Heading 2 white/red

Heading 3 white/red

Heading 4 white/red

New Tab Link

Same Tab Link

Link to PDF

This is an example of an inline link that you can click on.

Below are shortcodes to make buttons on your site. The “title” sets the text of the button, the “link” is the url that the button links to, the “type” sets the color or style of the button, and “new” will open the button in a new tab if set to “yes”.

Red Button (new tab) Underline Button (same tab)

Red Button Red Button

Red Button

Blue Button

This is an example of a bulleted list.

  • Bullet #1
  • Bullet #2
  • Bullet #3

This is an example of a numbered list.

  1. Numbered #1
  2. Numbered #2
  3. Numbered #3

You can also use a horizontal line to visually divide content sections. The element can be selected from the bar above.


Images are added by selecting the “Add Media” button from above and selecting your preferred image. To style the image click on the image you have added. Click the little pencil “Edit” button. Under “Display Settings” you have alignment options and size options. Sometimes the image will com in small or blurry, change it to a larger size to fix this issue.

Videos can be added by pasting a link from Vimeo, YouTube, etc in the editor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

greek sea

Centered Content Block

As cybersecurity experts working on-site, PowerStrux was originally developed by Justin Sylvester and Roy (Mac) Kincaid as a tool to save time, minimize human error, and support continuous monitoring. The PowerStrux Suite focuses on innovative tools and techniques that introduce new solutions and adapt to future challenges.

Do Not Press

Centered Content Block

As cybersecurity experts working on-site, PowerStrux was originally developed by Justin Sylvester and Roy (Mac) Kincaid as a tool to save time, minimize human error, and support continuous monitoring. The PowerStrux Suite focuses on innovative tools and techniques that introduce new solutions and adapt to future challenges.

Do Not Press

Centered Content Block

As cybersecurity experts working on-site, PowerStrux was originally developed by Justin Sylvester and Roy (Mac) Kincaid as a tool to save time, minimize human error, and support continuous monitoring. The PowerStrux Suite focuses on innovative tools and techniques that introduce new solutions and adapt to future challenges.

Do Not Press

Optional H2

Card Title #1

Trusted by 350+ companies, this auditing tool monitors system and user activity on Windows using PowerShell, Microsoft’s built-in language.

Learn More

Card Title #2

Trusted by 350+ companies, this auditing tool monitors system and user activity on Windows using PowerShell, Microsoft’s built-in language. PowerShell, Microsoft’s built-in language.

Learn More

Card Title #3

Trusted by 350+ companies, this auditing tool monitors system and user activity on Windows using PowerShell, Microsoft’s built-in language. Companies, this auditing tool monitors system and user activity on Windows using PowerShell, Microsoft’s built-in language.

Learn More

Optional H2

Card Title #1

Trusted by 350+ companies, this auditing tool monitors system and user activity on Windows using PowerShell, Microsoft’s built-in language.

Learn More

Card Title #2

Trusted by 350+ companies, this auditing tool monitors system and user activity on Windows using PowerShell, Microsoft’s built-in language. PowerShell, Microsoft’s built-in language.

Learn More

Optional H2

Card Title #1

Trusted by 350+ companies, this auditing tool monitors system and user activity on Windows using PowerShell, Microsoft’s built-in language.

Learn More

Card Title #2

Trusted by 350+ companies, this auditing tool monitors system and user activity on Windows using PowerShell, Microsoft’s built-in language. PowerShell, Microsoft’s built-in language.

Learn More

Card Title #3

Trusted by 350+ companies, this auditing tool monitors system and user activity on Windows using PowerShell, Microsoft’s built-in language. PowerShell, Microsoft’s built-in language.

Learn More

Card Title #4

Trusted by 350+ companies, this auditing tool monitors system and user activity on Windows using PowerShell, Microsoft’s built-in language. PowerShell, Microsoft’s built-in language.

Learn More

Optional List Features H2

Are long auditing processes leaving your data vulnerable? Don’t wait any longer. The PowerStrux suite of cybersecurity tools can identify vulnerabilities, fortify your defenses, and safeguard your company’s data. Don’t let insecurity linger—take action today.

Enhance Visibility

Enhance Visibility Enhance Visibility Enhance Visibility Enhance Visibility Enhance Visibility Enhance Visibility Enhance Visibility

Enhance Visibility Enhance Visibility

Enhance Visibility*

Enhance Visibility**

*Footnote one about lorem ipsum bacon.
**Footnote two about lorem ipsum bacon.

Content Optional Heading (H2)

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed.

Do not Press

Content Optional Heading (H2)

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed.

ocean waves on shore

Optional Accordions H2

Are long auditing processes leaving your data vulnerable? Don’t wait any longer. The PowerStrux suite of cybersecurity tools can identify vulnerabilities, fortify your defenses, and safeguard your company’s data. Don’t let insecurity linger—take action today.

Numbers not divisible by 2.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed.

Bison.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed.

Reality.

Oof what a burn! Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed.

I compliment your company on the software – it is a great product and well worth the investment.

Author Name

I compliment your company on the software – it is a great product and well worth the investment. I compliment your company on the software – it is a great product and well worth the investment.

Position& Title

I compliment your company on the software – it is a great product and well worth the investment. I love this product and it’s well worth the investment.

I compliment your company on the software – it is a great product and well worth the investment. I love this product and it’s well worth the investment.

Author Name

Position & Title

I compliment your company on the software – it is a great product and well worth the investment. I love this product and it’s well worth the investment.

greek sea

Author Name

Position & Title

Optional Pricing H2

Are long auditing processes leaving your data vulnerable? Don’t wait any longer. The PowerStrux suite of cybersecurity tools can identify vulnerabilities, fortify your defenses, and safeguard your company’s data. Don’t let insecurity linger—take action today.

Workstations

Tier 1

$1,000/yr

1-3 Workstations

Tier 2

$2,000/yr

4-10 Workstations

Domains

Tier 1

$1,000/yr

Single Domain

Tier 2

$2,000/yr

2-3 Domains

Tier 3

$10,000/yr

3+ Domains

CTA Callout H2

As cybersecurity experts working on-site, PowerStrux was originally developed by Justin Sylvester and Roy (Mac) Kincaid as a tool to save time, minimize human error, and support continuous monitoring. The PowerStrux Suite focuses on innovative tools and techniques that introduce new solutions and adapt to future challenges.

Do Not Press Do Not Press