{"id":1952,"date":"2022-02-27T21:04:07","date_gmt":"2022-02-27T20:04:07","guid":{"rendered":"https:\/\/solutech.true-emotions.studio\/?page_id=1952"},"modified":"2022-02-27T21:49:47","modified_gmt":"2022-02-27T20:49:47","slug":"main","status":"publish","type":"page","link":"https:\/\/www.acstunisia.com\/","title":{"rendered":"Home"},"content":{"rendered":"[vc_row full_width=\u00a0\u00bbstretch_row_content_no_spaces\u00a0\u00bb pix_padding_top=\u00a0\u00bbpadding No\u00a0\u00bb pix_padding_bottom=\u00a0\u00bbpadding No\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb][vc_column]\n\t\t\t<!-- START Home 1 REVOLUTION SLIDER 6.5.12 --><p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t<rs-module-wrap id=\"rev_slider_1_1_wrapper\" data-source=\"gallery\" style=\"visibility:hidden;background:#04061f;padding:0;margin:0px auto;margin-top:0;margin-bottom:0;\">\n\t\t\t\t<rs-module id=\"rev_slider_1_1\" style=\"\" data-version=\"6.5.12\">\n\t\t\t\t\t<rs-slides>\n\t\t\t\t\t\t<rs-slide style=\"position: absolute;\" data-key=\"rs-1\" data-title=\"Slide\" data-thumb=\"\/\/www.acstunisia.com\/wp-content\/uploads\/2019\/03\/s1-100x50.jpg\" data-anim=\"ms:600;\" data-in=\"o:0;\" data-out=\"a:false;\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"\/\/www.acstunisia.com\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" title=\"s1\" width=\"2000\" height=\"1003\" class=\"rev-slidebg tp-rs-img rs-lazyload\" data-lazyload=\"\/\/www.acstunisia.com\/wp-content\/uploads\/2019\/03\/s1.jpg\" data-bg=\"p:center bottom;\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><p\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-1-layer-1\" \n\t\t\t\t\t\t\t\tclass=\"rs-layer rs-selectable\"\n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:l,l,c,c;xo:2px,44px,-128px,-7px;yo:380px,335px,328px,335px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:16,16,15,16;l:24,22,22,22;a:left,left,left,center;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:476px,459px,514px,435px;h:auto,92px,auto,auto;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"e:power4.inOut;sp:2000;sR:10;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:3990;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:5;font-family:'Karla';\"\n\t\t\t\t\t\t\t>We scan your websites for vulnerabilities, even clean and protect your infected sites, using very powerful antivirus and advanced security tools. We offer virus removal, vulnerability and firewall protection. \n\t\t\t\t\t\t\t<\/p><!--\n\n\t\t\t\t\t\t\t--><a\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-1-layer-3\" \n\t\t\t\t\t\t\t\tclass=\"rs-layer pix-button rev-btn rs-selectable\"\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.acstunisia.com\/index.php\/contacts\/\" target=\"_self\" rel=\"nofollow\"\n\t\t\t\t\t\t\t\tdata-type=\"button\"\n\t\t\t\t\t\t\t\tdata-color=\"rgba(255,255,255,1)\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:l,l,c,c;xo:0,43px,-315px,-2px;yo:493px,435px,423px,450px;\"\n\t\t\t\t\t\t\t\tdata-text=\"s:15;l:17;fw:700;a:inherit;\"\n\t\t\t\t\t\t\t\tdata-rsp_bd=\"off\"\n\t\t\t\t\t\t\t\tdata-padding=\"t:20;r:45,45,40,45;b:22;l:45,45,40,45;\"\n\t\t\t\t\t\t\t\tdata-border=\"bor:50px,50px,50px,50px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"sR:10;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:5690;\"\n\t\t\t\t\t\t\t\tdata-frame_hover=\"bgc:#ffb916;boc:#000;bor:50px,50px,50px,50px;bos:solid;bow:0px,0px,0px,0px;oX:50;oY:50;sp:0;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:6;background-color:#ffb219;font-family:'Poppins';cursor:pointer;outline:none;box-shadow:none;box-sizing:border-box;-moz-box-sizing:border-box;-webkit-box-sizing:border-box;\"\n\t\t\t\t\t\t\t>about us \n\t\t\t\t\t\t\t<\/a><!--\n\n\t\t\t\t\t\t\t--><a\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-1-layer-4\" \n\t\t\t\t\t\t\t\tclass=\"rs-layer pix-button rev-btn rs-selectable\"\n\t\t\t\t\t\t\t\thref=\"https:\/\/www.acstunisia.com\/index.php\/about-us\/\" target=\"_self\" rel=\"nofollow\"\n\t\t\t\t\t\t\t\tdata-type=\"button\"\n\t\t\t\t\t\t\t\tdata-color=\"#0a0a0a||#000000||#000000||#000000\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:l,l,c,c;xo:183px,227px,-133px,-360px;yo:491px,434px,422px,459px;\"\n\t\t\t\t\t\t\t\tdata-text=\"s:15;l:17;fw:700,700,700,500;a:inherit;\"\n\t\t\t\t\t\t\t\tdata-rsp_bd=\"off\"\n\t\t\t\t\t\t\t\tdata-padding=\"t:20,20,20,18;r:45,45,40,40;b:22,22,22,20;l:45,45,40,40;\"\n\t\t\t\t\t\t\t\tdata-border=\"bos:solid;boc:rgba(0,0,0,1);bow:2px,2px,2px,2px;bor:50px,50px,50px,50px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"sR:10;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:5690;\"\n\t\t\t\t\t\t\t\tdata-frame_hover=\"c:#0a0a0a;bgc:linear-gradient(rgba(215,215,215,1) 0%, rgba(247,247,247,1) 100%);boc:#000;bor:50px,50px,50px,50px;bos:solid;bow:2px,2px,2px,2px;oX:50;oY:50;sp:0;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:7;background:linear-gradient(rgba(247,247,247,1) 0%, rgba(215,215,215,1) 100%);font-family:'Poppins';cursor:pointer;outline:none;box-shadow:none;box-sizing:border-box;-moz-box-sizing:border-box;-webkit-box-sizing:border-box;\"\n\t\t\t\t\t\t\t>application \n\t\t\t\t\t\t\t<\/a><!--\n\n\t\t\t\t\t\t\t--><p\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-1-layer-6\" \n\t\t\t\t\t\t\t\tclass=\"rs-layer rs-selectable\"\n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:l,l,c,c;xo:1px,42px,-132px,-10px;y:m,t,t,t;yo:-86px,269px,255px,263px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:45,36,36,36;l:21,45,45,45;fw:600;a:left,left,left,center;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:554px,514px,514px,435px;h:51px,auto,auto,auto;\"\n\t\t\t\t\t\t\t\tdata-padding=\"t:10,0,0,0;b:10,0,0,0;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"e:power2.inOut;sp:2000;sR:10;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:3990;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Poppins';\"\n\t\t\t\t\t\t\t>Web Security System. \n\t\t\t\t\t\t\t<\/p><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t\t<rs-slide style=\"position: absolute;\" data-key=\"rs-3\" data-title=\"Slide\" data-thumb=\"\/\/www.acstunisia.com\/wp-content\/uploads\/2019\/03\/sl2-100x50.jpg\" data-anim=\"ms:600;\" data-in=\"o:0;\" data-out=\"a:false;\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"\/\/www.acstunisia.com\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" title=\"sl2\" width=\"2000\" height=\"1003\" class=\"rev-slidebg tp-rs-img rs-lazyload\" data-lazyload=\"\/\/www.acstunisia.com\/wp-content\/uploads\/2019\/03\/sl2.jpg\" data-bg=\"p:center bottom;\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><p\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-3-layer-1\" \n\t\t\t\t\t\t\t\tclass=\"rs-layer rs-selectable\"\n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:l,l,c,c;xo:2px,44px,-128px,-7px;yo:380px,335px,328px,335px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:16,16,15,16;l:24,22,22,22;a:left,left,left,center;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:476px,459px,514px,435px;h:auto,92px,auto,auto;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"e:power4.inOut;sp:2000;sR:10;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:3990;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:5;font-family:'Karla';\"\n\t\t\t\t\t\t\t>Our Web Server Protection makes deployment and management simple. We provide you\nwith tools like web application firewall profiles, dashboard\nstatus and notifications, along with detailed logging and reporting. \n\t\t\t\t\t\t\t<\/p><!--\n\n\t\t\t\t\t\t\t--><a\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-3-layer-3\" \n\t\t\t\t\t\t\t\tclass=\"rs-layer pix-button rev-btn rs-selectable\"\n\t\t\t\t\t\t\t\thref=\"https:\/\/solutech.true-emotions.studio\/defender\/about-us\" target=\"_self\" rel=\"nofollow\"\n\t\t\t\t\t\t\t\tdata-type=\"button\"\n\t\t\t\t\t\t\t\tdata-color=\"rgba(255,255,255,1)\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:l,l,c,c;xo:0,43px,-315px,-2px;yo:493px,435px,423px,450px;\"\n\t\t\t\t\t\t\t\tdata-text=\"s:15;l:17;fw:700;a:inherit;\"\n\t\t\t\t\t\t\t\tdata-rsp_bd=\"off\"\n\t\t\t\t\t\t\t\tdata-padding=\"t:20;r:45,45,40,45;b:22;l:45,45,40,45;\"\n\t\t\t\t\t\t\t\tdata-border=\"bor:50px,50px,50px,50px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"sR:10;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:5690;\"\n\t\t\t\t\t\t\t\tdata-frame_hover=\"bgc:#ffb916;boc:#000;bor:50px,50px,50px,50px;bos:solid;bow:0px,0px,0px,0px;oX:50;oY:50;sp:0;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:6;background-color:#ffb219;font-family:'Poppins';cursor:pointer;outline:none;box-shadow:none;box-sizing:border-box;-moz-box-sizing:border-box;-webkit-box-sizing:border-box;\"\n\t\t\t\t\t\t\t>about us \n\t\t\t\t\t\t\t<\/a><!--\n\n\t\t\t\t\t\t\t--><a\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-3-layer-4\" \n\t\t\t\t\t\t\t\tclass=\"rs-layer pix-button rev-btn rs-selectable\"\n\t\t\t\t\t\t\t\thref=\"https:\/\/solutech.true-emotions.studio\/defender\/services\/server-administration\/\" target=\"_self\" rel=\"nofollow\"\n\t\t\t\t\t\t\t\tdata-type=\"button\"\n\t\t\t\t\t\t\t\tdata-color=\"#0a0a0a||#000000||#000000||#000000\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:l,l,c,c;xo:183px,227px,-133px,-360px;yo:491px,434px,422px,459px;\"\n\t\t\t\t\t\t\t\tdata-text=\"s:15;l:17;fw:700,700,700,500;a:inherit;\"\n\t\t\t\t\t\t\t\tdata-rsp_bd=\"off\"\n\t\t\t\t\t\t\t\tdata-padding=\"t:20,20,20,18;r:45,45,40,40;b:22,22,22,20;l:45,45,40,40;\"\n\t\t\t\t\t\t\t\tdata-border=\"bos:solid;boc:rgba(0,0,0,1);bow:2px,2px,2px,2px;bor:50px,50px,50px,50px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"sR:10;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:5690;\"\n\t\t\t\t\t\t\t\tdata-frame_hover=\"c:#0a0a0a;bgc:linear-gradient(rgba(215,215,215,1) 0%, rgba(247,247,247,1) 100%);boc:#000;bor:50px,50px,50px,50px;bos:solid;bow:2px,2px,2px,2px;oX:50;oY:50;sp:0;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:7;background:linear-gradient(rgba(247,247,247,1) 0%, rgba(215,215,215,1) 100%);font-family:'Poppins';cursor:pointer;outline:none;box-shadow:none;box-sizing:border-box;-moz-box-sizing:border-box;-webkit-box-sizing:border-box;\"\n\t\t\t\t\t\t\t>application \n\t\t\t\t\t\t\t<\/a><!--\n\n\t\t\t\t\t\t\t--><p\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-3-layer-6\" \n\t\t\t\t\t\t\t\tclass=\"rs-layer rs-selectable\"\n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:l,l,c,c;xo:1px,42px,-132px,-10px;y:m,t,t,t;yo:-86px,269px,255px,263px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:45,36,36,36;l:21,45,45,45;fw:600;a:left,left,left,center;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:554px,514px,514px,435px;h:51px,auto,auto,auto;\"\n\t\t\t\t\t\t\t\tdata-padding=\"t:10,0,0,0;b:10,0,0,0;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"e:power2.inOut;sp:2000;sR:10;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:3990;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Poppins';\"\n\t\t\t\t\t\t\t>Web Server Protection. \n\t\t\t\t\t\t\t<\/p><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t\t<rs-slide style=\"position: absolute;\" data-key=\"rs-4\" data-title=\"Slide\" data-thumb=\"\/\/www.acstunisia.com\/wp-content\/uploads\/2019\/04\/sla4-100x50.jpg\" data-anim=\"ms:600;\" data-in=\"o:0;\" data-out=\"a:false;\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"\/\/www.acstunisia.com\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" title=\"sla4\" width=\"2000\" height=\"1003\" class=\"rev-slidebg tp-rs-img rs-lazyload\" data-lazyload=\"\/\/www.acstunisia.com\/wp-content\/uploads\/2019\/04\/sla4.jpg\" data-bg=\"p:center bottom;\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><p\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-4-layer-1\" \n\t\t\t\t\t\t\t\tclass=\"rs-layer rs-selectable\"\n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:l,l,c,c;xo:2px,44px,-128px,-7px;yo:380px,335px,328px,335px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:16,16,15,16;l:24,22,22,22;a:left,left,left,center;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:476px,459px,514px,435px;h:auto,92px,auto,auto;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"e:power4.inOut;sp:2000;sR:10;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:3990;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:5;font-family:'Karla';\"\n\t\t\t\t\t\t\t>A website security audit scans your website and its server for existing or potential weaknesses that hackers can exploit. It covers entire infrastructure, from its core software to extensions, themes, server settings, SSL connection, configurations, etc.  \n\t\t\t\t\t\t\t<\/p><!--\n\n\t\t\t\t\t\t\t--><a\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-4-layer-3\" \n\t\t\t\t\t\t\t\tclass=\"rs-layer pix-button rev-btn rs-selectable\"\n\t\t\t\t\t\t\t\thref=\"https:\/\/solutech.true-emotions.studio\/defender\/about-us\" target=\"_self\" rel=\"nofollow\"\n\t\t\t\t\t\t\t\tdata-type=\"button\"\n\t\t\t\t\t\t\t\tdata-color=\"rgba(255,255,255,1)\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:l,l,c,c;xo:0,43px,-315px,-2px;yo:493px,435px,423px,450px;\"\n\t\t\t\t\t\t\t\tdata-text=\"s:15;l:17;fw:700;a:inherit;\"\n\t\t\t\t\t\t\t\tdata-rsp_bd=\"off\"\n\t\t\t\t\t\t\t\tdata-padding=\"t:20;r:45,45,40,45;b:22;l:45,45,40,45;\"\n\t\t\t\t\t\t\t\tdata-border=\"bor:50px,50px,50px,50px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"sR:10;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:5690;\"\n\t\t\t\t\t\t\t\tdata-frame_hover=\"bgc:#ffb916;boc:#000;bor:50px,50px,50px,50px;bos:solid;bow:0px,0px,0px,0px;oX:50;oY:50;sp:0;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:6;background-color:#ffb219;font-family:'Poppins';cursor:pointer;outline:none;box-shadow:none;box-sizing:border-box;-moz-box-sizing:border-box;-webkit-box-sizing:border-box;\"\n\t\t\t\t\t\t\t>about us \n\t\t\t\t\t\t\t<\/a><!--\n\n\t\t\t\t\t\t\t--><a\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-4-layer-4\" \n\t\t\t\t\t\t\t\tclass=\"rs-layer pix-button rev-btn rs-selectable\"\n\t\t\t\t\t\t\t\thref=\"https:\/\/solutech.true-emotions.studio\/defender\/services\/server-administration\/\" target=\"_self\" rel=\"nofollow\"\n\t\t\t\t\t\t\t\tdata-type=\"button\"\n\t\t\t\t\t\t\t\tdata-color=\"#0a0a0a||#000000||#000000||#000000\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:l,l,c,c;xo:183px,227px,-133px,-360px;yo:491px,434px,422px,459px;\"\n\t\t\t\t\t\t\t\tdata-text=\"s:15;l:17;fw:700,700,700,500;a:inherit;\"\n\t\t\t\t\t\t\t\tdata-rsp_bd=\"off\"\n\t\t\t\t\t\t\t\tdata-padding=\"t:20,20,20,18;r:45,45,40,40;b:22,22,22,20;l:45,45,40,40;\"\n\t\t\t\t\t\t\t\tdata-border=\"bos:solid;boc:rgba(0,0,0,1);bow:2px,2px,2px,2px;bor:50px,50px,50px,50px;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"sR:10;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:5690;\"\n\t\t\t\t\t\t\t\tdata-frame_hover=\"c:#0a0a0a;bgc:linear-gradient(rgba(215,215,215,1) 0%, rgba(247,247,247,1) 100%);boc:#000;bor:50px,50px,50px,50px;bos:solid;bow:2px,2px,2px,2px;oX:50;oY:50;sp:0;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:7;background:linear-gradient(rgba(247,247,247,1) 0%, rgba(215,215,215,1) 100%);font-family:'Poppins';cursor:pointer;outline:none;box-shadow:none;box-sizing:border-box;-moz-box-sizing:border-box;-webkit-box-sizing:border-box;\"\n\t\t\t\t\t\t\t>application \n\t\t\t\t\t\t\t<\/a><!--\n\n\t\t\t\t\t\t\t--><p\n\t\t\t\t\t\t\t\tid=\"slider-1-slide-4-layer-6\" \n\t\t\t\t\t\t\t\tclass=\"rs-layer rs-selectable\"\n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:l,l,c,c;xo:1px,42px,-132px,-10px;y:m,t,t,t;yo:-86px,269px,255px,263px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:45,36,36,36;l:21,45,45,45;fw:600;a:left,left,left,center;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:554px,514px,514px,435px;h:51px,auto,auto,auto;\"\n\t\t\t\t\t\t\t\tdata-padding=\"t:10,0,0,0;b:10,0,0,0;\"\n\t\t\t\t\t\t\t\tdata-frame_1=\"e:power2.inOut;sp:2000;sR:10;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:3990;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Poppins';\"\n\t\t\t\t\t\t\t>Server security audit. \n\t\t\t\t\t\t\t<\/p><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t<\/rs-module>\n\t\t\t\t<script>\n\t\t\t\t\tsetREVStartSize({c: 'rev_slider_1_1',rl:[1240,1024,778,480],el:[830,748,960,720],gw:[1300,1024,778,480],gh:[830,748,960,720],type:'standard',justify:'',layout:'fullwidth',mh:\"0\"});if (window.RS_MODULES!==undefined && window.RS_MODULES.modules!==undefined && window.RS_MODULES.modules[\"revslider11\"]!==undefined) {window.RS_MODULES.modules[\"revslider11\"].once = false;window.revapi1 = undefined;if (window.RS_MODULES.checkMinimal!==undefined) window.RS_MODULES.checkMinimal()}\n\t\t\t\t<\/script>\n\t\t\t<\/rs-module-wrap>\n\t\t\t<!-- END REVOLUTION SLIDER -->\n[\/vc_column][\/vc_row][vc_row pix_padding_top=\u00a0\u00bbpadding XL\u00a0\u00bb pix_padding_bottom=\u00a0\u00bbpadding XL\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb awb_type=\u00a0\u00bbcolor\u00a0\u00bb awb_stretch=\u00a0\u00bb1&Prime; awb_color=\u00a0\u00bb#f6f6f7&Prime; css=\u00a0\u00bb.vc_custom_1565716190235{background-color: #ffffff !important;}\u00a0\u00bb][vc_column][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb pix_padding_bottom=\u00a0\u00bbpadding S\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb][vc_column_inner width=\u00a0\u00bb1\/3&Prime;][common_icon_box style=\u00a0\u00bbpix-ibox-top\u00a0\u00bb icon_size=\u00a0\u00bbpix-icon-xl\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fsolutech.true-emotions.studio%2Fdefender%2Fservices%2Fconfidential-information-protection%2F|title:Confidential%20information%20protection||\u00a0\u00bb shadow=\u00a0\u00bbpix-shadow-hover\u00a0\u00bb shadow_values=\u00a0\u00bb%5B%7B%22horizontal%22%3A%220%22%2C%22vertical%22%3A%224%22%2C%22blur%22%3A%2216%22%2C%22spread%22%3A%220%22%2C%22color%22%3A%22%23000000%22%2C%22opacity%22%3A%2216%22%7D%5D\u00a0\u00bb shadow_transition=\u00a0\u00bb0&Prime; shadow_effect=\u00a0\u00bbbottom-curve\u00a0\u00bb shadow_bg_color=\u00a0\u00bb#f6f6f7&Prime; bg_color=\u00a0\u00bb\u00a0\u00bb image=\u00a0\u00bb2052&Prime; title=\u00a0\u00bbConfidential Information\u00a0\u00bb btn_txt=\u00a0\u00bbread more\u00a0\u00bb]Confidential information and trade secrets can be amongst the most valuable assets a business owns. A competitive edge in the marketplace may rely on a business having certain information.[\/common_icon_box][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/3&Prime;][common_icon_box style=\u00a0\u00bbpix-ibox-top\u00a0\u00bb icon_size=\u00a0\u00bbpix-icon-xl\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fsolutech.true-emotions.studio%2Fdefender%2Fservices%2Fmobile-security-system%2F|title:Mobile%20security%20system||\u00a0\u00bb shadow=\u00a0\u00bbpix-shadow-hover\u00a0\u00bb shadow_values=\u00a0\u00bb%5B%7B%22horizontal%22%3A%220%22%2C%22vertical%22%3A%224%22%2C%22blur%22%3A%2216%22%2C%22spread%22%3A%220%22%2C%22color%22%3A%22%23000000%22%2C%22opacity%22%3A%2216%22%7D%5D\u00a0\u00bb shadow_transition=\u00a0\u00bb0&Prime; shadow_effect=\u00a0\u00bbbottom-curve\u00a0\u00bb shadow_bg_color=\u00a0\u00bb#f6f6f7&Prime; image=\u00a0\u00bb2063&Prime; title=\u00a0\u00bbMobile Security\u00a0\u00bb btn_txt=\u00a0\u00bbread more\u00a0\u00bb]<b>Mobile Device Security<\/b>\u00a0refers to the measures designed to protect sensitive information stored on and transmitted by laptops, smartphones, tablets, wearables, and other portable devices.[\/common_icon_box][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/3&Prime;][common_icon_box style=\u00a0\u00bbpix-ibox-top\u00a0\u00bb icon_size=\u00a0\u00bbpix-icon-xl\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fsolutech.true-emotions.studio%2Fdefender%2Fservices%2Fwebsite-protection%2F|title:Website%20protection||\u00a0\u00bb shadow=\u00a0\u00bbpix-shadow-hover\u00a0\u00bb shadow_values=\u00a0\u00bb%5B%7B%22horizontal%22%3A%220%22%2C%22vertical%22%3A%224%22%2C%22blur%22%3A%2216%22%2C%22spread%22%3A%220%22%2C%22color%22%3A%22%23000000%22%2C%22opacity%22%3A%2216%22%7D%5D\u00a0\u00bb shadow_transition=\u00a0\u00bb0&Prime; shadow_effect=\u00a0\u00bbbottom-curve\u00a0\u00bb shadow_bg_color=\u00a0\u00bb#f6f6f7&Prime; image=\u00a0\u00bb2057&Prime; title=\u00a0\u00bbWebsite Protection\u00a0\u00bb btn_txt=\u00a0\u00bbread more\u00a0\u00bb]Protect your site from hacks and attacks. Our Web Application Firewall (WAF) and Intrusion Prevention System (IPS) provide the protection required against website threats. Let us preserve your website rankings.[\/common_icon_box][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=\u00a0\u00bb1\/3&Prime;][common_icon_box style=\u00a0\u00bbpix-ibox-top\u00a0\u00bb icon_size=\u00a0\u00bbpix-icon-xl\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fsolutech.true-emotions.studio%2Fdefender%2Fservices%2Fserver-administration%2F|title:Server%20administration||\u00a0\u00bb shadow=\u00a0\u00bbpix-shadow-hover\u00a0\u00bb shadow_values=\u00a0\u00bb%5B%7B%22horizontal%22%3A%220%22%2C%22vertical%22%3A%224%22%2C%22blur%22%3A%2216%22%2C%22spread%22%3A%220%22%2C%22color%22%3A%22%23000000%22%2C%22opacity%22%3A%2216%22%7D%5D\u00a0\u00bb shadow_transition=\u00a0\u00bb0&Prime; shadow_effect=\u00a0\u00bbbottom-curve\u00a0\u00bb shadow_bg_color=\u00a0\u00bb#f6f6f7&Prime; image=\u00a0\u00bb2064&Prime; title=\u00a0\u00bbServer Administration\u00a0\u00bb btn_txt=\u00a0\u00bbread more\u00a0\u00bb]Secure administrative hosts specifically for the purposes of creating secure platforms from which privileged accounts can perform administrative tasks in Active Directory or on domain controllers[\/common_icon_box][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/3&Prime;][common_icon_box style=\u00a0\u00bbpix-ibox-top\u00a0\u00bb icon_size=\u00a0\u00bbpix-icon-xl\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fsolutech.true-emotions.studio%2Fdefender%2Fservices%2Fhacking-protection%2F|title:Hucking%20Protection||\u00a0\u00bb shadow=\u00a0\u00bbpix-shadow-hover\u00a0\u00bb shadow_values=\u00a0\u00bb%5B%7B%22horizontal%22%3A%220%22%2C%22vertical%22%3A%224%22%2C%22blur%22%3A%2216%22%2C%22spread%22%3A%220%22%2C%22color%22%3A%22%23000000%22%2C%22opacity%22%3A%2216%22%7D%5D\u00a0\u00bb shadow_transition=\u00a0\u00bb0&Prime; shadow_effect=\u00a0\u00bbbottom-curve\u00a0\u00bb shadow_bg_color=\u00a0\u00bb#f6f6f7&Prime; image=\u00a0\u00bb2054&Prime; title=\u00a0\u00bbHucking Protection\u00a0\u00bb btn_txt=\u00a0\u00bbread more\u00a0\u00bb]The <strong>security audit<\/strong> is a service of capital relevance for companies and institutions in the digital era. It allows us to know, in all its complexity, the company system and to optimize it.[\/common_icon_box][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/3&Prime;][common_icon_box style=\u00a0\u00bbpix-ibox-top\u00a0\u00bb icon_size=\u00a0\u00bbpix-icon-xl\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fsolutech.true-emotions.studio%2Fdefender%2Fservices%2Fsmart-home%2F|title:Smart%20home||\u00a0\u00bb shadow=\u00a0\u00bbpix-shadow-hover\u00a0\u00bb shadow_values=\u00a0\u00bb%5B%7B%22horizontal%22%3A%220%22%2C%22vertical%22%3A%224%22%2C%22blur%22%3A%2216%22%2C%22spread%22%3A%220%22%2C%22color%22%3A%22%23000000%22%2C%22opacity%22%3A%2216%22%7D%5D\u00a0\u00bb shadow_transition=\u00a0\u00bb0&Prime; shadow_effect=\u00a0\u00bbbottom-curve\u00a0\u00bb shadow_bg_color=\u00a0\u00bb#f6f6f7&Prime; image=\u00a0\u00bb2059&Prime; title=\u00a0\u00bbCyber security\u00a0\u00bb btn_txt=\u00a0\u00bbread more\u00a0\u00bb]Our cyber security services protect you from breaches and attacks on your systems that may ordinarily go unnoticed. You will save the substantial costs of a disrupted business and other damages.[\/common_icon_box][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb gap=\u00a0\u00bb30&Prime; gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb pix_padding=\u00a0\u00bbpix-padding-both\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1565716207291{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column][vc_row_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime;][common_title title=\u00a0\u00bbPenetration Testing\u00a0\u00bb position=\u00a0\u00bbtext-left\u00a0\u00bb show_decor=\u00a0\u00bboff\u00a0\u00bb title_before=\u00a0\u00bb\u00a0\u00bb]\n<p style=\"text-align: left;\">We take extra measures to ensure our customers are safe from cyber threats. Our team of security experts and Offensive Security Certified Professionals (OSCP), provide insight in vulnerabilities in your IT environment or web application.<\/p>\n[\/common_title][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime;][common_video url=\u00a0\u00bbhttps:\/\/vimeo.com\/277611804&Prime; display=\u00a0\u00bbbutton\u00a0\u00bb radius=\u00a0\u00bbpix-round\u00a0\u00bb][\/common_video][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb pix_padding_top=\u00a0\u00bbpadding XL\u00a0\u00bb ptextcolor=\u00a0\u00bbWhite\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb gradient_direction=\u00a0\u00bbto bottom right\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1553275011699{background-color: #1d0e45 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1545415062426{margin-top: -17px !important;padding-right: 25px !important;}\u00a0\u00bb][common_title title=\u00a0\u00bbCyber Security, Data Intelligence, GDPR, Digital Solutions, Transformation &amp; Innovation.\u00a0\u00bb size=\u00a0\u00bbpix-s\u00a0\u00bb position=\u00a0\u00bbtext-left\u00a0\u00bb show_decor=\u00a0\u00bboff\u00a0\u00bb color=\u00a0\u00bbwhite-heading\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1645038407629{margin-bottom: -40px !important;padding-top: 40px !important;}\u00a0\u00bb][\/common_title][common_tab_acc tabs=\u00a0\u00bb%5B%7B%22label%22%3A%22Cyber%20Security%22%2C%22content_t%22%3A%22Our%20Cyber%20Security%20Consulting%20back%20your%20organization%20with%20years%20of%20experience%20working%20on%20projects%20for%20some%20of%20the%20world%E2%80%99s%20largest%20organizations.%20Tap%20into%20that%20expertise%20on%20demand%20to%20support%20your%20projects%20or%20as%20you%20implement%20technical%20controls.%22%2C%22link%22%3A%22url%3A%2523%7C%7C%7C%22%2C%22tab_id%22%3A%22950083091%22%7D%2C%7B%22label%22%3A%22Penetration%20Testing%22%2C%22content_t%22%3A%22Our%20penetration%20testing%20team%20can%20identify%20cybersecurity%20vulnerabilities%20before%20an%20intruder%20has%20the%20opportunity%20to%20infiltrate%20your%20network%20or%20computer%20system.%20We%E2%80%99ll%20uncover%20weaknesses%20on%20your%20network%20or%20within%20applications%20and%20can%20work%20with%20you%20to%20remediate%20and%20reduce%20risk.%20%22%2C%22link%22%3A%22url%3A%2523%7C%7C%7C%22%2C%22tab_id%22%3A%221665653503%22%7D%2C%7B%22label%22%3A%22Access%20control%22%2C%22content_t%22%3A%22You%20administer%20your%20ACS%20environment%20using%20either%20the%20ACS%20Management%20Portal%20or%20the%20ACS%20Management%20Service.%20The%20ACS%20Management%20Portal%20is%20the%20simplest%20and%20most%20commonly%20used%20method.%20It%E2%80%99s%20a%20web-based%20console%20that%20provides%20access%20to%20most%20ACS%20features%20and%20functionality.%20%22%2C%22link%22%3A%22url%3A%2523%7C%7C%7C%22%2C%22tab_id%22%3A%22352706552%22%7D%2C%7B%22label%22%3A%22Network%20Monitoring%22%2C%22content_t%22%3A%22Our%2024&#215;7%20Cyber%20Security%20Operations%20Center%20puts%20state-of-the-art%20threat%20intelligence%20behind%20your%20business%20to%20detect%20attacks%20against%20critical%20assets%20before%20it%20leads%20to%20a%20data%20breach.%20Know%20what%E2%80%99s%20happening%20in%20real-time%2C%20with%20continual%20log%20retention%20and%20storage%20built%20right%20in.%20%22%2C%22link%22%3A%22url%3A%2523%7C%7C%7C%22%2C%22tab_id%22%3A%221618635055%22%7D%2C%7B%22label%22%3A%22Encryption%22%2C%22content_t%22%3A%22Whether%20in%20the%20office%20or%20around%20the%20world%2C%20your%20teams%20need%20access%20to%20your%20business%20resources%20quickly%20and%20securely.%20NordLayer%20provides%20a%20number%20of%20capabilities%20to%20ensure%20your%20teams%20can%20access%20company%20resources%20with%20peace%20of%20mind%20%E2%80%94%20wherever%20they%20are.%22%2C%22link%22%3A%22url%3A%2523%7C%7C%7C%22%2C%22tab_id%22%3A%221618635055%22%7D%5D\u00a0\u00bb btn_link_txt=\u00a0\u00bbread more\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1545415054109{margin-top: -17px !important;padding-right: 15px !important;padding-left: 25px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00a0\u00bb][vc_single_image image=\u00a0\u00bb2349&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb alignment=\u00a0\u00bbcenter\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb ptextcolor=\u00a0\u00bbWhite\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1553273023810{background-color: #080021 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/4&Prime;][common_amount_box icon_size=\u00a0\u00bbpix-icon-xl\u00a0\u00bb position=\u00a0\u00bbpix-text-left\u00a0\u00bb title=\u00a0\u00bbClients Protection\u00a0\u00bb amount=\u00a0\u00bb704+\u00a0\u00bb image=\u00a0\u00bb2205&Prime;][\/common_amount_box][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][common_amount_box icon_size=\u00a0\u00bbpix-icon-xl\u00a0\u00bb position=\u00a0\u00bbpix-text-left\u00a0\u00bb title=\u00a0\u00bbSmart Home Protection\u00a0\u00bb amount=\u00a0\u00bb200+\u00a0\u00bb image=\u00a0\u00bb2212&Prime;][\/common_amount_box][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][common_amount_box icon_size=\u00a0\u00bbpix-icon-xl\u00a0\u00bb position=\u00a0\u00bbpix-text-left\u00a0\u00bb title=\u00a0\u00bbWebsite Protection\u00a0\u00bb amount=\u00a0\u00bb800+\u00a0\u00bb image=\u00a0\u00bb2201&Prime;][\/common_amount_box][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime;][common_amount_box icon_size=\u00a0\u00bbpix-icon-xl\u00a0\u00bb position=\u00a0\u00bbpix-text-left\u00a0\u00bb title=\u00a0\u00bbProgrammers team\u00a0\u00bb amount=\u00a0\u00bb45+\u00a0\u00bb image=\u00a0\u00bb2214&Prime;][\/common_amount_box][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb pix_padding_top=\u00a0\u00bbpadding XL\u00a0\u00bb pix_padding_bottom=\u00a0\u00bbpadding XL\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1565716668371{background-color: #f7f7f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1545064568742{padding-right: 25px !important;}\u00a0\u00bb][common_title title=\u00a0\u00bbCyber Security Advice\u00a0\u00bb position=\u00a0\u00bbtext-left\u00a0\u00bb show_decor=\u00a0\u00bboff\u00a0\u00bb]At ACS, we firmly believe that sharing <a href=\"https:\/\/www.acstunisia.com\/index.php\/contacts\/\">cyber security advice<\/a>, education and raising awareness is the most effective way of reducing the vulnerability of small businesses to the most common types of cyber crime.[\/common_title][common_progress values=\u00a0\u00bb%5B%7B%22label%22%3A%22Enhanced%20website%20security%22%2C%22value%22%3A%2270%22%7D%2C%7B%22label%22%3A%22Endpoint%20security%20and%20analytics%22%2C%22value%22%3A%2280%22%7D%2C%7B%22label%22%3A%22Private%20companies%20and%20clients%22%2C%22value%22%3A%2260%22%7D%2C%7B%22label%22%3A%22Software%20development%20companies%22%2C%22value%22%3A%2290%22%7D%5D\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1545064561746{padding-left: 25px !important;}\u00a0\u00bb][common_tab_acc toggle_type=\u00a0\u00bbaccordion\u00a0\u00bb accordion=\u00a0\u00bb%5B%7B%22label_a%22%3A%22Identity%20%26%20access%20management%22%2C%22content_a%22%3A%22Ensure%20users%20accessing%20your%20network%20and%20devices%20are%20verified%20with%20such%20tools%20as%20SSO%2C%20biometrics%2C%202FA%2C%20and%20user%20provisioning.%20Anyone%20can%20be%20at%20risk%20of%20a%20data%20breach%20%E2%80%94%20from%20individuals%20to%20high-level%20enterprises%20and%20governments.%20More%20importantly%2C%20anyone%20can%20put%20others%20at%20risk%20if%20they%20are%20not%20protected.%22%2C%22tab_id_a%22%3A%221728902031%22%7D%2C%7B%22label_a%22%3A%22Network%20access%20control%22%2C%22content_a%22%3A%22Set%20access%20permissions%20and%20security%20policies%20for%20users%2C%20devices%2C%20and%20apps%20to%20ensure%20only%20authorized%20staff%20can%20access%20sensitive%20and%20confidential%20data.%22%2C%22tab_id_a%22%3A%221720174618%22%7D%2C%7B%22label_a%22%3A%22Cloud%20segmentation%22%2C%22content_a%22%3A%22With%20ACS%20Teams%2C%20you%20can%20create%20a%20security%20strategy%20that%20ensures%20there%20are%20multiple%20checkpoints%20and%20Zero%20Trust%20policies%20when%20it%20comes%20to%20network%20access%20identification%20and%20authentication.%22%2C%22tab_id_a%22%3A%22491228797%22%7D%2C%7B%22label_a%22%3A%22Website%20security%22%2C%22content_a%22%3A%22Protect%20your%20website%20from%20breaches%2C%20intrusions%20and%20other%20threats%20to%20your%20business%20data%20with%20powerful%20encryption%20and%20bespoke%20tools%20to%20combat%20multiple%20types%20of%20cyberattacks.%22%2C%22tab_id_a%22%3A%22183026561%22%7D%5D\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb pix_padding_top=\u00a0\u00bbpadding XL\u00a0\u00bb ptextcolor=\u00a0\u00bbWhite\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1553275019550{background-color: #1d0e45 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/2&Prime; gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1546025656690{padding-right: 25px !important;}\u00a0\u00bb][common_title title=\u00a0\u00bbThe most complete and effective protection for your home and office\u00a0\u00bb size=\u00a0\u00bbpix-s\u00a0\u00bb position=\u00a0\u00bbtext-left\u00a0\u00bb show_decor=\u00a0\u00bboff\u00a0\u00bb color=\u00a0\u00bbwhite-heading\u00a0\u00bb][\/common_title][common_points image=\u00a0\u00bb2155&Prime; points=\u00a0\u00bb%5B%7B%22top_pos%22%3A%2275%22%2C%22left_pos%22%3A%228%22%2C%22content_d%22%3A%22Silent%20authentication%20with%20Microsoft%20Active%20Directory%20%2F%20NTML%20and%20Kerberos%20compatibility%20%2F%20Integrated%20LDAP%20authentication%20possible%22%7D%2C%7B%22top_pos%22%3A%2232%22%2C%22left_pos%22%3A%2222%22%2C%22content_d%22%3A%22ClamAV%20antivirus%20augmented%20with%20S%C3%A9curit%C3%A9Info%20bases%20%2F%20Integrated%20intrusion%20detection%20system%22%7D%2C%7B%22top_pos%22%3A%2250%22%2C%22left_pos%22%3A%2254%22%2C%22content_d%22%3A%22Stats%20of%20usage%20by%20users%20%2F%20Stats%20of%20web%20and%20antiviral%20filtering%20%2F%20Reports%20saved%20and%20exportable%20in%20csv%20format%22%7D%2C%7B%22top_pos%22%3A%2217%22%2C%22left_pos%22%3A%2269%22%2C%22content_d%22%3A%22Collection%20and%20storage%20of%20logs%20in%20native%20squid%20format%20%2F%20Export%20of%20automatic%20logs%20to%20network%20share%2C%20ftp%20server%2C%20webdav%22%7D%5D\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb][vc_row_inner gap=\u00a0\u00bb15&Prime; ptextcolor=\u00a0\u00bbWhite\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb][vc_column_inner][vc_empty_space height=\u00a0\u00bb60px\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime;][common_icon_box image=\u00a0\u00bb2058&Prime; title=\u00a0\u00bbCyber Security\u00a0\u00bb]ACS provides an attack surface management platform that helps keep your infrastructure safe. We have a leading-edge Vulnerability Assessment tool that automates the reporting process.[\/common_icon_box][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime;][common_icon_box image=\u00a0\u00bb2062&Prime; title=\u00a0\u00bbPenetration Testing\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1645104034876{margin-bottom: 10px !important;}\u00a0\u00bb]Our penetration testing team can identify cybersecurity vulnerabilities before an intruder has the opportunity to infiltrate your network or computer system.[\/common_icon_box][\/vc_column_inner][\/vc_row_inner][vc_row_inner gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1565716308659{margin-top: 60px !important;}\u00a0\u00bb][vc_column_inner width=\u00a0\u00bb1\/2&Prime;][common_icon_box image=\u00a0\u00bb2061&Prime; title=\u00a0\u00bbFingerprinting security\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1645104226127{margin-bottom: 10px !important;}\u00a0\u00bb]Most digital fingerprinting techniques are based on detecting certain patterns and differences in network packets generated by operating systems.[\/common_icon_box][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime;][common_icon_box image=\u00a0\u00bb2055&Prime; title=\u00a0\u00bb24\/7 Support and remote admin\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1645104334850{margin-bottom: 10px !important;}\u00a0\u00bb]\n<div class=\"elementor-element elementor-element-7cbafe0 elementor-widget elementor-widget-text-editor\" data-id=\"7cbafe0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>Online service desk 24\/7, o<span class=\"elementor-icon-list-text\">ur process begins with an audit of your requirements and your current IT infrastructure. <\/span><\/p>\n<\/div>\n<\/div>\n[\/common_icon_box][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row pix_padding_top=\u00a0\u00bbpadding XL\u00a0\u00bb pix_padding_bottom=\u00a0\u00bbpadding XL\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1553581962893{background-color: #ffffff !important;}\u00a0\u00bb][vc_column][vc_row_inner gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1553582000797{padding-bottom: -20px !important;}\u00a0\u00bb][vc_column_inner width=\u00a0\u00bb1\/2&Prime;][common_title title=\u00a0\u00bbCybersecurity News\u00a0\u00bb position=\u00a0\u00bbtext-left\u00a0\u00bb show_decor=\u00a0\u00bboff\u00a0\u00bb]Latest <em>news<\/em> on <em>cybersecurity<\/em> including online standards, hacking awareness, and increasing digital defense.[\/common_title][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/2&Prime;][common_button text=\u00a0\u00bball news\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.acstunisia.com%2F|title:Blog\u00a0\u00bb size_v=\u00a0\u00bbpix-v-m\u00a0\u00bb position=\u00a0\u00bbpix-text-right\u00a0\u00bb][\/vc_column_inner][\/vc_row_inner][common_posts_block style=\u00a0\u00bbnews-card-long\u00a0\u00bb radius=\u00a0\u00bbpix-round\u00a0\u00bb cats=\u00a0\u00bbsecurity,bodyguard,grps-protection,antivirus-app\u00a0\u00bb carousel_items=\u00a0\u00bb2&Prime; carousel_margin=\u00a0\u00bb50&Prime; carousel_stagepadding=\u00a0\u00bb30&Prime;][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb content_placement=\u00a0\u00bbmiddle\u00a0\u00bb css_animation=\u00a0\u00bbfadeInUp\u00a0\u00bb pix_padding_top=\u00a0\u00bbpadding S\u00a0\u00bb pix_padding_bottom=\u00a0\u00bbpadding No\u00a0\u00bb ptextcolor=\u00a0\u00bbBlack\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb pix_padding=\u00a0\u00bbpix-padding-both\u00a0\u00bb pix_padding_size=\u00a0\u00bbpix-padding-s\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1565780222146{margin-bottom: -80px !important;background-color: #f6f6f7 !important;}\u00a0\u00bb][vc_column width=\u00a0\u00bb1\/6&Prime; ptextcolor=\u00a0\u00bbBlack\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb offset=\u00a0\u00bbvc_col-xs-7 vc_hidden-xs\u00a0\u00bb][common_title title=\u00a0\u00bbClients\u00a0\u00bb position=\u00a0\u00bbtext-left\u00a0\u00bb show_decor=\u00a0\u00bboff\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1553697958926{padding-top: 60px !important;}\u00a0\u00bb]Leo faucibus, egestas diamlorem malesu, vitae mauris.[\/common_title][\/vc_column][vc_column width=\u00a0\u00bb5\/6&Prime; gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1545232444697{margin-top: -35px !important;}\u00a0\u00bb offset=\u00a0\u00bbvc_col-xs-5 vc_hidden-xs\u00a0\u00bb][common_brands greyscale=\u00a0\u00bbon\u00a0\u00bb carousel_items=\u00a0\u00bb8&Prime; carousel_dots=\u00a0\u00bboff\u00a0\u00bb carousel_loop=\u00a0\u00bbon\u00a0\u00bb carousel_margin=\u00a0\u00bb50&Prime; carousel_autoplay=\u00a0\u00bbon\u00a0\u00bb items=\u00a0\u00bb6&Prime; autoplay=\u00a0\u00bb3000&Prime; tab_id=\u00a0\u00bb1520849732448-5&Prime; brands=\u00a0\u00bb%5B%7B%22image%22%3A%222309%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222304%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222310%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222300%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222305%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222299%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222298%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222303%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222297%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%2C%7B%22image%22%3A%222302%22%2C%22title%22%3A%22Renault%22%2C%22link%22%3A%22url%3A%252F%7C%7C%7C%22%7D%5D\u00a0\u00bb][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row_content_no_spaces\u00a0\u00bb pix_padding_top=\u00a0\u00bbpadding No\u00a0\u00bb pix_padding_bottom=\u00a0\u00bbpadding No\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb][vc_column][\/vc_column][\/vc_row][vc_row pix_padding_top=\u00a0\u00bbpadding XL\u00a0\u00bb pix_padding_bottom=\u00a0\u00bbpadding XL\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb awb_type=\u00a0\u00bbcolor\u00a0\u00bb awb_stretch=\u00a0\u00bb1&Prime; awb_color=\u00a0\u00bb#f6f6f7&Prime; css=\u00a0\u00bb.vc_custom_1565716190235{background-color: #ffffff !important;}\u00a0\u00bb][vc_column][vc_row_inner equal_height=\u00a0\u00bbyes\u00a0\u00bb pix_padding_bottom=\u00a0\u00bbpadding S\u00a0\u00bb gradient_colors=\u00a0\u00bb%5B%7B%7D%5D\u00a0\u00bb][vc_column_inner width=\u00a0\u00bb1\/3&Prime;][common_icon_box style=\u00a0\u00bbpix-ibox-top\u00a0\u00bb icon_size=\u00a0\u00bbpix-icon-xl\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fsolutech.true-emotions.studio%2Fdefender%2Fservices%2Fconfidential-information-protection%2F|title:Confidential%20information%20protection||\u00a0\u00bb shadow=\u00a0\u00bbpix-shadow-hover\u00a0\u00bb shadow_values=\u00a0\u00bb%5B%7B%22horizontal%22%3A%220%22%2C%22vertical%22%3A%224%22%2C%22blur%22%3A%2216%22%2C%22spread%22%3A%220%22%2C%22color%22%3A%22%23000000%22%2C%22opacity%22%3A%2216%22%7D%5D\u00a0\u00bb shadow_transition=\u00a0\u00bb0&Prime; shadow_effect=\u00a0\u00bbbottom-curve\u00a0\u00bb shadow_bg_color=\u00a0\u00bb#f6f6f7&Prime; bg_color=\u00a0\u00bb\u00a0\u00bb image=\u00a0\u00bb2052&Prime; title=\u00a0\u00bbConfidential Information\u00a0\u00bb btn_txt=\u00a0\u00bbread more\u00a0\u00bb]Confidential information and trade secrets can be amongst the most valuable assets a business owns. A competitive edge in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-home.php","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-1952","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.acstunisia.com\/index.php\/wp-json\/wp\/v2\/pages\/1952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.acstunisia.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.acstunisia.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.acstunisia.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.acstunisia.com\/index.php\/wp-json\/wp\/v2\/comments?post=1952"}],"version-history":[{"count":30,"href":"https:\/\/www.acstunisia.com\/index.php\/wp-json\/wp\/v2\/pages\/1952\/revisions"}],"predecessor-version":[{"id":4069,"href":"https:\/\/www.acstunisia.com\/index.php\/wp-json\/wp\/v2\/pages\/1952\/revisions\/4069"}],"wp:attachment":[{"href":"https:\/\/www.acstunisia.com\/index.php\/wp-json\/wp\/v2\/media?parent=1952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}