[av_heading tag=’h1′ padding=’30’ heading=’Disaster Recovery Planning.‘ color=” style=’blockquote modern-quote’ custom_font=” size=’70’ subheading_active=” subheading_size=’15’ custom_class=” admin_preview_bg=” av-desktop-hide=” av-medium-hide=” av-small-hide=” av-mini-hide=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=”][/av_heading]

[av_one_half first min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’fade-in’ mobile_breaking=” mobile_display=”]
[av_hr class=’short’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ admin_preview_bg=”]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=”]
RPM can help with all phases of disaster recovery preparedness.  An assessment can document the businesses’ current level of preparedness, a new plan can be created, or a modernization of existing plans are all ways RPM will work to give clients a complete DR solution.  Regular testing is crucial to the success of any DR plan.
[/av_textblock]

[av_hr class=’short’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ admin_preview_bg=”]
[/av_one_half]

[av_one_half min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’fade-in’ mobile_breaking=” mobile_display=”]
[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=”]

[/av_textblock]
[/av_one_half]

[av_one_half first min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’bottom-to-top’ mobile_breaking=” mobile_display=”]
[av_hr class=’invisible’ height=’40’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ admin_preview_bg=”]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=”]

We Take Security Seriously

There’s a saying in cybersecurity that there are companies that have been hacked and companies that simply don’t know they’ve been hacked. At RPM we take security very seriously and have long determined that the best defense is a good offense. In other words, we set up systems that do not make for easy prey.
[/av_textblock]
[/av_one_half]

[av_one_half min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’bottom-to-top’ mobile_breaking=” mobile_display=”]
[av_hr class=’invisible’ height=’40’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ admin_preview_bg=”]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=”]

Our philosophy

IT security management and a good compliance program go hand in hand. Anyone can turn on Anti-virus and a Firewall, but we know comprehensive security goes far beyond the technology. We incorporate policy and procedures into security management to help ensure effective information security.
[/av_textblock]
[/av_one_half]

[av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-shadow’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_arrow_bg=” id=’bgkd-cover’ color=’main_color’ custom_bg=” src=’http://dev.rpmtechnologies.com/wp-content/uploads/2018/03/pexels-photo-97077.jpg’ attachment=’1169′ attachment_size=’full’ attach=’scroll’ position=’top left’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” av_element_hidden_in_editor=’0′]
[av_one_fifth first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=”]

[/av_one_fifth][av_three_fifth min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=”]

[av_promobox button=’yes’ label=’Contact Us’ link=’page,513′ link_target=” color=’theme-color’ custom_bg=’#444444′ custom_font=’#ffffff’ size=’large’ icon_select=’no’ icon=’ue800′ font=’entypo-fontello’ box_color=” box_custom_font=’#ffffff’ box_custom_bg=’#444444′ box_custom_border=’#333333′ admin_preview_bg=”]

Interested in these services? Contact us for more information!

[/av_promobox]

[/av_three_fifth][av_one_fifth min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=”]

[/av_one_fifth]
[/av_section]

[av_one_full first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=”]
[av_heading heading=’We can help address all of your security concerns. Our security management includes:’ tag=’h2′ style=’blockquote modern-quote modern-centered’ size=” subheading_active=” subheading_size=’15’ padding=’10’ color=” custom_font=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=”][/av_heading]
[/av_one_full]

[av_one_third first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=”]
[av_iconlist position=’left’ iconlist_styling=” custom_title_size=” custom_content_size=” font_color=” custom_title=” custom_content=” color=” custom_bg=” custom_font=” custom_border=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=”]
[av_iconlist_item title=’Complete IT security assessment’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’][/av_iconlist_item]
[av_iconlist_item title=’Policy development and review’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’][/av_iconlist_item]
[av_iconlist_item title=’Regulatory compliance assessment’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’][/av_iconlist_item]
[/av_iconlist]
[/av_one_third]

[av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=”]
[av_iconlist position=’left’ iconlist_styling=” custom_title_size=” custom_content_size=” font_color=” custom_title=” custom_content=” color=” custom_bg=” custom_font=” custom_border=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=”]
[av_iconlist_item title=’Technology review and solution evaluation’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’][/av_iconlist_item]
[av_iconlist_item title=’Independent penetration testing’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’][/av_iconlist_item]
[/av_iconlist]
[/av_one_third]

[av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=”]
[av_iconlist position=’left’ iconlist_styling=” custom_title_size=” custom_content_size=” font_color=” custom_title=” custom_content=” color=” custom_bg=” custom_font=” custom_border=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=”]
[av_iconlist_item title=’AV and spam filtering’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’][/av_iconlist_item]
[av_iconlist_item title=’Firewall security and intrusion prevention’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’][/av_iconlist_item]
[/av_iconlist]
[/av_one_third]

[av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-shadow’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_arrow_bg=” id=’bgkd-cover’ color=’alternate_color’ custom_bg=” src=’http://dev.rpmtechnologies.com/wp-content/uploads/2018/02/red-bkg.jpg’ attachment=’954′ attachment_size=’full’ attach=’scroll’ position=’center center’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” av_element_hidden_in_editor=’0′]
[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=”]

What Our Clients Have Said

“From our very first meeting, RPM understood my business. They managed a recent acquisition and systems upgrade without disrupting operations. Now we’re on track for future IT expansion.”

Charles Haywood

President, Mansfield-King

[/av_textblock]
[/av_section]