{"id":7,"date":"2019-04-02T20:04:54","date_gmt":"2019-04-02T20:04:54","guid":{"rendered":"https:\/\/unveil1.wpenginepowered.com\/?page_id=7"},"modified":"2025-04-21T15:07:09","modified_gmt":"2025-04-21T15:07:09","slug":"home","status":"publish","type":"page","link":"https:\/\/unveilsg.com\/","title":{"rendered":"Home"},"content":{"rendered":"<p>[vc_row el_id=&#8221;about&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1556545955838{padding-top: 40px !important;padding-bottom: 40px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;Who We Are&#8221; font_container=&#8221;tag:h2|text_align:left|color:%23c1272d&#8221; text_resize=&#8221;yes&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Unveil Security Group is a Service Disabled Veteran Owned company that specializes in security testing. We offer a variety of services such as vulnerability assessments, penetration testing, social engineering initiatives just to name a few.<\/p>\n<p>We serve as an independent third party providing clients with the assurance of expert security testing performed by DoD trained Cyber Warfare professionals who conduct such services on a regular basis using the best and latest industry security practices.<\/p>\n<p>Unveil was born out of the need for security testing at a high level for an affordable cost.<\/p>\n<p>Created by two self-proclaimed geeks who love what they do and aspire to use their knowledge and experience to protect your critical assets a few bytes at a time.[\/vc_column_text][cesis_button button_text=&#8221;Meet Our Team&#8221; link=&#8221;#team&#8221; button_size=&#8221;cesis_button_medium&#8221; button_border=&#8221;1&#8243; use_icon=&#8221;yes&#8221; icon_animation=&#8221;hover&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#c1272d&#8221; button_border_color=&#8221;#c1272d&#8221; h_button_text_color=&#8221;#c1272d&#8221; h_button_bg_color=&#8221;#ffffff&#8221; h_button_border_color=&#8221;#c1272d&#8221; button_f_weight=&#8221;500&#8243; button_t_transform=&#8221;none&#8221; icon=&#8221;fa-buddies&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;82&#8243; img_size=&#8221;large&#8221; style=&#8221;vc_box_border&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1556039875482{padding-top: 40px !important;padding-bottom: 40px !important;background-color: #c1272d !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner][vc_custom_heading text=&#8221;At Unveil Security Group, our vision is to develop a community of technical, competent, and trusted cyber security professionals that provide full spectrum security testing to both large and small scale companies through an aggressive and concise approach to vulnerability identification and validation, detailed and incisive reporting, and the education of clients and their staff &#8211; resulting in the development of a security posture that meets our client&#8217;s needs and promotes their peace of mind.&#8221; font_container=&#8221;tag:h4|text_align:center|color:%23f1f1f1&#8243; text_resize=&#8221;yes&#8221; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221; el_id=&#8221;team&#8221; css=&#8221;.vc_custom_1642525758255{padding-top: 20px !important;padding-bottom: 20px !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][cesis_staff style_ig=&#8221;cesis_staff_style_5&#8243; hover=&#8221;cesis_hover_fade&#8221; effect=&#8221;cesis_effect_shadow&#8221; thumbnail_size=&#8221;tn_portrait_2_3&#8243; to_show=&#8221;2&#8243; category=&#8221;3&#8243; tag=&#8221;all&#8221; col=&#8221;2&#8243; i_social=&#8221;social_c&#8221; target=&#8221;_blank&#8221; m_mbg_color=&#8221;rgba(0,0,0,0.3)&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1556040215633{padding-top: 40px !important;padding-bottom: 40px !important;background-color: #eaeaea !important;}&#8221; el_id=&#8221;capabilities&#8221;][vc_column][vc_row_inner][vc_column_inner][vc_custom_heading text=&#8221;What We Do&#8221; text_resize=&#8221;yes&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;We provide full spectrum security testing, following industry recognized methodologies and processes. Unveil focuses on your needs while providing expert security guidance at an affordable price.&#8221; font_container=&#8221;tag:h4|text_align:left&#8221; text_resize=&#8221;yes&#8221; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221;][vc_column offset=&#8221;vc_hidden-md vc_hidden-sm vc_hidden-xs&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1555959537625{padding-top: 100px !important;padding-right: 60px !important;padding-bottom: 100px !important;padding-left: 60px !important;}&#8221;][vc_custom_heading text=&#8221;Vulnerability Assessment&#8221; font_container=&#8221;tag:h4|text_align:left|color:%23c1272d&#8221; text_resize=&#8221;yes&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Not just an automated scan of your network regurgitated on hundreds of pages, in a report that just gets filed away &#8211; UNVEIL offers a deep manual analysis of your critical vulnerabilities through the application of the human perspective. Each reportable vulnerability is verified and accompanied with remediation recommendations, all designed to improve your security posture.<\/p>\n<p>Rest assured our team of experts practice the latest methods and procedures to <b><i>UNVEIL<\/i><\/b> security vulnerabilities and network weaknesses exposing your critical assets.[\/vc_column_text][cesis_button button_text=&#8221;Learn More&#8221; link=&#8221;#contact&#8221; button_size=&#8221;cesis_button_medium&#8221; button_border=&#8221;1&#8243; use_icon=&#8221;yes&#8221; icon_animation=&#8221;hover&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#c1272d&#8221; button_border_color=&#8221;#c1272d&#8221; h_button_text_color=&#8221;#c1272d&#8221; h_button_bg_color=&#8221;#ffffff&#8221; h_button_border_color=&#8221;#c1272d&#8221; button_t_transform=&#8221;none&#8221; icon=&#8221;fa-rightarrow&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1555603554136{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;175&#8243; img_size=&#8221;full&#8221; overflow=&#8221;yes&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221;][vc_column offset=&#8221;vc_hidden-lg&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1555959537625{padding-top: 100px !important;padding-right: 60px !important;padding-bottom: 100px !important;padding-left: 60px !important;}&#8221;][vc_custom_heading text=&#8221;Vulnerability Assessment&#8221; font_container=&#8221;tag:h4|text_align:left|color:%23c1272d&#8221; text_resize=&#8221;yes&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Not just an automated scan of your network regurgitated on hundreds of pages, in a report that just gets filed away &#8211; UNVEIL offers a deep manual analysis of your critical vulnerabilities through the application of the human perspective. Each reportable vulnerability is verified and accompanied with remediation recommendations, all designed to improve your security posture.<\/p>\n<p>Rest assured our team of experts practice the latest methods and procedures to <b><i>UNVEIL<\/i><\/b> security vulnerabilities and network weaknesses exposing your critical assets.[\/vc_column_text][cesis_button button_text=&#8221;Learn More&#8221; link=&#8221;#contact&#8221; button_size=&#8221;cesis_button_medium&#8221; button_border=&#8221;1&#8243; use_icon=&#8221;yes&#8221; icon_animation=&#8221;hover&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#c1272d&#8221; button_border_color=&#8221;#c1272d&#8221; h_button_text_color=&#8221;#c1272d&#8221; h_button_bg_color=&#8221;#ffffff&#8221; h_button_border_color=&#8221;#c1272d&#8221; button_t_transform=&#8221;none&#8221; icon=&#8221;fa-rightarrow&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1555603554136{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;175&#8243; img_size=&#8221;full&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221;][vc_column offset=&#8221;vc_hidden-md vc_hidden-sm vc_hidden-xs&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1555603887391{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;177&#8243; img_size=&#8221;full&#8221; overflow=&#8221;yes&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1555960955354{padding-top: 80px !important;padding-right: 60px !important;padding-bottom: 140px !important;padding-left: 60px !important;}&#8221;][vc_custom_heading text=&#8221;Security Auditing&#8221; font_container=&#8221;tag:h4|text_align:left|color:%23c1272d&#8221; text_resize=&#8221;yes&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Strengthening your organization\u2019s security policies is both a repetitive and on-going process. It involves developing them, codifying them, implementing them, and validating them.<\/p>\n<p>Allow UNVEIL\u2019s team of security experts to evaluate your existing network security policies, procedures, and overall security posture in order to <strong><i>UNVEIL<\/i><\/strong> how protected you really are.[\/vc_column_text][cesis_button button_text=&#8221;Learn More&#8221; link=&#8221;#contact&#8221; button_size=&#8221;cesis_button_medium&#8221; button_border=&#8221;1&#8243; use_icon=&#8221;yes&#8221; icon_animation=&#8221;hover&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#c1272d&#8221; button_border_color=&#8221;#c1272d&#8221; h_button_text_color=&#8221;#c1272d&#8221; h_button_bg_color=&#8221;#ffffff&#8221; h_button_border_color=&#8221;#c1272d&#8221; button_t_transform=&#8221;none&#8221; icon=&#8221;fa-rightarrow&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221;][vc_column offset=&#8221;vc_hidden-lg&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1555603887391{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;177&#8243; img_size=&#8221;full&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1555960955354{padding-top: 80px !important;padding-right: 60px !important;padding-bottom: 140px !important;padding-left: 60px !important;}&#8221;][vc_custom_heading text=&#8221;Security Auditing&#8221; font_container=&#8221;tag:h4|text_align:left|color:%23c1272d&#8221; text_resize=&#8221;yes&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Strengthening your organization\u2019s security policies is both a repetitive and on-going process. It involves developing them, codifying them, implementing them, and validating them.<\/p>\n<p>Allow UNVEIL\u2019s team of security experts to evaluate your existing network security policies, procedures, and overall security posture in order to <i>UNVEIL<\/i> how protected you really are.[\/vc_column_text][cesis_button button_text=&#8221;Learn More&#8221; link=&#8221;#contact&#8221; button_size=&#8221;cesis_button_medium&#8221; button_border=&#8221;1&#8243; use_icon=&#8221;yes&#8221; icon_animation=&#8221;hover&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#c1272d&#8221; button_border_color=&#8221;#c1272d&#8221; h_button_text_color=&#8221;#c1272d&#8221; h_button_bg_color=&#8221;#ffffff&#8221; h_button_border_color=&#8221;#c1272d&#8221; button_t_transform=&#8221;none&#8221; icon=&#8221;fa-rightarrow&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221;][vc_column offset=&#8221;vc_hidden-xs&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1555959576306{padding-top: 100px !important;padding-right: 60px !important;padding-bottom: 100px !important;padding-left: 60px !important;}&#8221;][vc_custom_heading text=&#8221;Penetration Testing&#8221; font_container=&#8221;tag:h4|text_align:left|color:%23c1272d&#8221; text_resize=&#8221;yes&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Attempting to gain access either internally or externally through identified security vulnerabilities, our security experts will simulate a real world breach from the perspective of an attacker.<\/p>\n<p>At the completion of each engagement, we ensure you will have a full understanding of the exploitable vulnerabilities within your environment to include recommended remediation strategies.<\/p>\n<p>Let us validate your security protection measures and <em><strong>UNVEIL<\/strong><\/em> your true security protection potential.[\/vc_column_text][cesis_button button_text=&#8221;Learn More&#8221; link=&#8221;#contact&#8221; button_size=&#8221;cesis_button_medium&#8221; button_border=&#8221;1&#8243; use_icon=&#8221;yes&#8221; icon_animation=&#8221;hover&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#c1272d&#8221; button_border_color=&#8221;#c1272d&#8221; h_button_text_color=&#8221;#c1272d&#8221; h_button_bg_color=&#8221;#ffffff&#8221; h_button_border_color=&#8221;#c1272d&#8221; button_t_transform=&#8221;none&#8221; icon=&#8221;fa-rightarrow&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1555603554136{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;179&#8243; img_size=&#8221;full&#8221; overflow=&#8221;yes&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221;][vc_column offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1555959576306{padding-top: 100px !important;padding-right: 60px !important;padding-bottom: 100px !important;padding-left: 60px !important;}&#8221;][vc_custom_heading text=&#8221;Penetration Testing&#8221; font_container=&#8221;tag:h4|text_align:left|color:%23c1272d&#8221; text_resize=&#8221;yes&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Attempting to gain access either internally or externally through identified security vulnerabilities, our security experts will simulate a real world breach from the perspective of an attacker.<\/p>\n<p>At the completion of each engagement, we ensure you will have a full understanding of the exploitable vulnerabilities within your environment to include recommended remediation strategies.<\/p>\n<p>Let us validate your security protection measures and <em><strong>UNVEIL<\/strong><\/em> your true security protection potential.[\/vc_column_text][cesis_button button_text=&#8221;Learn More&#8221; link=&#8221;#contact&#8221; button_size=&#8221;cesis_button_medium&#8221; button_border=&#8221;1&#8243; use_icon=&#8221;yes&#8221; icon_animation=&#8221;hover&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#c1272d&#8221; button_border_color=&#8221;#c1272d&#8221; h_button_text_color=&#8221;#c1272d&#8221; h_button_bg_color=&#8221;#ffffff&#8221; h_button_border_color=&#8221;#c1272d&#8221; button_t_transform=&#8221;none&#8221; icon=&#8221;fa-rightarrow&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1555603554136{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;179&#8243; img_size=&#8221;full&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221;][vc_column offset=&#8221;vc_hidden-xs&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1555603887391{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;182&#8243; img_size=&#8221;full&#8221; overflow=&#8221;yes&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1555959582954{padding-top: 100px !important;padding-right: 60px !important;padding-bottom: 100px !important;padding-left: 60px !important;}&#8221;][vc_custom_heading text=&#8221;Social Engineering&#8221; font_container=&#8221;tag:h4|text_align:left|color:%23c1272d&#8221; text_resize=&#8221;yes&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Looking for a more realistic approach to compromising your network? How about validating those security controls you recently implemented?<\/p>\n<p>Are you wondering how that new, expensive, and \u201ccomprehensive\u201d security solution suite is working out for you?<\/p>\n<p>With permission from management, our team of extraordinary \u201ccompelling\u201d security professionals will attempt to circumvent the most overlooked and under protected resource\u2026 your employees.[\/vc_column_text][cesis_button button_text=&#8221;Learn More&#8221; link=&#8221;#contact&#8221; button_size=&#8221;cesis_button_medium&#8221; button_border=&#8221;1&#8243; use_icon=&#8221;yes&#8221; icon_animation=&#8221;hover&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#c1272d&#8221; button_border_color=&#8221;#c1272d&#8221; h_button_text_color=&#8221;#c1272d&#8221; h_button_bg_color=&#8221;#ffffff&#8221; h_button_border_color=&#8221;#c1272d&#8221; button_t_transform=&#8221;none&#8221; icon=&#8221;fa-rightarrow&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221;][vc_column offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1555603887391{padding-right: 0px !important;padding-left: 0px !important;}&#8221;][vc_single_image image=&#8221;182&#8243; img_size=&#8221;full&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1555959582954{padding-top: 100px !important;padding-right: 60px !important;padding-bottom: 100px !important;padding-left: 60px !important;}&#8221;][vc_custom_heading text=&#8221;Social Engineering&#8221; font_container=&#8221;tag:h4|text_align:left|color:%23c1272d&#8221; text_resize=&#8221;yes&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Looking for a more realistic approach to compromising your network? How about validating those security controls you recently implemented?<\/p>\n<p>Are you wondering how that new, expensive, and \u201ccomprehensive\u201d security solution suite is working out for you?<\/p>\n<p>With permission from management, our team of extraordinary \u201ccompelling\u201d security professionals will attempt to circumvent the most overlooked and under protected resource\u2026 your employees.[\/vc_column_text][cesis_button button_text=&#8221;Learn More&#8221; link=&#8221;#contact&#8221; button_size=&#8221;cesis_button_medium&#8221; button_border=&#8221;1&#8243; use_icon=&#8221;yes&#8221; icon_animation=&#8221;hover&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#c1272d&#8221; button_border_color=&#8221;#c1272d&#8221; h_button_text_color=&#8221;#c1272d&#8221; h_button_bg_color=&#8221;#ffffff&#8221; h_button_border_color=&#8221;#c1272d&#8221; button_t_transform=&#8221;none&#8221; icon=&#8221;fa-rightarrow&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1556040228121{padding-top: 40px !important;padding-bottom: 40px !important;background-color: #eaeaea !important;}&#8221; el_id=&#8221;portfolio&#8221;][vc_column][vc_row_inner][vc_column_inner][vc_custom_heading text=&#8221;Who We&#8217;ve Protected&#8221; text_resize=&#8221;yes&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;As we continue to satisfy more clients by exceeding their expectations, our breadth of expertise supporting multi-faceted clients and operations, within multiple verticals broadens.&#8221; font_container=&#8221;tag:h4|text_align:left&#8221; text_resize=&#8221;yes&#8221; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1555701990127{padding-top: 80px !important;padding-bottom: 80px !important;}&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221;][vc_column_inner][cesis_partners style=&#8221;cesis_partners_2&#8243; hover=&#8221;cesis_partners_opacity&#8221; to_show=&#8221;6&#8243; category=&#8221;4&#8243; col=&#8221;3&#8243; scroll=&#8221;yes&#8221; speed=&#8221;1200&#8243; col_mobile=&#8221;1&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; parallax=&#8221;cesis_parallax&#8221; parallax_image=&#8221;275&#8243; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1556645557362{padding-top: 40px !important;padding-bottom: 40px !important;}&#8221; overlay=&#8221;rgba(0,0,0,0.45)&#8221;][vc_column][vc_row_inner][vc_column_inner][cesis_testimonials style=&#8221;cesis_tm_4&#8243; force_font=&#8221;custom&#8221; heading_font=&#8221;custom&#8221; h_google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:400%20regular%3A400%3Anormal&#8221; h_f_size=&#8221;18px&#8221; text_font=&#8221;custom&#8221; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic&#8221; t_f_size=&#8221;16px&#8221; a_font=&#8221;custom&#8221; a_google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic&#8221; a_f_size=&#8221;16px&#8221; type=&#8221;isotope&#8221; testimonials=&#8221;%5B%7B%22author%22%3A%22Charlie%20Ross%22%2C%22a_info%22%3A%22President%2C%20Welsh%20Consulting%22%2C%22t_content%22%3A%22%5C%22Welsh%20Consulting%20provides%20support%20and%20security%20services%20to%20a%20variety%20of%20clients%20who%20must%20adhere%20to%20compliance%20regulations.%20In%20many%20cases%2C%20an%20independent%203rd%20party%20is%20required%20to%20perform%20external%20and%20internal%20penetration%20tests.%20Welsh%20has%20engaged%20the%20services%20of%20UnveilSG%20to%20perform%20these%20tests%20on%20behalf%20of%20our%20clients.%20Working%20with%20the%20Unveil%20team%20has%20been%20a%20pleasure%20every%20step%20of%20the%20way.%20They%20are%20thorough%2C%20efficient%20and%20professional.%20Delivering%20the%20highest%20levels%20of%20service%20to%20our%20clients%20is%20our%20top%20priority%20and%20I%20am%20thrilled%20to%20have%20a%20partner%20that%20represents%20our%20same%20core%20values%20and%20professionalism.%5C%22%22%2C%22layout%22%3A%22full%22%2C%22t_color%22%3A%22%23f1f1f1%22%2C%22h_color%22%3A%22%23ffffff%22%2C%22bg_color%22%3A%22rgba(0%2C0%2C0%2C0.53)%22%2C%22b_color%22%3A%22%23c1272d%22%7D%5D&#8221; nav_align=&#8221;cesis_owl_nav_center&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1556047250487{padding-top: 100px !important;padding-bottom: 80px !important;background-color: #606060 !important;}&#8221; el_id=&#8221;contact&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;Contact Us&#8221; font_container=&#8221;tag:h2|text_align:left|color:%23f1f1f1&#8243; text_resize=&#8221;yes&#8221; use_theme_fonts=&#8221;yes&#8221;][cesis_cf7 contact_id=&#8221;19&#8243; btn_size=&#8221;cesis_cf7_medium_btn&#8221; btn_radius=&#8221;1&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1556026734871{padding-right: 30px !important;padding-left: 60px !important;}&#8221;][vc_single_image image=&#8221;20&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][cesis_line_divider height=&#8221;1&#8243; width=&#8221;350&#8243; color=&#8221;#f1f1f1&#8243; margin_bottom=&#8221;40&#8243;][cesis_icon_paragraph heading=&#8221;210-794-0045&#8243; text=&#8221;&#8221; h_icon_color=&#8221;#ffffff&#8221; heading_color=&#8221;#f1f1f1&#8243; heading_h_color=&#8221;#f1f1f1&#8243; heading_font=&#8221;custom&#8221; heading_google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:400%20regular%3A400%3Anormal&#8221; heading_f_size=&#8221;20px&#8221; heading_t_transform=&#8221;none&#8221; icon=&#8221;fa-phone&#8221;][\/cesis_icon_paragraph][cesis_icon_paragraph link=&#8221;mailto:contact@unveilsg.com&#8221; heading=&#8221;contact@unveilsg.com&#8221; text=&#8221;&#8221; h_icon_color=&#8221;#f1f1f1&#8243; heading_color=&#8221;#f1f1f1&#8243; heading_h_color=&#8221;#f1f1f1&#8243; heading_font=&#8221;custom&#8221; heading_google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:400%20regular%3A400%3Anormal&#8221; heading_f_size=&#8221;18px&#8221; heading_t_transform=&#8221;none&#8221; icon=&#8221;fa-mail&#8221; g_icon_separator=&#8221;&#8221; g_heading_separator=&#8221;&#8221; g_text_separator=&#8221;&#8221; g_button_separator=&#8221;&#8221; g_module_separator=&#8221;&#8221; c_icon_separator=&#8221;&#8221; c_heading_separator=&#8221;&#8221; c_text_separator=&#8221;&#8221; t_heading_separator=&#8221;&#8221; t_text_separator=&#8221;&#8221;][\/cesis_icon_paragraph][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row el_id=&#8221;about&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1556545955838{padding-top: 40px !important;padding-bottom: 40px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;Who We Are&#8221; font_container=&#8221;tag:h2|text_align:left|color:%23c1272d&#8221; text_resize=&#8221;yes&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Unveil Security Group is a Service Disabled Veteran Owned company that specializes in security testing. We offer a variety of services such as vulnerability assessments, penetration testing, social engineering initiatives just to name a few. We serve as an independent third party [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/unveilsg.com\/wp-json\/wp\/v2\/pages\/7","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/unveilsg.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/unveilsg.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/unveilsg.com\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/unveilsg.com\/wp-json\/wp\/v2\/comments?post=7"}],"version-history":[{"count":0,"href":"https:\/\/unveilsg.com\/wp-json\/wp\/v2\/pages\/7\/revisions"}],"wp:attachment":[{"href":"https:\/\/unveilsg.com\/wp-json\/wp\/v2\/media?parent=7"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}