor-widget-text-editor\" data-id=\"5a4c6ca\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tGreen Method ensures that endpoint security measures comply with relevant laws and regulations, helping organizations avoid legal penalties and reputational damage associated with data breaches.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe47988 elementor-widget elementor-widget-button\" data-id=\"fe47988\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to an Expert<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1947\" class=\"elementor-element elementor-element-771165a e-flex e-con-boxed e-con e-child\" data-id=\"771165a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-24f1c75 elementor-widget elementor-widget-image\" data-id=\"24f1c75\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"281\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/business-man-working-office-desktop.webp\" class=\"attachment-large size-large wp-image-6473\" alt=\"business-man-working-office-desktop\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/business-man-working-office-desktop.webp 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/business-man-working-office-desktop-300x146.webp 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1948\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"9\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1948\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> User Training and Awareness <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1948\" class=\"elementor-element elementor-element-62c0fb3 e-con-full e-flex e-con e-child\" data-id=\"62c0fb3\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1948\" class=\"elementor-element elementor-element-d31d1db e-flex e-con-boxed e-con e-child\" data-id=\"d31d1db\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c38884e elementor-widget elementor-widget-heading\" data-id=\"c38884e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">User Training and Awareness<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3171ec4 elementor-widget elementor-widget-text-editor\" data-id=\"3171ec4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tGreen Method technologies also focuses on the human aspect of cybersecurity by providing training and awareness programs. These programs educate employees about the latest cyber threats and safe computing practices, reducing the risk of security breaches due to human error.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c21fde6 elementor-widget elementor-widget-button\" data-id=\"c21fde6\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to an Expert<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1948\" class=\"elementor-element elementor-element-1adeabd e-flex e-con-boxed e-con e-child\" data-id=\"1adeabd\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd01d64 elementor-widget elementor-widget-image\" data-id=\"fd01d64\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"577\" height=\"344\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Thrive-in-a-Culture-IMG001.webp\" class=\"attachment-large size-large wp-image-6479\" alt=\"Thrive-in-a-Culture-IMG001\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Thrive-in-a-Culture-IMG001.webp 577w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/Thrive-in-a-Culture-IMG001-300x179.webp 300w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-39b244d e-flex e-con-boxed e-con e-parent\" data-id=\"39b244d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f543114 e-con-full e-flex e-con e-child\" data-id=\"f543114\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3aabd9e e-con-full e-flex e-con e-child\" data-id=\"3aabd9e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b6631ef elementor-widget elementor-widget-heading\" data-id=\"b6631ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Get fully managed endpoint protection<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce312c8 e-con-full e-flex e-con e-child\" data-id=\"ce312c8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-35c92c9 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"35c92c9\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/greenmethod.net\/dev\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"8\" height=\"8\" viewBox=\"0 0 8 8\" fill=\"none\"><path d=\"M6.11577 2.85087C6.05112 2.91551 6.00803 2.95861 5.96637 3.00027C3.36469 5.60194 4.38611 4.58052 1.78444 7.1822C1.54166 7.42498 1.20875 7.46559 0.946429 7.28946C0.571478 7.03806 0.51875 6.56585 0.830436 6.25118C1.47834 5.60327 3.11749 3.96412 5.09856 1.98306C5.1158 1.96582 5.1316 1.95002 5.16608 1.91554C5.11188 1.91306 5.07669 1.90948 5.04156 1.90882C4.08999 1.89104 3.13693 1.87176 2.18536 1.85398C1.95991 1.84976 1.76259 1.78461 1.61274 1.59742C1.44943 1.39387 1.41455 1.17224 1.50248 0.944122C1.5876 0.721806 1.75479 0.58444 1.99864 0.555338C2.07604 0.546541 2.15653 0.546582 2.23558 0.548059C3.71125 0.575639 5.18548 0.604655 6.66115 0.632234C7.11497 0.640716 7.38341 0.909153 7.39184 1.36005C7.41985 2.85914 7.44787 4.35823 7.47733 5.85588C7.48236 6.12525 7.39863 6.3432 7.16558 6.4808C6.75591 6.72047 6.17689 6.43452 6.16915 5.86363C6.15995 5.13613 6.14196 4.40846 6.12838 3.68234C6.1234 3.4159 6.12135 3.14951 6.11577 2.85087Z\" fill=\"white\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk To Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a6d3ecb e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"a6d3ecb\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Vulnerability management for a holistic security posture Our Vulnerability Management services are designed to enhance your organization\u2019s security posture, protect your brand reputation, and reduce security debt through a strategic, risk-based approach. Explore Vulnerability Management Services In a digital landscape that\u2019s evolving faster than ever, your organization\u2019s cybersecurity cannot lag behind. At Green Method Technologies, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-3699","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/pages\/3699","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/comments?post=3699"}],"version-history":[{"count":0,"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/pages\/3699\/revisions"}],"wp:attachment":[{"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/media?parent=3699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}