[vc_row][vc_column][qodef_particles type=”fixed” height=”633″ bgnd_color=”#191f35″ particles_density=”medium” particles_color=”#c1c1c1″ particles_opacity=”1″ particles_size=”3″ speed=”3″ show_lines=”yes” line_length=”100″ hover=”yes” click=”yes”][qodef_particles_content width=”100″ margin_top=”18%” margin_bottom=”19%”][qodef_custom_font font_family=”Raleway” font_size=”80″ line_height=”86″ font_weight=”800″ letter_spacing=”0″ text_transform=”Uppercase” text_align=”center” content_custom_font=”We Offer” color=”#ffffff”][vc_empty_space height=”23px”][qodef_custom_font font_family=”Raleway” font_size=”19″ line_height=”29″ font_weight=”400″ letter_spacing=”0″ content_custom_font=”Cloud Infrastructure For Industries Such As” href=”“https://advisory.kpmg.us/content/dam/kpmg-advisory/PDFs/ManagementConsulting/2015/KPMG-2015-Cyber-Healthcare-Survey.pdf“” color=”#ffffff”][vc_empty_space height=”35px”][qodef_button size=”large” type=”solid” hover_animation=”” target=”_self” icon_pack=”” font_weight=”” text=”Retail” link=”#” margin=”5px 5px 10px 10px” font_size=”14″][qodef_button size=”large” type=”” hover_animation=”” target=”_self” icon_pack=”” font_weight=”” text=”Finance” link=”#” margin=”5px 5px 10px 10px” color=”#ffffff” font_size=”14″][qodef_button size=”large” type=”” hover_animation=”” target=”_self” icon_pack=”” font_weight=”” text=”Healthcare” link=”#” margin=”5px 5px 10px 10px” color=”#ffffff” font_size=”14″][qodef_button size=”large” type=”” hover_animation=”” target=”_self” icon_pack=”” font_weight=”” text=”Higher Education” link=”#” margin=”5px 5px 10px 10px” color=”#ffffff” font_size=”14″][qodef_button size=”large” type=”” hover_animation=”” target=”_self” icon_pack=”” font_weight=”” text=”Legal” link=”#” margin=”5px 5px 10px 10px” color=”#ffffff” font_size=”14″][/qodef_particles_content][/qodef_particles][/vc_column][/vc_row][vc_row content_width=”grid” css=”.vc_custom_1469719742753{padding-top: 105px !important;padding-bottom: 105px !important;}” el_class=”iwt-custom-fix”][vc_column offset=”vc_col-lg-6 vc_col-md-12″][vc_single_image image=”3528″ img_size=”full” css_animation=”left-to-right”][/vc_column][vc_column offset=”vc_col-lg-6 vc_col-md-12″][vc_empty_space height=”40px”][qodef_icon_with_text icon_pack=”simple_line_icons” simple_line_icons=”icon-speedometer” icon_position=”left” icon_type=”normal” icon_size=”qodef-icon-tiny” icon_animation=”” icon_margin=”0px 0px 65px 24px” title=”ENHANCED SECURITY” title_tag=”h5″ custom_icon_size=”42″ icon_color=”#c9c9c9″ text=”VirtuaaS Workspaces keep sensitive data off devices and safely in your data center. We automatically log every time someone accesses any systems where sensitive data is stored and save those logs in the VirtuaaS secure data center”][vc_empty_space height=”20px”][qodef_icon_with_text icon_pack=”simple_line_icons” simple_line_icons=”icon-settings” icon_position=”left” icon_type=”normal” icon_size=”qodef-icon-tiny” icon_animation=”” icon_margin=”0px 0px 65px 24px” title=”INTRODUCE BYOD INTO YOUR ORGANIZATION — SAFELY” title_tag=”h5″ custom_icon_size=”42″ icon_color=”#c9c9c9″ text=”BYOD is one of the most significant trends in the IT industry today

Use Workspaces to improve the productivity of your organization and reduce costs by introducing BYOD without creating security risks.”][/vc_column][/vc_row][vc_row row_type=”parallax” content_width=”grid” full_screen_section_height=”no” css=”.vc_custom_1479552754313{padding-top: 90px !important;padding-bottom: 125px !important;background-image: url(https://virtuaas.com/wp-content/uploads/2016/07/tech-background-image-2.jpg?id=5075) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_column_text]

INCREASE PRODUCTIVITY AND TIGHTEN SECURITY

[/vc_column_text][vc_empty_space height=”15px”][qodef_process_holder number_of_columns=”columns-4″][qodef_process_item icon_pack=”font_awesome” fa_icon=”” title=”Expand Protection Beyond Cloud-based Applications”][qodef_process_item icon_pack=”font_awesome” fa_icon=”” title=”Reduce Costs and Simplify Operations”][qodef_process_item icon_pack=”font_awesome” fa_icon=”” title=”Improved Access Control”][qodef_process_item icon_pack=”font_awesome” fa_icon=”” title=”Reduce Hacker Risk”][/qodef_process_holder][vc_empty_space height=”35px”][/vc_column][vc_column][/vc_column][vc_column][/vc_column][vc_column][/vc_column][vc_column][/vc_column][vc_column][/vc_column][/vc_row][vc_row css=”.vc_custom_1469615697840{padding-top: 72px !important;padding-bottom: 72px !important;}”][vc_column][qodef_carousel carousel=”tech-home-carousel” orderby=”date” order=”ASC” number_of_items=”5″ image_animation=”image-zoom” show_navigation=”no”][/vc_column][/vc_row]