[et_pb_section fb_built=”1″ admin_label=”Header” _builder_version=”4.9.4″ use_background_color_gradient=”on” background_color_gradient_start=”#0029e2″ background_color_gradient_end=”#000000″ background_color_gradient_type=”radial” background_color_gradient_direction_radial=”top right” background_image=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-17.png” parallax=”on” custom_padding=”10vw||”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25.1″ z_index=”1″][et_pb_column type=”1_2″ _builder_version=”3.25.1″][et_pb_text _builder_version=”4.9.4″ text_font=”||||||||” header_font=”Overpass|900|||||||” header_font_size=”84px” background_layout=”dark” header_font_size_tablet=”54px” header_font_size_phone=”32px” header_font_size_last_edited=”on|desktop” locked=”off”]
Cyber Security Matters
[/et_pb_text][et_pb_text _builder_version=”4.9.4″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” background_layout=”dark” custom_padding=”||1px|||” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off”]
A strong Cyber Security awareness is crucial in modern businesses. Insecure networks can lead to data breaches, malware and puts you at greater risk. The Monitor engineering team always put cyber security first. We build security measures into every level of our customers networks. We offer Bitdefender AV, Teramind Network Monitoring, Secure Network Design and have an industry leading multi-year Backup Plan encrypted and stored on a secure site.
Monitor’s solutions protect your network from existing and future threats and challenges.
[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MDgifX0=@” button_text=”Contact us” _builder_version=”4.9.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#47d7ff” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(23,102,193,0.46)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25.1″][et_pb_image src=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-13-3.png” align=”right” _builder_version=”3.25.3″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”-8vw|-10vw|2vw|” custom_margin_tablet=”-2vw|0vw|-24vw|” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.25.1″ z_index=”0″ width=”100%” max_width=”none”][et_pb_column type=”4_4″ _builder_version=”3.25.1″][et_pb_image src=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-01.png” show_bottom_space=”off” force_fullwidth=”on” _builder_version=”3.25.3″ custom_margin=”-46vw||-2px”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Features” _builder_version=”3.25.3″][et_pb_row column_structure=”1_3,1_3,1_3″ custom_padding_last_edited=”on|desktop” _builder_version=”3.25.3″ max_width=”none” custom_margin=”-10vw||-10vw||true” custom_margin_tablet=”0vw||0vw||true” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” custom_padding=”|||20%” custom_padding_tablet=”|||0%” custom_padding_phone=””][et_pb_column type=”1_3″ _builder_version=”3.25.1″][et_pb_blurb title=”Security Audits” image=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-icon-2.png” _builder_version=”3.25.3″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center”]
Do not leave your networks safety to chance; A Monitor Security Audit will assess your existing network’s defences.
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.25.1″ transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|-94px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” transform_styles_tablet=”” transform_styles_phone=””][et_pb_blurb title=”Vulnerability Prevention” image=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-icon-18.png” _builder_version=”3.25.3″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off”]
We can build Virtual Private Networks (VPN), modern encryption infrastructure, offer software solutions and can block potentially dangerous physical media.
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.25.1″ transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|-188px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” transform_styles_tablet=”” transform_styles_phone=””][et_pb_blurb title=”24/7 Security Monitoring” image=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-icon-7.png” _builder_version=”3.25.3″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off”]
Monitor’s security solutions provide our customers with 24/7 protection against existing and quickly evolving threats.
[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ prev_background_color=”#ffffff” admin_label=”Feature” _builder_version=”3.25.3″ use_background_color_gradient=”on” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” background_color_gradient_type=”radial” background_image=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-02.png” background_size=”contain” background_position=”bottom_center” custom_padding=”||0px|||” top_divider_style=”slant” top_divider_height=”26vw” top_divider_flip=”horizontal”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25.1″][et_pb_column type=”1_2″ _builder_version=”3.25.1″][et_pb_image src=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-14-1.jpg” _builder_version=”3.25.3″ transform_scale=”250%|250%” transform_scale_tablet=”100%|100%” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”-6vw|4vw” transform_translate_tablet=”0vw|0vw” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate=”0deg|0deg|57deg” transform_rotate_tablet=”0deg|0deg|27deg” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” custom_margin=”|||” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|500px|500px|500px|500px”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25.1″ custom_padding=”18vw||”][et_pb_text _builder_version=”3.27.4″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Overpass|600|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” background_layout=”dark” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off”]
About
Security Solutions & Services
[/et_pb_text][et_pb_divider color=”#00b4ff” divider_weight=”2px” _builder_version=”3.25.1″ width=”100px” custom_margin=”||0px”][/et_pb_divider][et_pb_text _builder_version=”3.27.4″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off”]
We can set up internal or remote security solutions protecting your computers from tampering, security attacks and malware. Our software solutions can, if desired block potentially dangerous media such as USB sticks and CD’s, block dangerous websites and prevent tampering with the PC’s file system. Our solutions quietly protect your infrastructure 24/7 from cyber threats, so you can focus on what matters most.
[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MDgifX0=@” button_text=”Learn More” _builder_version=”4.9.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”14px” button_text_color=”#00b4ff” button_bg_color=”rgba(0,0,0,0)” button_border_width=”2px” button_border_color=”#00b4ff” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”12px|24px|12px|24px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row column_structure=”2_5,3_5″ _builder_version=”3.25.1″][et_pb_column type=”2_5″ _builder_version=”3.25.1″ custom_padding=”380px||” custom_padding_tablet=”0px||” custom_padding_phone=”” custom_padding_last_edited=”on|desktop”][et_pb_text _builder_version=”3.27.4″ text_font=”Overpass|300|||||||” text_line_height=”1.8em” header_4_font=”Overpass|900|||||||” header_4_line_height=”1.4em” custom_padding=”||1px|||” background_layout_tablet=”dark” background_layout_phone=”” background_layout_last_edited=”on|desktop” locked=”off”]
Monitor Cybersecurity Framework
We provide 24/7 security solutions for business, education and home users. We offer complete solutions which help eliminate threats, protect privacy and data, and enable cyber resilience.
[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MDgifX0=@” button_text=”Contact Us” _builder_version=”4.9.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_bg_color_gradient_type=”radial” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|18px|8px|18px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”3.25.1″][et_pb_image src=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-14.png” _builder_version=”3.25.3″ animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Feature” _builder_version=”3.25.3″ use_background_color_gradient=”on” background_color_gradient_start=”#00ffd8″ background_color_gradient_end=”#0029e2″ background_color_gradient_type=”radial” background_color_gradient_direction_radial=”top right” background_image=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-03-1.png” background_position=”bottom_center” custom_margin=”100px||100px||true” custom_padding=”10vw||10vw||true|” locked=”off”][et_pb_row column_structure=”2_5,3_5″ _builder_version=”3.25.1″ z_index=”1″][et_pb_column type=”2_5″ _builder_version=”3.25.1″][et_pb_text _builder_version=”3.27.4″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Overpass|600|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” background_layout=”dark” custom_padding=”|||||” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off”]
Features
IT Health Checks
[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off”]
If you suspect that your computer or network is infected with a virus or is running slowly it may be time for an IT Health Check. We will perform thorough virus scans and will check your computer network for other problems that may be affecting performance. We can also install remote monitoring solutions so we can ensure the health of your network, either reporting remotely or internally.
[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MDgifX0=@” button_text=”Contact Us” _builder_version=”4.9.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#5bd8dd” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(0,65,131,0.4)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”3.25.1″][et_pb_blurb title=”Bitdefender AV Integration” image=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-illustrated-icons-08.png” icon_placement=”left” image_max_width=”120px” image_max_width_tablet=”” image_max_width_phone=”50px” image_max_width_last_edited=”on|phone” _builder_version=”4.0.7″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” background_color=”#ffffff” text_orientation=”center” custom_padding=”24px|20px|24px|20px|true|true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” locked=”off”]
We offer Industry leading Bitdefender AV which is the perfect software to protect even the biggest networks. Our solutions quietly protect your infrastructure around the clock from cyber threats and malware. We can set up internal or remote security solutions protecting your computers from tampering, security attacks and viruses. Our software solutions can, if desired block potentially dangerous media such as USB sticks and prevent tampering with the PC’s file system.
[/et_pb_blurb][et_pb_blurb title=”Multi-Year Encrypted Backup ” image=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-illustrated-icons-03.png” icon_placement=”left” image_max_width=”120px” image_max_width_tablet=”” image_max_width_phone=”50px” image_max_width_last_edited=”on|phone” _builder_version=”4.9.4″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” background_color=”#ffffff” text_orientation=”center” custom_padding=”24px|20px|24px|20px|true|true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” locked=”off”]
Losing mission critical files can put you back days or even weeks. Monitor offers a secure, encrypted two-year backup service where your data will be protected at our secure site. In the unlikely event your system fails, or your primary site is inoperable you can rest easy knowing your critical backup data is safely stored offsite and is accessible to you.
[/et_pb_blurb][et_pb_blurb title=”Teramind Computer Monitoring System” image=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-illustrated-icons-06.png” icon_placement=”left” image_max_width=”120px” image_max_width_tablet=”” image_max_width_phone=”50px” image_max_width_last_edited=”on|phone” _builder_version=”4.9.4″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” background_color=”#ffffff” text_orientation=”center” custom_padding=”24px|20px|24px|20px|true|true” hover_enabled=”0″ border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” locked=”off” sticky_enabled=”0″]
We offer a Monitor and Control solution which allows access to everything happening across your organisation. Teramind can monitor computer terminals and will keep meticulous records for data loss prevention and productivity. The software lets you monitor social media and website use, can detect threats and has customisable alerts. Cloud and onsite services are available.
[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Features” _builder_version=”3.25.1″ use_background_color_gradient=”on” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” background_color_gradient_type=”radial” background_size=”contain” background_position=”bottom_center” custom_padding=”||0px|||” top_divider_height=”26vw” top_divider_flip=”horizontal” bottom_divider_color=”#dcecff” bottom_divider_height=”30vw” bottom_divider_arrangement=”above_content” locked=”off”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25.1″ z_index=”1″][et_pb_column type=”1_2″ _builder_version=”3.25.1″][et_pb_text _builder_version=”3.27.4″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Overpass|600|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” background_layout=”dark” custom_padding=”|||||” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off”]
Our Approach
Secure Cloud based VoIP systems
[/et_pb_text][et_pb_divider color=”#00b4ff” divider_weight=”2px” _builder_version=”3.25.1″ width=”100px” custom_margin=”||0px” locked=”off”][/et_pb_divider][et_pb_text _builder_version=”3.27.4″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off”]
Do you want to enable staff to turn your mobile phones, computers and devices into work phones – with timed redirects? Our VoIP solutions allow staff to Join Microsoft Teams meetings from their device from almost any location. Our solutions are secure and perfect for remote business. VOIP solutions often lower the cost of calls whilst increasing call quality.
We offer a range of cloud based VOIP solutions including our desktop app, Softphone app and VOIP desk phones. Manage UK and international phone numbers and take control over who can call you, and when with call forwarding. Improve phone security and your work-life balance. Call us today to learn more.
[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MDgifX0=@” button_text=”Contact us” _builder_version=”4.9.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”14px” button_text_color=”#00b4ff” button_bg_color=”rgba(0,0,0,0)” button_border_width=”2px” button_border_color=”#00b4ff” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”12px|24px|12px|24px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25.1″][et_pb_image src=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-10.png” _builder_version=”3.25.3″ custom_margin=”-20vw|-9vw||||” custom_margin_tablet=”0vw|0vw||” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off”][/et_pb_image][et_pb_text _builder_version=”3.27.4″ text_font=”Overpass|300|||||||” text_line_height=”1.8em” header_4_font=”Overpass|900|||||||” header_4_line_height=”1.4em” background_layout=”dark” max_width=”400px” locked=”off”]
Equipment Warranties
It is important to protect against financial losses as well as digital threats. Our warranty services are a great way to protect your business from unexpected costs down the line, putting you in control and making your budgetary forecasts more accurate. We offer equipment warranties on Secure Switches, ASA’s, Servers, Security Hardware and more. Make sure you are protected from every angle. Our affordable plans can make sure you are covered and protected from uncertainty.
[/et_pb_text][et_pb_text _builder_version=”4.9.4″ text_font=”Overpass|300|||||||” text_line_height=”1.8em” header_4_font=”Overpass|900|||||||” header_4_line_height=”1.4em” background_layout=”dark” max_width=”400px” locked=”off”]As a highly agile company Monitor has the flexibility to design the perfect security system for our customers. Talk to us today to learn more about what we can offer.[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.25.1″ z_index=”0″ width=”100%” max_width=”none” locked=”off”][et_pb_column type=”4_4″ _builder_version=”3.25.1″][et_pb_image src=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-04.png” show_bottom_space=”off” force_fullwidth=”on” _builder_version=”3.25.1″ custom_margin=”-48vw||-2px” custom_margin_tablet=”-50vw||” custom_margin_phone=”” custom_margin_last_edited=”on|tablet”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Section” _builder_version=”3.25.3″ bottom_divider_style=”slant” bottom_divider_color=”#f1fafe” bottom_divider_height=”40vw” bottom_divider_flip=”horizontal” bottom_divider_arrangement=”above_content”][et_pb_row _builder_version=”3.25.1″][et_pb_column type=”4_4″ _builder_version=”3.25.1″][et_pb_image src=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-07-2.png” _builder_version=”3.25.3″ max_width=”700px” custom_margin=”-40vw|||” custom_margin_tablet=”-45vw|||” custom_margin_phone=”-50vw|||” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.9.4″ background_enable_color=”off” use_background_color_gradient=”on” background_color_gradient_start=”#06007c” background_color_gradient_end=”#000000″ background_color_gradient_type=”radial” background_color_gradient_direction_radial=”top right” background_image=”https://beta.monitorltd.com/wp-content/uploads/2019/12/cyber-security-17.png” z_index=”10″ overflow-x=”visible” overflow-y=”visible” custom_padding=”||10vw|||” global_module=”1571″ saved_tabs=”all” locked=”off”][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”4.9.4″ background_color=”#FFFFFF” custom_margin=”-94px|auto|-2px|auto||” custom_padding=”0px||0px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”40px” box_shadow_blur=”60px” box_shadow_spread=”-8px” box_shadow_color=”rgba(10,45,97,0.48)” locked=”off”][et_pb_column type=”2_5″ _builder_version=”4.9.4″ background_color=”#FFFFFF” custom_padding=”60px|40px|60px|40px|true|true”][et_pb_text _builder_version=”3.27.4″ header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” locked=”off”]
Contact Us
[/et_pb_text][et_pb_blurb use_icon=”on” font_icon=”%%264%%” icon_color=”#006ac1″ icon_placement=”left” use_icon_font_size=”on” icon_font_size=”24px” _builder_version=”4.9.4″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” locked=”off”]
[/et_pb_blurb][et_pb_blurb use_icon=”on” font_icon=”%%238%%” icon_color=”#006ac1″ icon_placement=”left” use_icon_font_size=”on” icon_font_size=”24px” _builder_version=”4.9.4″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” locked=”off”]
[/et_pb_blurb][et_pb_blurb title=”42 St Lukes Road, Old Windsor, Berkshire. SL4 2QQ” use_icon=”on” font_icon=”%%249%%” icon_color=”#006ac1″ icon_placement=”left” use_icon_font_size=”on” icon_font_size=”24px” _builder_version=”4.0.7″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” locked=”off”]
Monday-Friday: 8:30am – 5:30pm
[/et_pb_blurb][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.9.4″ use_background_color_gradient=”on” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” background_color_gradient_type=”radial” background_color_gradient_direction_radial=”top right” background_image=”https://beta.monitorltd.com/wp-content/uploads/2020/01/cyber-security-11.png” background_size=”contain” background_position=”top_left” transform_translate_linked=”off” custom_padding=”60px|40px|60px|20%|true” custom_padding_tablet=”80px|||40px” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” background_last_edited=”on|desktop” background_image_tablet=”http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-11.png” background_enable_image_tablet=”on” background_position_tablet=”top_left”][et_pb_text _builder_version=”4.9.4″ text_font=”||||||||” header_text_color=”#FFFFFF” header_2_font=”Overpass|900|||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”56px” header_2_line_height=”1.1em” text_orientation=”center” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” text_text_align=”center” locked=”off”]
Get Started
[/et_pb_text][et_pb_text _builder_version=”4.9.4″ text_font=”Overpass|300|||||||” text_text_color=”#FFFFFF” text_font_size=”17px” text_line_height=”1.8em” text_orientation=”center” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off”]
Contact us today to see how we can help your IT work for you.
[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MDgifX0=@” button_text=”Contact Us” button_alignment=”center” _builder_version=”4.0.7″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_bg_color_gradient_type=”radial” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”20px|30px|20px|30px|true|true” box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” locked=”off” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]