[et_pb_section fb_built=”1″ admin_label=”Header” _builder_version=”4.0.7″ use_background_color_gradient=”on” background_color_gradient_start=”#0029e2″ background_color_gradient_end=”#000000″ background_color_gradient_type=”radial” background_color_gradient_direction_radial=”top right” background_image=”https://beta.monitorltd.com/wp-content/uploads/2020/01/cyber-security-18.png” parallax=”on” custom_padding=”10vw||”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25.1″ z_index=”1″ custom_padding=”0px|||||”][et_pb_column type=”1_2″ _builder_version=”3.25.1″][et_pb_text _builder_version=”4.0.7″ text_font=”||||||||” header_font=”Overpass|900|||||||” header_font_size=”84px” background_layout=”dark” header_font_size_tablet=”54px” header_font_size_phone=”32px” header_font_size_last_edited=”on|desktop” locked=”off”]
Business IT Support
[/et_pb_text][et_pb_text _builder_version=”4.0.7″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off”]We work with businesses from 1-1000 users and can design flexible solutions to accommodate your requirements. Whether you are looking for a fully managed and supported IT system, hardware purchasing and installation, or an individual service, we have you covered. Our team of expert engineers can provide project management, hardware design, software solutions and installation allowing you to focus on what’s important to your business.
We are your IT department.
Speak to our friendly staff about how we can help you build a modern secure business environment.[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MDgifX0=@” button_text=”Contact us” _builder_version=”4.0.7″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#e02b20″ button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(23,102,193,0.46)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25.1″][et_pb_image src=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-07-2.png” align=”right” disabled_on=”on|on|off” _builder_version=”4.0.7″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”-16vw|-20vw|-4vw|” custom_margin_tablet=”-2vw|0vw|-24vw|” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.25.1″ z_index=”0″ width=”100%” max_width=”none”][et_pb_column type=”4_4″ _builder_version=”3.25.1″][et_pb_image src=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-01.png” show_bottom_space=”off” force_fullwidth=”on” _builder_version=”3.25.1″ custom_margin=”-40vw||-2px”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Features” _builder_version=”3.25.1″ custom_padding=”||44px|||”][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.25.3″ custom_margin=”-8vw|auto||auto|false|”][et_pb_column type=”1_3″ _builder_version=”3.25.1″][et_pb_text _builder_version=”4.9.4″ _module_preset=”default” hover_enabled=”0″ header_font=”|700|||||||” sticky_enabled=”0″]
Why Monitor?
[/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]
Monitor is a highly agile company with skilled engineers who can solve your technical problems and prevent new ones from occurring through 24/7 systems monitering. We have a long-standing reputation for the delivery of quality services, which has resulted in the expansion of our business. We are capable of handling any type of software or hardware problem.
[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.25.1″ transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|-94px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” transform_styles_tablet=”” transform_styles_phone=””][et_pb_text _builder_version=”4.9.4″ _module_preset=”default” hover_enabled=”0″ header_font=”|700|||||||” sticky_enabled=”0″]
Business End User Support
[/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]
We offer unlimited phone and email support as well as remote monitoring so we can spot potential problems even before they cause disruption. We can help remotely through our specialist software, or one of our engineers can arrange to troubleshoot in person.
We monitor the health status of your network including servers, PC’s and laptops. This ensures your network is working optimally, minimising disruption and downtime.
[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.25.1″ transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|-94px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” transform_styles_tablet=”” transform_styles_phone=””][et_pb_text _builder_version=”4.9.4″ _module_preset=”default” custom_margin=”-93px|||||” hover_enabled=”0″ custom_margin_last_edited=”on|tablet” sticky_enabled=”0″ custom_margin_phone=”0px||||false|false” custom_margin_tablet=”0px||||false|false” header_font=”|700|||||||”]
IT Infrastructure
[/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]
Whether you are looking for a new project-managed IT installation or to upgrade an existing systems, we have you covered. We offer consultation, design, procurement and installation; ensuring you get the perfect system tailored to your requirements. We can build in redundancy for future upgrades and can monitor and maintain your systems. We can install computer terminals, CCTV, servers, switches, structured cabling and more.
Talk to us today to discuss your requirements.
[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MDgifX0=@” button_text=”Contact us” _builder_version=”4.0.7″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#e02b20″ button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(23,102,193,0.46)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ next_background_color=”#ffffff” admin_label=”Feature” _builder_version=”3.25.3″ use_background_color_gradient=”on” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” background_color_gradient_type=”radial” background_image=”https://beta.monitorltd.com/wp-content/uploads/2020/01/cyber-security-12.png” background_size=”contain” background_position=”top_left” overflow-x=”hidden” overflow-y=”hidden” custom_margin=”||” custom_padding=”24vw|||||” top_divider_height=”26vw” top_divider_flip=”horizontal” bottom_divider_style=”asymmetric” bottom_divider_height=”22vw”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25.3″][et_pb_column type=”1_2″ _builder_version=”3.25.3″][et_pb_image src=”https://beta.monitorltd.com/wp-content/uploads/2020/01/cyber-security-04-1.png” _builder_version=”3.25.3″ transform_scale=”130%|130%” transform_scale_tablet=”100%|100%” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate_tablet=”” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin=”100%|100%” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” transform_styles_tablet=”” transform_styles_phone=”” locked=”off”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25.3″ custom_padding=”||”][et_pb_text _builder_version=”3.27.4″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Overpass|600|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” background_layout=”dark” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off”]
About
Professional IT Services
[/et_pb_text][et_pb_divider color=”#00b4ff” divider_weight=”2px” _builder_version=”3.25.1″ width=”100px” custom_margin=”||0px”][/et_pb_divider][et_pb_text _builder_version=”3.27.4″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off”]
We work with several partners to offer our customers fully project managed solutions including consultation, design, procurement and installation. Whether you need structured cabling installation, CCTV or even ADSL and leased Internet lines – we have you covered.
We can offer a range of warranties on your infrastructure including network switches, firewalls and servers ensuring you are protected from the financial aspect of a hardware failure.
Talk to us about your requirements.
[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MDgifX0=@” button_text=”Contact us” _builder_version=”4.9.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”14px” button_text_color=”#00b4ff” button_bg_color=”rgba(0,0,0,0)” button_border_width=”2px” button_border_color=”#00b4ff” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”12px|24px|12px|24px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25.3″][et_pb_column type=”1_2″ _builder_version=”3.25.3″][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25.3″][et_pb_image src=”https://beta.monitorltd.com/wp-content/uploads/2020/01/cyber-security-15.jpg” _builder_version=”3.25.3″ transform_scale_tablet=”100%|100%” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”10vw|0px” transform_translate_tablet=”0vw|0vw” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate=”0deg|0deg|318deg” transform_rotate_tablet=”0deg|0deg|14deg” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” custom_margin=”|-30vw|8vw||false” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|500px|500px|500px|500px” locked=”off”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Services” _builder_version=”3.25.3″ z_index=”5″ custom_padding=”||0px|||”][et_pb_row column_structure=”3_5,2_5″ _builder_version=”3.25.3″ z_index=”1″ locked=”off”][et_pb_column type=”3_5″ _builder_version=”3.25.3″][et_pb_text _builder_version=”4.0.7″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Overpass|600|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” custom_margin=”-11vw||” custom_padding=”|||||” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off”]
Cyber Security
UK Support from our Security Operations Centre
[/et_pb_text][et_pb_text _builder_version=”4.0.7″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off”]
Cyber Security is one of our specialities. We can set up internal or remote security solutions protecting your infrastructure from tampering, security attacks and malware. We also offer a Monitor and Control solution, so you have access to everything happening across your organisation.
We also offer comprehensive networkand application penetration testing as well as Phishing simulation testing for your business.
[/et_pb_text][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”3.25.1″][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Feature” _builder_version=”4.0.7″ use_background_color_gradient=”on” background_color_gradient_start=”#00ffd8″ background_color_gradient_end=”#0029e2″ background_color_gradient_type=”radial” background_color_gradient_direction_radial=”top right” background_image=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-03-1.png” background_position=”bottom_center” custom_margin=”||||true|false” custom_padding=”3vw||0vw||false|” locked=”off”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25.1″ z_index=”1″][et_pb_column type=”1_2″ _builder_version=”3.25.1″][et_pb_text _builder_version=”4.0.7″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Overpass|600|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” background_layout=”dark” custom_padding=”|||||” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off”]
Software & Licensing
Managed Software Solutions
[/et_pb_text][et_pb_text _builder_version=”4.0.7″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off”]
We offer our customers license managed software solutions on multiple terminals. Whether you’re working from home, at a remote site, or even another continent, we can ensure you’re protected, in control and have the software you need where and when you need it. We can build and host websites, intranet systems and offer two-year secure backup services. Talk to us to find out more.
[/et_pb_text][et_pb_button button_text=”Contact Us” _builder_version=”4.9.4″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#5bd8dd” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” hover_enabled=”0″ box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(0,65,131,0.4)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px” button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MDgifX0=@” _dynamic_attributes=”button_url” sticky_enabled=”0″][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25.1″][et_pb_image src=”https://beta.monitorltd.com/wp-content/uploads/2020/01/cyber-security-11-1.png” align=”right” _builder_version=”3.25.3″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”-3vw|-10vw||||” custom_margin_tablet=”-2vw|0vw|-24vw|” custom_margin_phone=”” custom_margin_last_edited=”on|tablet” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Services” _builder_version=”3.25.3″ z_index=”5″ custom_padding=”||51px|||”][et_pb_row column_structure=”3_5,2_5″ _builder_version=”3.25.3″ z_index=”1″ locked=”off”][et_pb_column type=”3_5″ _builder_version=”3.25.3″][et_pb_text _builder_version=”4.0.7″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Overpass|600|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” custom_margin=”-11vw||” custom_padding=”50px|||||” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off”]
Telephony
Secure VOIP Solutions
[/et_pb_text][et_pb_text _builder_version=”4.0.7″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off”]
Do you want to turn your mobile and PC into your work phone, join Microsoft Teams meetings from your device from almost anywhere or simply improve the quality and security of your phone system?
We offer a range of cloud-based VOIP solutions including a desktop app, Softphone app and VOIP handset. Manage UK and international phone numbers, take control over who can call you, and when with call forwarding. Improve phone security and your work-life balance. Call us today to learn more.
[/et_pb_text][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”3.25.1″][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.9.4″ background_enable_color=”off” use_background_color_gradient=”on” background_color_gradient_start=”#06007c” background_color_gradient_end=”#000000″ background_color_gradient_type=”radial” background_color_gradient_direction_radial=”top right” background_image=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-17.png” z_index=”10″ overflow-x=”visible” overflow-y=”visible” custom_padding=”||10vw|||” global_module=”1571″ saved_tabs=”all” locked=”off”][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”4.9.4″ background_color=”#FFFFFF” custom_margin=”-94px|auto|-2px|auto||” custom_padding=”0px||0px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”40px” box_shadow_blur=”60px” box_shadow_spread=”-8px” box_shadow_color=”rgba(10,45,97,0.48)” locked=”off”][et_pb_column type=”2_5″ _builder_version=”4.9.4″ background_color=”#FFFFFF” custom_padding=”60px|40px|60px|40px|true|true”][et_pb_text _builder_version=”3.27.4″ header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” locked=”off”]
Contact Us
[/et_pb_text][et_pb_blurb use_icon=”on” font_icon=”%%264%%” icon_color=”#006ac1″ icon_placement=”left” use_icon_font_size=”on” icon_font_size=”24px” _builder_version=”4.9.4″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” locked=”off”]
[/et_pb_blurb][et_pb_blurb use_icon=”on” font_icon=”%%238%%” icon_color=”#006ac1″ icon_placement=”left” use_icon_font_size=”on” icon_font_size=”24px” _builder_version=”4.9.4″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” locked=”off”]
[/et_pb_blurb][et_pb_blurb title=”42 St Lukes Road, Old Windsor, Berkshire. SL4 2QQ” use_icon=”on” font_icon=”%%249%%” icon_color=”#006ac1″ icon_placement=”left” use_icon_font_size=”on” icon_font_size=”24px” _builder_version=”4.0.7″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” locked=”off”]
Monday-Friday: 8:30am – 5:30pm
[/et_pb_blurb][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.9.4″ use_background_color_gradient=”on” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” background_color_gradient_type=”radial” background_color_gradient_direction_radial=”top right” background_image=”https://beta.monitorltd.com/wp-content/uploads/2020/01/cyber-security-11.png” background_size=”contain” background_position=”top_left” transform_translate_linked=”off” custom_padding=”60px|40px|60px|20%|true” custom_padding_tablet=”80px|||40px” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” background_last_edited=”on|desktop” background_image_tablet=”http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-11.png” background_enable_image_tablet=”on” background_position_tablet=”top_left”][et_pb_text _builder_version=”4.9.4″ text_font=”||||||||” header_text_color=”#FFFFFF” header_2_font=”Overpass|900|||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”56px” header_2_line_height=”1.1em” text_orientation=”center” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” text_text_align=”center” locked=”off”]
Get Started
[/et_pb_text][et_pb_text _builder_version=”4.9.4″ text_font=”Overpass|300|||||||” text_text_color=”#FFFFFF” text_font_size=”17px” text_line_height=”1.8em” text_orientation=”center” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off”]
Contact us today to see how we can help your IT work for you.
[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MDgifX0=@” button_text=”Contact Us” button_alignment=”center” _builder_version=”4.0.7″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_bg_color_gradient_type=”radial” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]