[vc_row][vc_column]

[/vc_column][/vc_row][vc_row css=”.vc_custom_1625648270606{margin-top: -50px !important;padding-top: 0px !important;padding-bottom: 150px !important;}”][vc_column][tek_featuresections][tek_featuresections_single fss_title=”Intuitive dashboard” fss_title_tag=”” fss_subtitle=”Gain real-time visibility into your cybersecurity program and communicate effectively with your stakeholders.” fss_section_template=”side_photo” fss_icon_type=”icon_browser” fss_custom_link=”1″ fss_primary_button_action=”modal-trigger-btn” fss_primary_button_text=”Learn More” fss_link_style=”solid_button” fss_button_color_scheme=”btn_primary_color” fss_secondary_button=”disable-secondary-btn” fss_nav_label=”Intuitive dashboard” fss_nav_icon_type=”icon_browser” featured_image_source=”media_library” fss_featured_image=”8195″ fss_image_align=”img-align-right” fss_image_style=”fss-rectangle” fss_image_shadow=”fss-shadow-image” fss_click_action=”open_photoswipe” css_animation_content=”kd-animated fadeInLeft” css_animation_image=”kd-animated fadeInRight” fss_nav_style=”nav-dots” fss_bg_color=”#f7f7f7″ link_text=”Browse our template gallery”]

  • Instant Data Visualization
  • New Business Context Insights
  • One-Click Reporting

[/tek_featuresections_single][tek_featuresections_single fss_title=”K-12 Cybersecurity Framework” fss_title_tag=”” fss_subtitle=”Establish your Cybersecurity Framework using industry best practices. Leverage the experience and collaboration between Cybersecurity and Education leadership to secure your organization.” fss_section_template=”side_photo” fss_icon_type=”icon_browser” fss_custom_link=”1″ fss_primary_button_action=”modal-trigger-btn” fss_primary_button_text=”Learn More” fss_link_style=”solid_button” fss_button_color_scheme=”btn_primary_color” fss_secondary_button=”disable-secondary-btn” fss_nav_label=”Established Framework” fss_nav_icon_type=”icon_browser” featured_image_source=”media_library” fss_featured_image=”8196″ fss_image_align=”img-align-left” fss_image_style=”fss-rectangle” fss_image_shadow=”fss-shadow-image” fss_click_action=”open_photoswipe” css_animation_content=”kd-animated fadeInRight” css_animation_image=”kd-animated fadeInLeft” fss_nav_style=”nav-dots” fss_bg_color=”#f7f7f7″ link_text=”Browse our template gallery”]

  • NIST 800-53 Based Controls
  • Threat Aligned Implementation
  • Matching Policy Library

[/tek_featuresections_single][tek_featuresections_single fss_title=”Simplified Compliance” fss_title_tag=”” fss_subtitle=”Take the guess work out of compliance for your organization. Have a clear position on how you comply with state and federal regulations.” fss_section_template=”side_photo” fss_icon_type=”icon_browser” fss_custom_link=”1″ fss_primary_button_action=”modal-trigger-btn” fss_primary_button_text=”LEARN MORE” fss_link_style=”solid_button” fss_button_color_scheme=”btn_primary_color” fss_secondary_button=”disable-secondary-btn” fss_nav_label=”Simplified Compliance” fss_nav_icon_type=”icon_browser” featured_image_source=”media_library” fss_featured_image=”8198″ fss_image_align=”img-align-right” fss_image_style=”fss-rectangle” fss_image_shadow=”fss-shadow-image” fss_click_action=”open_photoswipe” css_animation_content=”kd-animated fadeInLeft” css_animation_image=”kd-animated fadeInRight” fss_nav_style=”nav-dots” fss_bg_color=”#f7f7f7″ link_text=”Browse our template gallery”]

  • TEC 11.175 (State -Texas)
  • EdLaw 2-d (State – New York)
  • FERPA (Federal)
  • CIPA (Federal)
  • COPA (Federal)
  • HIPAA (Federal)

[/tek_featuresections_single][tek_featuresections_single fss_title=”IT Risk Identification” fss_title_tag=”” fss_subtitle=”Take a data-driven approach to identifying your IT Risk. Use benchmarking to identify where you align with your peers and reduce your legal liability.” fss_section_template=”side_photo” fss_icon_type=”icon_browser” fss_custom_link=”1″ fss_primary_button_action=”modal-trigger-btn” fss_primary_button_text=”LEARN MORE” fss_link_style=”solid_button” fss_button_color_scheme=”btn_primary_color” fss_secondary_button=”disable-secondary-btn” fss_nav_label=”IT Risk Identification” fss_nav_icon_type=”icon_browser” featured_image_source=”media_library” fss_featured_image=”8197″ fss_image_align=”img-align-left” fss_image_style=”fss-rectangle” fss_image_shadow=”fss-shadow-image” fss_click_action=”open_photoswipe” css_animation_content=”kd-animated fadeInRight” css_animation_image=”kd-animated fadeInLeft” fss_nav_style=”nav-dots” fss_bg_color=”#f7f7f7″ link_text=”Browse our template gallery”]

  • Control Level Benchmarking
  • Intelligent Risk Identification
  • Budget Optimization

[/tek_featuresections_single][/tek_featuresections][/vc_column][/vc_row][vc_row full_width=”stretch_row” parallax=”content-moving” parallax_speed_bg=”1.4″ kd_image_overlay_color=”rgba(0,0,0,0.7)” kd_image_overlay=”true” css=”.vc_custom_1623833926693{background: #1a1a1a url(https://v3cybersecurity.com/wp-content/uploads/2021/05/shutterstock_1687333489-scaled.jpg?id=7476);background-position:center;background-repeat:-repeat;background-size:cover;}”][vc_column css=”.vc_custom_1516095225433{padding-right: 0px !important;padding-left: 0px !important;}”][vc_row_inner css=”.vc_custom_1555673013129{padding-top: 150px !important;padding-bottom: 123px !important;}”][vc_column_inner width=”1/12″ css=”.vc_custom_1515166784808{padding-top: 50px !important;}”][/vc_column_inner][vc_column_inner width=”4/12″][tek_sectiontitle st_title=”Minerva EDU is the only cybersecurity platform designed specifically to address the digital risks facing K-12.” st_title_tag=”” st_subtitle=”Our network of industry experts and partners are focused on leveraging our experience and capabilities to enable your success.” st_subtitle_tag=”” st_subtitle_decoration=”” st_title_color=”#ffffff” st_subtitle_color=”#eeeeee” st_separator_enable=”separator_off” st_text_align=”text-left” st_width=”st_fullwidth” css_animation=”kd-animated fadeIn” css_animation_delay=”200″ css=”.vc_custom_1621270674266{margin-top: 20px !important;}”][/vc_column_inner][vc_column_inner width=”1/12″][/vc_column_inner][vc_column_inner width=”5/12″][vc_custom_heading text=”Sleep better knowing that you are doing enough!” font_container=”tag:h4|text_align:left|color:%23ffffff” use_theme_fonts=”yes” css_animation=”fadeIn” css=”.vc_custom_1621512208887{margin-bottom: 30px !important;}”]




    [/vc_column_inner][vc_column_inner width=”1/12″][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row full_width=”stretch_row”][vc_column][vc_row_inner css=”.vc_custom_1511348417220{padding-top: 100px !important;padding-bottom: 100px !important;}”][vc_column_inner width=”1/4″][/vc_column_inner][vc_column_inner width=”1/2″][tek_sectiontitle st_title=”What are your peers doing? Gain access to the world’s largest K-12 cybersecurity benchmarking platform.” st_title_tag=”” st_subtitle_tag=”” st_subtitle_decoration=”” st_separator_enable=”separator_off” st_text_align=”text-center” st_width=”st_fullwidth” css_animation=”kd-animated fadeIn” css_animation_delay=”200″ css=”.vc_custom_1621540175608{margin-bottom: 25px !important;}”][tek_button button_text=”Get started” button_style=”tt_primary_button” button_color_scheme=”btn_primary_color” button_hover_state=”” button_icon_bool=”no” button_action=”panel-trigger-btn” button_position=”button-center” css_animation=”kd-animated zoomIn” elem_animation_delay=”200″][vc_empty_space height=”25px”][/vc_column_inner][vc_column_inner width=”1/4″][/vc_column_inner][/vc_row_inner][vc_column_text][/vc_column_text][/vc_column][/vc_row]