[vc_row full_width=”stretch_row” full_height=”yes” content_placement=”middle” enable_first_overlay=”true” first_overlay_opacity=”50″ enable_second_overlay=”true” second_overlay_opacity=”25″ second_background_type=”image” second_background_image_size=”” second_background_repeat=”repeat” enable_parallax=”true” parallax_background=”32704″ parallax_style=”fade”][vc_column css=”.vc_custom_1604933259814{padding-top: 3em !important;padding-bottom: 2em !important;}” offset=”vc_hidden-sm vc_hidden-xs”][mpc_textblock content_width=”100″ font_preset=”mpc_preset_65″ font_color=”#ffffff” font_size=”50″ font_transform=”uppercase” margin_divider=”true” mpc_tooltip__border_divider=”true” mpc_tooltip__padding_divider=”true”]Experts en Cybersécurité[/mpc_textblock][vc_empty_space][mpc_animated_text duration=”1200″ delay=”2250″ text_font_preset=”mpc_preset_65″ text_font_color=”#ffffff” text_font_size=”40″ text_font_line_height=”1.2″ text_font_transform=”none” text_font_align=”left” text=”Évaluation du risque en cybersécurité |||Centre opérationnel de sécurité |||Services de sécurité gérés |||Évaluation de la posture de cybersécurité|||Surveillance Dark Web” text_padding_divider=”true” sides_font_color=”#ffffff” margin_divider=”true” margin_css=”margin-top:-5px;”][/vc_column][vc_column offset=”vc_hidden-lg vc_hidden-md” css=”.vc_custom_1604933266958{padding-top: 3em !important;padding-bottom: 2em !important;}”][mpc_textblock content_width=”100″ font_preset=”mpc_preset_65″ font_color=”#ffffff” font_size=”42″ font_transform=”uppercase” margin_divider=”true” mpc_tooltip__border_divider=”true” mpc_tooltip__padding_divider=”true”]Experts en Cybersécurité[/mpc_textblock][vc_empty_space][mpc_animated_text duration=”1200″ delay=”2250″ text_font_preset=”mpc_preset_65″ text_font_color=”#ffffff” text_font_size=”18″ text_font_line_height=”1.2″ text_font_transform=”none” text_font_align=”left” text=”Évaluation du risque en cybersécurité|||Centre opérationnel de sécurité |||Services de sécurité gérés |||Évaluation de la posture de cybersécurité|||Surveillance Dark Web” text_padding_divider=”true” sides_font_color=”#ffffff” margin_divider=”true” margin_css=”margin-top:-5px;”][/vc_column][vc_column css=”.vc_custom_1604703122014{padding-top: 3em !important;padding-bottom: 2em !important;}”][vc_row_inner css=”.vc_custom_1445534829215{margin-top: 40px !important;margin-bottom: 40px !important;}”][vc_column_inner width=”1/6″ css=”.vc_custom_1518398834773{margin-left: 5px !important;padding-right: 0px !important;}” offset=”vc_hidden-xs”][mpc_divider align=”left” lines_color=”#d3313a” lines_weight=”5″ margin_divider=”true” margin_css=”margin-top:0px;margin-bottom:0px;”][/vc_column_inner][vc_column_inner width=”1/6″ css=”.vc_custom_1445584856420{padding-left: 0px !important;}” offset=”vc_hidden-xs”][mpc_divider align=”left” lines_color=”#ffffff” lines_weight=”5″][/vc_column_inner][vc_column_inner width=”1/6″][/vc_column_inner][vc_column_inner width=”1/6″][/vc_column_inner][vc_column_inner width=”1/6″][/vc_column_inner][vc_column_inner width=”1/6″][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner alignment=”left”][mpc_button preset=”mpc_preset_24″ url=”url:https%3A%2F%2Fk2demo.ca%2Fsph%2Fessai-gratuit%2F|title:Link” font_preset=”mpc_preset_20″ font_color=”#ffffff” font_size=”16″ font_transform=”uppercase” title=”Évaluation Dark Web gratuite” icon_type=”character” icon_color=”#ffffff” icon_size=”16″ background_color=”#d3313a” border_css=”border-width:0px;border-color:#d3313a;border-style:solid;border-radius:0px;” padding_divider=”true” padding_css=”padding-top:20px;padding-right:45px;padding-bottom:20px;padding-left:45px;” margin_divider=”true” margin_css=”margin-top:10px;margin-right:9px;margin-bottom:0px;margin-left:9px;” hover_font_color=”#ffffff” hover_background_color=”#ac2028″ hover_background_effect=”slide-left” hover_border_css=”border-radius:0px;”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row full_width=”stretch_row” gap=”35″ css=”.vc_custom_1605219837125{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;background-color: #f2f2f2 !important;}”][vc_column css=”.vc_custom_1603407406869{padding-top: 0px !important;padding-bottom: 0px !important;}”][vc_raw_html]JTNDZGl2JTIwc3R5bGUlM0QlMjJjbGVhciUzQSUyMGJvdGglM0IlMjIlM0UlM0MlMkZkaXYlM0U=[/vc_raw_html][/vc_column][/vc_row][vc_row full_width=”stretch_row” gap=”35″ equal_height=”yes” content_placement=”middle” css=”.vc_custom_1605220012320{margin-top: -60px !important;padding-top: 0px !important;padding-bottom: 40px !important;background-color: #f2f2f2 !important;}”][vc_column width=”1/2″ css=”.vc_custom_1603407406869{padding-top: 0px !important;padding-bottom: 0px !important;}”][vc_custom_heading text=”Sunphinx, votre partenaire” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal” css=”.vc_custom_1605227039252{margin-bottom: 30px !important;}”][mpc_divider width=”20″ align=”left” lines_color=”#d3313a” lines_weight=”5″ margin_divider=”true” margin_css=”margin-top:25px;margin-bottom:25px;”][vc_column_text]“Notre mission est de protéger les actifs des organisations contre les menaces cybercriminelles.”[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJrMmNvbnRhaW5lciUyMiUzRSUzQ2lmcmFtZSUyMHNyYyUzRCUyMmh0dHBzJTNBJTJGJTJGd3d3LnlvdXR1YmUuY29tJTJGZW1iZWQlMkZLNHpEUnZVT0FKayUyRiUzRnJlbCUzRDAlMjIlMjBmcmFtZWJvcmRlciUzRCUyMjAlMjIlMjBhbGxvdyUzRCUyMmFjY2VsZXJvbWV0ZXIlM0IlMjBjbGlwYm9hcmQtd3JpdGUlM0IlMjBlbmNyeXB0ZWQtbWVkaWElM0IlMjBneXJvc2NvcGUlM0IlMjBwaWN0dXJlLWluLXBpY3R1cmUlMjIlMjBhbGxvd2Z1bGxzY3JlZW4lMjBjbGFzcyUzRCUyMmsydmlkZW8lMjIlM0UlM0MlMkZpZnJhbWUlM0UlM0MlMkZkaXYlM0U=[/vc_raw_html][/vc_column][/vc_row][vc_row css=”.vc_custom_1445352848107{margin-top: 75px !important;margin-bottom: 50px !important;}”][vc_column css=”.vc_custom_1603407406869{padding-top: 0px !important;padding-bottom: 0px !important;}”][vc_custom_heading text=”Domaines d’expertise” font_container=”tag:h2|text_align:center” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal” css=”.vc_custom_1602470294977{margin-bottom: 30px !important;}”][mpc_divider width=”10″ lines_color=”#d3313a” lines_weight=”5″ margin_divider=”true” margin_css=”margin-top:25px;margin-bottom:25px;”][/vc_column][/vc_row][vc_row bg_type=”bg_color” bg_override=”full” animation_type=”h” horizontal_animation=”left-animation” vertical_animation=”top-animation” padding_top=”60px” css=”.vc_custom_1603407521483{margin-top: -20px !important;margin-bottom: 75px !important;}”][vc_column width=”1/3″][mpc_callout layout=”style_3″ title_font_color=”#0a0707″ title_font_size=”28″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”center” title=”Évaluation du risque en cybersécurité” title_margin_divider=”true” title_margin_css=”margin-top:18px;margin-bottom:13px;” content_width=”100″ content_font_preset=”mpc_preset_139″ content_font_color=”#3d3d3d” content_font_size=”16″ content_font_line_height=”1.4″ content_font_transform=”none” content_font_align=”center” content_margin_divider=”true” icon_type=”image” icon_image_size=”320×200″ icon_image=”32624″ icon_border_divider=”true” icon_border_css=”border-top:3px;border-right:3px;border-bottom:3px;border-left:3px;border-color:#cfd1d0;” icon_padding_divider=”true” padding_divider=”true” padding_css=”padding-top:35px;padding-right:20px;padding-bottom:20px;padding-left:20px;” mpc_button__preset=”mpc_preset_85″ mpc_button__url=”url:https%3A%2F%2Fk2demo.ca%2Fsph%2Faudits-et-evaluations%2Frisque-en-cybersecurite-et-infonuagique%2F|title:Link” mpc_button__font_preset=”mpc_preset_20″ mpc_button__font_color=”#d3313a” mpc_button__font_size=”16″ mpc_button__font_transform=”uppercase” mpc_button__title=”En savoir plus” mpc_button__border_css=”border-width:2px;border-color:#d3313a;border-style:solid;border-radius:0px;” mpc_button__padding_divider=”true” mpc_button__padding_css=”padding-top:12px;padding-right:30px;padding-bottom:12px;padding-left:30px;” mpc_button__margin_divider=”true” mpc_button__margin_css=”margin-top:11px;” mpc_button__hover_font_color=”#ffffff” mpc_button__hover_background_color=”#d3313a” mpc_button__hover_background_effect=”slide-top” mpc_button__mpc_tooltip__border_divider=”true” mpc_button__mpc_tooltip__padding_divider=”true” animation_in_type=”transition.fadeIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”400″]Évaluer votre posture de cybersécurité réseaux et infonuagiques. Déterminer quel est votre niveau du risque et vos vulnérabilités.[/mpc_callout][/vc_column][vc_column width=”1/3″][mpc_callout layout=”style_3″ title_font_color=”#0a0707″ title_font_size=”28″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”center” title=”Centre opérationnel de sécurité” title_margin_divider=”true” title_margin_css=”margin-top:18px;margin-bottom:13px;” content_width=”100″ content_font_preset=”mpc_preset_139″ content_font_color=”#3d3d3d” content_font_size=”16″ content_font_line_height=”1.4″ content_font_transform=”none” content_font_align=”center” content_margin_divider=”true” icon_type=”image” icon_image_size=”320×200″ icon_image=”32627″ icon_border_divider=”true” icon_border_css=”border-top:3px;border-right:3px;border-bottom:3px;border-left:3px;border-color:#cfd1d0;” icon_padding_divider=”true” padding_divider=”true” padding_css=”padding-top:35px;padding-right:20px;padding-bottom:20px;padding-left:20px;” mpc_button__preset=”mpc_preset_85″ mpc_button__url=”url:https%3A%2F%2Fk2demo.ca%2Fsph%2Fservices-de-securite%2Fcentre-de-securite-operationnelle%2F|title:Link” mpc_button__font_preset=”mpc_preset_20″ mpc_button__font_color=”#d3313a” mpc_button__font_size=”16″ mpc_button__font_transform=”uppercase” mpc_button__title=”En savoir plus” mpc_button__border_css=”border-width:2px;border-color:#d3313a;border-style:solid;border-radius:0px;” mpc_button__padding_divider=”true” mpc_button__padding_css=”padding-top:12px;padding-right:30px;padding-bottom:12px;padding-left:30px;” mpc_button__margin_divider=”true” mpc_button__margin_css=”margin-top:11px;” mpc_button__hover_font_color=”#ffffff” mpc_button__hover_background_color=”#d3313a” mpc_button__hover_background_effect=”slide-top” mpc_button__mpc_tooltip__border_divider=”true” mpc_button__mpc_tooltip__padding_divider=”true” animation_in_type=”transition.fadeIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”400″]Le centre opérationnel de sécurité 24/7 détecte en temps réel les brèches et les incidents de votre réseau informatique.[/mpc_callout][/vc_column][vc_column width=”1/3″][mpc_callout layout=”style_3″ title_font_color=”#0a0707″ title_font_size=”28″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”center” title=”Fournisseur de services de sécurité gérés” title_margin_divider=”true” title_margin_css=”margin-top:18px;margin-bottom:13px;” content_width=”100″ content_font_preset=”mpc_preset_139″ content_font_color=”#3d3d3d” content_font_size=”16″ content_font_line_height=”1.4″ content_font_transform=”none” content_font_align=”center” content_margin_divider=”true” icon_type=”image” icon_image_size=”320×200″ icon_image=”33103″ icon_border_divider=”true” icon_border_css=”border-top:3px;border-right:3px;border-bottom:3px;border-left:3px;border-color:#cfd1d0;” icon_padding_divider=”true” padding_divider=”true” padding_css=”padding-top:35px;padding-right:20px;padding-bottom:20px;padding-left:20px;” mpc_button__preset=”mpc_preset_85″ mpc_button__url=”url:https%3A%2F%2Fk2demo.ca%2Fsph%2Fservices-de-securite%2Fservices-geres-de-securite%2F|title:Link” mpc_button__font_preset=”mpc_preset_20″ mpc_button__font_color=”#d3313a” mpc_button__font_size=”16″ mpc_button__font_transform=”uppercase” mpc_button__title=”En savoir plus” mpc_button__border_css=”border-width:2px;border-color:#d3313a;border-style:solid;border-radius:0px;” mpc_button__padding_divider=”true” mpc_button__padding_css=”padding-top:12px;padding-right:30px;padding-bottom:12px;padding-left:30px;” mpc_button__margin_divider=”true” mpc_button__margin_css=”margin-top:11px;” mpc_button__hover_font_color=”#ffffff” mpc_button__hover_background_color=”#d3313a” mpc_button__hover_background_effect=”slide-top” mpc_button__mpc_tooltip__border_divider=”true” mpc_button__mpc_tooltip__padding_divider=”true” animation_in_type=”transition.fadeIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”400″]Expertise externe pour vos services de cybersécurité. Maintenir les réductions de coûts opérationnels et les besoins évolutifs.[/mpc_callout][/vc_column][/vc_row][vc_row full_width=”stretch_row” enable_first_overlay=”true” first_overlay_opacity=”25″ first_background_color=”#333333″ css=”.vc_custom_1604530991001{padding-top: 25px !important;padding-bottom: 75px !important;background-image: url(https://k2demo.ca/sph/wp-content/uploads/2020/10/background-index.jpg?id=32704) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_custom_heading text=”Nos services” font_container=”tag:h2|text_align:center|color:%23ffffff” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal” css=”.vc_custom_1602470383537{margin-bottom: 30px !important;}”][mpc_divider width=”10″ lines_color=”#ffffff” lines_weight=”5″ margin_divider=”true” margin_css=”margin-top:25px;margin-bottom:25px;”][vc_row_inner][vc_column_inner width=”1/3″][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Évaluation du risque en cybersécurité” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_preset=”mpc_preset_5″ content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Audits et conformité” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Centre opérationnel de sécurité” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_preset=”mpc_preset_5″ content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Évaluation de la posture de cybersécurité” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_preset=”mpc_preset_5″ content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Surveillance Dark Web” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_preset=”mpc_preset_5″ content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Sécurité Internet des objets” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_preset=”mpc_preset_5″ content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][/vc_column_inner][vc_column_inner width=”1/3″][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Sensibilisation à la cybersécurité” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_preset=”mpc_preset_5″ content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Service d’hameçonnage” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_preset=”mpc_preset_5″ content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Conception d’infrastructures sécurisées” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_preset=”mpc_preset_5″ content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Pare-feu géré” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_preset=”mpc_preset_5″ content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Services de téléphonie IP” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_preset=”mpc_preset_5″ content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Architecture de sécurité” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_preset=”mpc_preset_5″ content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][/vc_column_inner][vc_column_inner width=”1/3″][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Technologies de sécurité” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Sécurité sans-fil” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_preset=”mpc_preset_5″ content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Sauvegarde des données” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Réseaux de télécommunications” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_preset=”mpc_preset_5″ content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Sécurité des communications réseaux” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_preset=”mpc_preset_5″ content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][mpc_icon_column layout=”style_3″ alignment=”left” padding_divider=”true” padding_css=”padding-top:30px;” margin_divider=”true” title_font_preset=”mpc_preset_38″ title_font_color=”#ffffff” title_font_size=”16″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Sécurité de la mobilité” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:15px;” content_font_preset=”mpc_preset_5″ content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.5″ content_font_transform=”none” content_font_align=”left” mpc_icon__transition=”slide-up” mpc_icon__icon=”fa fa-check” mpc_icon__icon_color=”#d3313a” mpc_icon__icon_size=”20″ mpc_icon__padding_divider=”true” mpc_icon__padding_css=”padding-right:10px;” mpc_icon__margin_divider=”true” mpc_icon__margin_css=”margin-top:-7px;” mpc_icon__hover_icon_color=”#ffffff” mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__border_css=”border-color:undefined;border-style:undefined;” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” animation_in_type=”transition.flipXIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″][/mpc_icon_column][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row full_width=”stretch_row” enable_parallax=”true” parallax_style=”fixed” css=”.vc_custom_1603407620514{padding-top: 25px !important;padding-bottom: 65px !important;}”][vc_column alignment=”center”][vc_custom_heading text=”Quelques statistiques” font_container=”tag:h2|text_align:center” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal” css=”.vc_custom_1602470391199{margin-bottom: 30px !important;}”][mpc_divider width=”10″ lines_color=”#d3313a” lines_weight=”5″ margin_divider=”true” margin_css=”margin-top:25px;margin-bottom:25px;”][/vc_column][vc_column width=”1/4″ alignment=”center”][mpc_counter title_font_preset=”mpc_preset_52″ title_font_color=”#0a0707″ title_font_size=”18″ title_font_line_height=”1″ title_font_transform=”none” title=”millions” counter_font_preset=”mpc_preset_52″ counter_font_color=”#0a0707″ counter_font_size=”48″ counter_font_line_height=”1″ counter_font_transform=”capitalize” value=”600″ duration=”2200″ delay=”0″ disable_easing=”true” mpc_icon__icon=”fa fa-dollar” mpc_icon__icon_color=”#0a0707″ mpc_icon__icon_size=”48″ mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true”][vc_empty_space height=”16px”][vc_column_text]Estimé du coût mondial annuel des cyberattaques[/vc_column_text][/vc_column][vc_column width=”1/4″ alignment=”center”][mpc_counter title_font_preset=”mpc_preset_52″ title_font_color=”#0a0707″ title_font_size=”18″ title_font_line_height=”1″ title_font_transform=”none” title=”jours” counter_font_preset=”mpc_preset_52″ counter_font_color=”#0a0707″ counter_font_size=”48″ counter_font_line_height=”1″ counter_font_transform=”capitalize” value=”191″ duration=”2200″ delay=”0″ disable_easing=”true” mpc_icon__icon=”fa fa-calendar” mpc_icon__icon_color=”#0a0707″ mpc_icon__icon_size=”48″ mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true”][vc_empty_space height=”16px”][vc_column_text]Délai moyen en jours entre le moment de la cyberattaque et sa découverte[/vc_column_text][/vc_column][vc_column width=”1/4″ alignment=”center”][mpc_counter title_font_preset=”mpc_preset_52″ title_font_color=”#0a0707″ title_font_size=”18″ title_font_line_height=”1″ title_font_transform=”none” title=”millions” counter_font_preset=”mpc_preset_52″ counter_font_color=”#0a0707″ counter_font_size=”48″ counter_font_line_height=”1″ counter_font_transform=”capitalize” value=”11.5″ duration=”2200″ delay=”0″ disable_easing=”true” mpc_icon__icon=”fa fa-dollar” mpc_icon__icon_color=”#0a0707″ mpc_icon__icon_size=”48″ mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true”][vc_empty_space height=”16px”][vc_column_text]Coûts estimés des dommages causés par rançongiciels en 2019[/vc_column_text][/vc_column][vc_column width=”1/4″ alignment=”center”][mpc_counter title_font_preset=”mpc_preset_52″ title_font_color=”#0a0707″ title_font_size=”18″ title_font_line_height=”1″ title_font_transform=”none” title=”secondes” counter_font_preset=”mpc_preset_52″ counter_font_color=”#0a0707″ counter_font_size=”48″ counter_font_line_height=”1″ counter_font_transform=”capitalize” value=”14″ duration=”2200″ delay=”0″ disable_easing=”true” mpc_icon__icon=”fa fa-clock-o” mpc_icon__icon_color=”#0a0707″ mpc_icon__icon_size=”48″ mpc_icon__mpc_tooltip__border_divider=”true” mpc_icon__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true”][vc_empty_space height=”16px”][vc_column_text]La fréquence des rançongiciels attendues en 2020[/vc_column_text][/vc_column][/vc_row][vc_row full_width=”stretch_row” enable_parallax=”true” parallax_background=”32361″ parallax_style=”fixed” css=”.vc_custom_1603407638418{padding-top: 25px !important;padding-bottom: 65px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_custom_heading text=”Commencer maintenant” font_container=”tag:h2|text_align:center” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal” css=”.vc_custom_1602470397912{margin-bottom: 30px !important;}”][mpc_divider width=”10″ lines_color=”#d3313a” lines_weight=”5″ margin_divider=”true” margin_css=”margin-top:25px;margin-bottom:25px;”][vc_row_inner][vc_column_inner width=”1/6″][/vc_column_inner][vc_column_inner width=”2/3″][contact-form-7 id=”27665″][/vc_column_inner][vc_column_inner width=”1/6″][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row css=”.vc_custom_1602469844579{margin-top: -20px !important;padding-top: 50px !important;padding-bottom: 50px !important;}”][vc_column][vc_custom_heading text=”Nos fournisseurs” font_container=”tag:h2|text_align:center” google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal” css=”.vc_custom_1602470404130{margin-bottom: 30px !important;}”][mpc_divider width=”10″ lines_color=”#d3313a” lines_weight=”5″ margin_divider=”true” margin_css=”margin-top:25px;margin-bottom:25px;”][vc_empty_space][mpc_carousel_image single_scroll=”true” loop=”true” auto_slide=”true” delay=”1450″ speed=”500″ images=”32638,32640,32642,32644,32646,32648,32650″ rows=”1″ cols=”4″ gap=”30″ start_at=”1″ image_size=”full” image_opacity=”90″ image_hover_opacity=”90″ animation_in_type=”transition.fadeIn” animation_in_offset=”80″ animation_in_duration=”800″ animation_in_delay=”0″ images_links=”https://www.proofpoint.com/us,https://www.acronis.com/,https://www.bitdefender.com/,https://meraki.cisco.com/,https://www.fortinet.com/,https://www.kaseya.com/,https://www.netsurion.com/”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1602390583011{margin-bottom: 0px !important;background-color: #d3313a !important;}”][vc_column css=”.vc_custom_1451894094971{padding-top: 0px !important;}”][mpc_callout preset=”mpc_preset_21″ title_font_preset=”mpc_preset_52″ title_font_color=”#ffffff” title_font_size=”28″ title_font_line_height=”1″ title_font_transform=”none” title_font_align=”left” title=”Votre sécurité nous importe depuis plus de 12 ans” title_margin_divider=”true” title_margin_css=”margin-top:0px;margin-bottom:10px;” content_width=”77″ content_font_preset=”mpc_preset_44″ content_font_color=”#ffffff” content_font_size=”14″ content_font_line_height=”1.4″ content_font_align=”left” content_margin_divider=”true” content_margin_css=”margin-top:0px;margin-bottom:0px;” icon_align=”left” icon=”fa fa-envelope” icon_color=”#ffffff” icon_size=”46″ icon_padding_divider=”true” icon_padding_css=”padding-right:25px;” icon_margin_divider=”true” icon_margin_css=”margin-top:-20px;” background_color=”#d3313a” padding_divider=”true” padding_css=”padding-top:40px;padding-right:50px;padding-bottom:40px;padding-left:30px;” mpc_button__preset=”mpc_preset_89″ mpc_button__url=”url:https%3A%2F%2Fk2demo.ca%2Fsph%2Fnous-joindre%2F|title:Link” mpc_button__font_preset=”mpc_preset_52″ mpc_button__font_color=”#ffffff” mpc_button__font_size=”16″ mpc_button__font_transform=”uppercase” mpc_button__font_align=”center” mpc_button__title=”Nous joindre” mpc_button__border_css=”border-width:2px;border-color:#ffffff;border-style:solid;border-radius:0px;” mpc_button__padding_divider=”true” mpc_button__padding_css=”padding-top:6px;padding-right:40px;padding-bottom:6px;padding-left:40px;” mpc_button__margin_divider=”true” mpc_button__hover_font_color=”#d3313a” mpc_button__hover_background_color=”#ffffff” mpc_button__hover_background_effect=”slide-left” mpc_button__mpc_tooltip__border_divider=”true” mpc_button__mpc_tooltip__padding_divider=”true” mpc_divider__disable=”true” mpc_divider__preset=”mpc_preset_2″ mpc_divider__width=”10″ mpc_divider__lines_color=”#f7f7f7″ mpc_divider__lines_weight=”2″ mpc_divider__margin_divider=”true” mpc_divider__margin_css=”margin-bottom:-10px;” animation_in_type=”transition.slideUpIn” animation_in_offset=”90″ animation_in_duration=”1600″ animation_in_delay=”100″]Joignez-nous aujourd’hui pour profitez de notre expertise.[/mpc_callout][/vc_column][/vc_row]