{"id":5,"date":"2020-01-13T11:17:52","date_gmt":"2020-01-13T11:17:52","guid":{"rendered":"https:\/\/demosites.io\/web-agency-gb\/?page_id=5"},"modified":"2026-01-13T22:20:09","modified_gmt":"2026-01-13T22:20:09","slug":"15c42-web-agency-gb-home","status":"publish","type":"page","link":"https:\/\/zencybersecurity.com\/","title":{"rendered":"Home"},"content":{"rendered":"\n<div class=\"wp-block-cover alignfull is-light\" style=\"min-height:700px;aspect-ratio:unset;\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"384\" class=\"wp-block-cover__image-background wp-image-340 size-large\" alt=\"\" src=\"https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/Zen-Woman-on-Phone3-1024x384.png\" data-object-fit=\"cover\" srcset=\"https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/Zen-Woman-on-Phone3-1024x384.png 1024w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/Zen-Woman-on-Phone3-600x225.png 600w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/Zen-Woman-on-Phone3-300x112.png 300w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/Zen-Woman-on-Phone3-768x288.png 768w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/Zen-Woman-on-Phone3-1536x576.png 1536w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/Zen-Woman-on-Phone3-2048x768.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-0 has-background-dim\" style=\"background-color:#24365c\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div style=\"height:80px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center has-text-color\" style=\"color:#121212\"><span class=\"has-inline-color has-nv-site-bg-color\">The Cybersecurity Company For Small Businesses<\/span><\/h1>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-center\"><span class=\"has-inline-color has-nv-site-bg-color\">Giving small businesses someone to turn to.<\/span><\/h4>\n\n\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><\/div>\n\n\n\n<div style=\"height:80px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:80px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:80px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/outline_lock_black_24dp.png\" alt=\"\" class=\"wp-image-337\"\/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-neve-text-color-color has-text-color\">Cyberattack Prevention and Remediation<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Stop the bad actors before they can get in.  When they do, kill their access.  Clean up the mess to keep your business moving forward.  <\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/outline_security_black_24dp.png\" alt=\"\" class=\"wp-image-344\"\/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-neve-text-color-color has-text-color\">Multi-front Security<\/h3>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center\">Comprehensive Security Services Suite including Multifactor Authentication, Endpoint, DNS, Email, Firewall, and Security Services Edge.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/outline_support_agent_black_24dp.png\" alt=\"\" class=\"wp-image-336\"\/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-neve-text-color-color has-text-color\">Responsive Customer Service<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Our Security Professionals have worked for the largest organizations in the world, but recognize that you shouldn&#8217;t have to have a household brand name to be treated like you are.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/zencybersecurity.com\/index.php\/shop\/\">Go to our Shop<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\" style=\"min-height:600px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-nv-light-bg-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"773\" height=\"1024\" src=\"http:\/\/zencybersecurity.zetaproductionz.com\/wp-content\/uploads\/2021\/08\/security-laptop-1-773x1024.jpg\" alt=\"\" class=\"wp-image-349\" srcset=\"https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/security-laptop-1-773x1024.jpg 773w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/security-laptop-1-600x794.jpg 600w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/security-laptop-1-227x300.jpg 227w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/security-laptop-1-768x1017.jpg 768w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/security-laptop-1-1160x1536.jpg 1160w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/security-laptop-1-1547x2048.jpg 1547w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/security-laptop-1.jpg 1583w\" sizes=\"auto, (max-width: 773px) 100vw, 773px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left has-neve-text-color-color has-text-color\">Protection<\/h2>\n\n\n\n<p class=\"has-text-align-left has-neve-text-color-color has-text-color\" style=\"font-size:17px\">Zen Cyber Security uses Enterprise class security solutions that a small business does not have access to.  Whether it be the technical skill level required to operationalize the technology or the minimum purchase requirements for the solutions there are inherent boundaries for Small and Micro businesses to get access to an effective security suite.  Zen Cyber Security solves those problems by providing both the expertise, tooling and volume required to leverage effective security.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-7e5fce0a wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-primary\"><a class=\"wp-block-button__link has-nv-site-bg-color has-text-color has-background wp-element-button\" href=\"https:\/\/zencybersecurity.com\/index.php\/protection\/\" style=\"background-color:#2a5ff8\">LEARN MORE<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\" style=\"min-height:600px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-nv-text-dark-bg-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div style=\"height:80px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<h2 class=\"wp-block-heading has-text-align-left has-neve-text-color-color has-text-color\">Affordable<\/h2>\n\n\n\n<p class=\"has-text-align-left has-neve-text-color-color has-text-color\" style=\"font-size:17px\">Enterprise businesses are able to reduce the per device cost associated with their security suite, because they buy in volume.  We do the same thing.  By buying in volume we can reduce the cost of per user and devices.  Automation is the key to scale.  Our engineers leverage manufacture native and custom automation to filter the noise.  This reduces the operational cost associated with engineering time, which we pass on to you.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-7e5fce0a wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-primary\"><a class=\"wp-block-button__link has-nv-site-bg-color has-text-color has-background wp-element-button\" href=\"https:\/\/zencybersecurity.com\/index.php\/affordable\/\" style=\"background-color:#2a5ff8\">LEARN MORE<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"795\" height=\"1024\" src=\"http:\/\/zencybersecurity.zetaproductionz.com\/wp-content\/uploads\/2021\/08\/guy-on-phone-795x1024.jpg\" alt=\"\" class=\"wp-image-352\" srcset=\"https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/guy-on-phone-795x1024.jpg 795w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/guy-on-phone-600x773.jpg 600w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/guy-on-phone-233x300.jpg 233w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/guy-on-phone-768x990.jpg 768w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/guy-on-phone-1192x1536.jpg 1192w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/guy-on-phone.jpg 1411w\" sizes=\"auto, (max-width: 795px) 100vw, 795px\" \/><\/figure>\n\n\n\n<p><\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\" style=\"min-height:1051px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-nv-light-bg-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div style=\"height:80px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"760\" height=\"1024\" src=\"http:\/\/zencybersecurity.zetaproductionz.com\/wp-content\/uploads\/2021\/08\/customer-support-760x1024.jpg\" alt=\"\" class=\"wp-image-356\" style=\"width:489px;height:658px\" srcset=\"https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/customer-support-760x1024.jpg 760w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/customer-support-600x809.jpg 600w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/customer-support-223x300.jpg 223w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/customer-support-768x1035.jpg 768w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/customer-support-1139x1536.jpg 1139w, https:\/\/zencybersecurity.com\/wp-content\/uploads\/2021\/08\/customer-support.jpg 1411w\" sizes=\"auto, (max-width: 760px) 100vw, 760px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left has-neve-link-color-color has-text-color\">Responsive Customer Support<\/h2>\n\n\n\n<p class=\"has-text-align-left has-neve-link-color-color has-text-color\" style=\"font-size:17px\">Zen Cyber Security was founded in the Mid-West, grown out of small towns.  We know what it means to support our neighbors.  Zen Cyber Security understands that any incident your business incurs has devastating impact to your operations and reputation.  Zen Cyber Security Incident Responders have years of experience Preparing, Detecting and Analyzing , Containing, Eradicating, and Recovering from cyber incidents.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-right is-layout-flex wp-container-core-buttons-is-layout-765c4724 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/zencybersecurity.com\/index.php\/contact\/\">Contact Us<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/zencybersecurity.com\/index.php\/shop\/\">Go to our Shop<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberattack Prevention and Remediation Stop the bad actors before they can get in. When they do, kill their access. Clean up the mess to keep your business moving forward. Multi-front Security Comprehensive Security Services Suite including Multifactor Authentication, Endpoint, DNS, Email, Firewall, and Security Services Edge. Responsive Customer Service Our Security Professionals have worked for&hellip;&nbsp;<a href=\"https:\/\/zencybersecurity.com\/\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Home<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"default","neve_meta_container":"default","neve_meta_enable_content_width":"on","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"off","neve_meta_disable_title":"on","footnotes":""},"class_list":["post-5","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/5","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/comments?post=5"}],"version-history":[{"count":37,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/5\/revisions"}],"predecessor-version":[{"id":767,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/5\/revisions\/767"}],"wp:attachment":[{"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/media?parent=5"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}