{"id":74,"date":"2023-09-15T23:20:39","date_gmt":"2023-09-15T23:20:39","guid":{"rendered":"https:\/\/texancyber.com\/index.php\/our-services\/"},"modified":"2023-10-26T20:28:01","modified_gmt":"2023-10-26T20:28:01","slug":"our-services","status":"publish","type":"page","link":"https:\/\/texancyber.com\/index.php\/our-services\/","title":{"rendered":"Our Services"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"74\" class=\"elementor elementor-74\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-25a8cae7 e-flex e-con-boxed e-con e-parent\" data-id=\"25a8cae7\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1163c694 e-con-full e-flex e-con e-child\" data-id=\"1163c694\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-37455a3 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"37455a3\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Our Services<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f8430b3 e-con-full e-flex e-con e-parent\" data-id=\"4f8430b3\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\" data-core-v316-plus=\"true\">\n\t\t<div class=\"elementor-element elementor-element-66c691b4 e-con-full e-flex e-con e-child\" data-id=\"66c691b4\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-7cc173af e-con-full e-flex e-con e-child\" data-id=\"7cc173af\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-591f9b37 e-con-full e-flex e-con e-child\" data-id=\"591f9b37\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16fa52b6 elementor-widget elementor-widget-heading\" data-id=\"16fa52b6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber security<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44dfc547 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"44dfc547\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-648c5f5d elementor-widget elementor-widget-text-editor\" data-id=\"648c5f5d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li>Network\/Endpoint Security<\/li><li>Patch Management<\/li><li>24\/7 Security Monitoring<\/li><li>Risk Assessments<\/li><li>Security Compliance<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a9cd723 e-con-full e-flex e-con e-child\" data-id=\"4a9cd723\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-4172b5af e-con-full e-flex e-con e-child\" data-id=\"4172b5af\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-563ce5e0 e-con-full e-flex e-con e-child\" data-id=\"563ce5e0\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-756f131e elementor-widget elementor-widget-heading\" data-id=\"756f131e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Network Infrastructure<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c43de5b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1c43de5b\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-130cb5b5 elementor-widget elementor-widget-text-editor\" data-id=\"130cb5b5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"ul1\"><li class=\"li1\">Network Design and Planning<\/li><li class=\"li1\">Network Setup and Configuration<\/li><li class=\"li1\">Network Security<\/li><li class=\"li1\">Networking Monitoring and Management<\/li><li class=\"li1\">VPN and Remote Access Solutions<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-527f3161 e-con-full e-flex e-con e-child\" data-id=\"527f3161\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3af31d1c e-con-full e-flex e-con e-child\" data-id=\"3af31d1c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2793d952 e-con-full e-flex e-con e-child\" data-id=\"2793d952\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-70b46773 elementor-widget elementor-widget-heading\" data-id=\"70b46773\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">IT Consulting<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-342d3419 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"342d3419\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58ece96a elementor-widget elementor-widget-text-editor\" data-id=\"58ece96a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li>IT Strategy and Planning<\/li><li class=\"li1\">Technology Assessments<\/li><li class=\"li1\">Cloud Solutions<\/li><li class=\"li1\">Collaboration and Communication Tools<\/li><li class=\"li1\">Remote Work and Telecommuting Solutions<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-225a89b7 e-con-full e-flex e-con e-child\" data-id=\"225a89b7\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-57d6684f e-con-full e-flex e-con e-child\" data-id=\"57d6684f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-328b7604 e-con-full e-flex e-con e-child\" data-id=\"328b7604\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-308e302f elementor-widget elementor-widget-heading\" data-id=\"308e302f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Managed IT Services<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1777d4ea elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1777d4ea\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76a40580 elementor-widget elementor-widget-text-editor\" data-id=\"76a40580\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"ul1\"><li class=\"li1\">IT Help Desk Support<\/li><li class=\"li1\">Desktop\/End User Support<\/li><li class=\"li1\">Remote IT Support<\/li><li class=\"li1\">Mobile Device Management<\/li><li class=\"li1\">Mobile Device Management<\/li><li class=\"li1\">IT Procurement and Vendor Management<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-411c840f e-con-full e-flex e-con e-child\" data-id=\"411c840f\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-4458bf94 e-con-full e-flex e-con e-child\" data-id=\"4458bf94\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33f0dbf4 e-con-full e-flex e-con e-child\" data-id=\"33f0dbf4\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d6593dd elementor-widget elementor-widget-heading\" data-id=\"3d6593dd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">data Services<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b953169 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3b953169\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4490ed98 elementor-widget elementor-widget-text-editor\" data-id=\"4490ed98\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"ul1\"><li class=\"li1\">Data Backup and Recovery<\/li><li class=\"li1\">Disaster Recovery and Business Continuity Planning<\/li><li class=\"li1\">On-Prem and Cloud Data Solutions<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-72365be8 e-flex e-con-boxed e-con e-parent\" data-id=\"72365be8\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2e8b6a95 e-con-full e-flex e-con e-child\" data-id=\"2e8b6a95\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5731af1d elementor-widget elementor-widget-heading\" data-id=\"5731af1d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Texan Cyber Solutions Benefits<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a5cd79a elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"5a5cd79a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>While most companies have their IT systems up and running, many of them struggle with proper management. Some opt to hire in-house IT technicians for this task, but these employees can cost over $85,000 per year. Fortunately, there&#8217;s a solution.<\/p><p>When you choose <strong>Texan Cyber Solutions<\/strong>, you&#8217;ll enjoy the following advantages for your organization:<\/p><ul class=\"ul1\"><li class=\"li1\"><strong>Enhanced Productivity<\/strong><ul class=\"ul2\"><li class=\"li1\">IT services contribute to fostering a dependable IT environment, reducing significant risks and downtime caused by technology-related issues, and enhancing the overall productivity of the staff.<\/li><\/ul><\/li><li class=\"li1\"><strong>Increased Cost Savings<\/strong><ul class=\"ul2\"><li class=\"li1\">You can manage your company&#8217;s IT expenses by eliminating the necessity of recruiting and training a full-time IT team. Through outsourced IT solutions, you only need to cover a fixed monthly fee.<\/li><\/ul><\/li><li class=\"li1\"><strong>Expert-Level Assistance<\/strong><ul class=\"ul2\"><li class=\"li1\">With the support of Texan Cyber Solutions, you&#8217;ll have privileged access to skilled professionals capable of addressing any IT-related challenges that in-house staff might lack the know-how to tackle.<\/li><\/ul><\/li><li class=\"li1\"><strong>Reduced Security Breaches<\/strong><ul class=\"ul2\"><li class=\"li1\">You can have peace of mind knowing that we will put in place cybersecurity measures to safeguard your most valuable digital assets from potential threats. In the unfortunate event of a breach, you can swiftly regain access to your data through our disaster recovery services and our comprehensive business continuity planning.<\/li><\/ul><\/li><li class=\"li1\"><strong>Improved Efficiency<\/strong><ul class=\"ul2\"><li class=\"li1\">With Texan Cyber Solutions in your corner, your team can dedicate more of their time to core business objectives and reduce the time spent dealing with computer issues.<\/li><\/ul><\/li><\/ul><p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ad17274 elementor-tablet-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"4ad17274\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/texancyber.com\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Our Services Cyber security Network\/Endpoint Security Patch Management 24\/7 Security Monitoring Risk Assessments Security Compliance Network Infrastructure Network Design and Planning Network Setup and Configuration Network Security Networking Monitoring and Management VPN and Remote Access Solutions IT Consulting IT Strategy and Planning Technology Assessments Cloud Solutions Collaboration and Communication Tools Remote Work and Telecommuting Solutions [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/texancyber.com\/index.php\/wp-json\/wp\/v2\/pages\/74"}],"collection":[{"href":"https:\/\/texancyber.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/texancyber.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/texancyber.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/texancyber.com\/index.php\/wp-json\/wp\/v2\/comments?post=74"}],"version-history":[{"count":40,"href":"https:\/\/texancyber.com\/index.php\/wp-json\/wp\/v2\/pages\/74\/revisions"}],"predecessor-version":[{"id":277,"href":"https:\/\/texancyber.com\/index.php\/wp-json\/wp\/v2\/pages\/74\/revisions\/277"}],"wp:attachment":[{"href":"https:\/\/texancyber.com\/index.php\/wp-json\/wp\/v2\/media?parent=74"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}