div.et_pb_section.et_pb_section_3{background-position:center bottom 0px;background-image:url(https://www.cmvtechnology.com/wp-content/uploads/2020/12/cyber-security-03-1.png),radial-gradient(circle at top right,#00ffd8 0%,#0029e2 100%)!important}.et_pb_section_3.et_pb_section{padding-top:10vw;padding-bottom:10vw;margin-top:100px;margin-bottom:100px}.et_pb_row_5{z-index:1!important;position:relative}.et_pb_text_5 h2,.et_pb_text_7 h2,.et_pb_text_8 h2{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:900;font-size:56px;line-height:1.1em}.et_pb_text_5 h3{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:600;font-size:30px;color:#00b4ff!important;line-height:1.2em}.et_pb_text_6,.et_pb_text_9{line-height:1.8em;font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:300;font-size:17px;line-height:1.8em}.et_pb_blurb_3.et_pb_blurb .et_pb_module_header,.et_pb_blurb_3.et_pb_blurb .et_pb_module_header a,.et_pb_blurb_4.et_pb_blurb .et_pb_module_header,.et_pb_blurb_4.et_pb_blurb .et_pb_module_header a,.et_pb_blurb_5.et_pb_blurb .et_pb_module_header,.et_pb_blurb_5.et_pb_blurb .et_pb_module_header a,.et_pb_blurb_6.et_pb_blurb .et_pb_module_header,.et_pb_blurb_6.et_pb_blurb .et_pb_module_header a{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:900;line-height:1.4em}.et_pb_blurb_3.et_pb_blurb p,.et_pb_blurb_4.et_pb_blurb p,.et_pb_blurb_5.et_pb_blurb p,.et_pb_blurb_6.et_pb_blurb p{line-height:1.8em}.et_pb_blurb_3.et_pb_blurb,.et_pb_blurb_4.et_pb_blurb,.et_pb_blurb_5.et_pb_blurb{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:300;line-height:1.8em;background-color:#ffffff;border-radius:10px 10px 10px 10px;overflow:hidden;padding-top:24px!important;padding-right:20px!important;padding-bottom:24px!important;padding-left:20px!important}.et_pb_blurb_3,.et_pb_blurb_4,.et_pb_blurb_5{box-shadow:0px 10px 60px 0px rgba(10,45,97,0.1)}.et_pb_blurb_3 .et_pb_main_blurb_image .et_pb_image_wrap,.et_pb_blurb_4 .et_pb_main_blurb_image .et_pb_image_wrap,.et_pb_blurb_5 .et_pb_main_blurb_image .et_pb_image_wrap{width:120px}.et_pb_section_4.section_has_divider.et_pb_bottom_divider .et_pb_bottom_inside_divider{background-image:url(data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMTAwJSIgaGVpZ2h0PSI0MHZ3IiB2aWV3Qm94PSIwIDAgMTI4MCAxNDAiIHByZXNlcnZlQXNwZWN0UmF0aW89Im5vbmUiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyI+PGcgZmlsbD0iI2YxZmFmZSI+PHBhdGggZD0iTTAgMHYxNDBoMTI4MEwwIDB6Ii8+PC9nPjwvc3ZnPg==);background-size:100% 40vw;bottom:0;height:40vw;z-index:10;transform:scale(-1,1)}div.et_pb_section.et_pb_section_5{background-image:url(https://www.cmvtechnology.com/wp-content/uploads/2020/12/cyber-security-17.png),radial-gradient(circle at top right,#3122b2 0%,#00ffd8 100%)!important}.et_pb_section_5{overflow-x:visible;overflow-y:visible;z-index:10;position:relative}.et_pb_section_5.et_pb_section{padding-bottom:10vw}.et_pb_row_7{background-color:#ffffff;border-radius:10px 10px 10px 10px;overflow:hidden;box-shadow:0px 40px 60px -8px rgba(10,45,97,0.48)}.et_pb_row_7.et_pb_row{padding-top:0px!important;padding-bottom:0px!important;margin-top:-146px!important;margin-right:auto!important;margin-bottom:-2px!important;margin-left:auto!important;padding-top:0px;padding-bottom:0px}.et_pb_blurb_6.et_pb_blurb{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:300;line-height:1.8em}.et_pb_blurb_6 .et-pb-icon{font-size:24px;color:#006ac1;font-family:ETmodules!important;font-weight:400!important}.et_pb_countdown_timer_0.et_pb_countdown_timer{background-color:#2ea3f2}.et_pb_text_9.et_pb_text{color:#0a2d61!important}.et_pb_column_13{padding-top:60px;padding-right:40px;padding-bottom:60px;padding-left:40px}.et_pb_column_14{background-size:contain;background-position:left bottom 0px;background-image:url(https://www.cmvtechnology.com/wp-content/uploads/2020/12/cyber-security-010-1.png),radial-gradient(circle at top right,#00f6ff 0%,#00ffbf 100%);padding-top:60px;padding-right:40px;padding-bottom:60px;padding-left:20%}@media only screen and (max-width:980px){.et_pb_text_5 h2,.et_pb_text_7 h2,.et_pb_text_8 h2{font-size:38px}.et_pb_text_5 h3{font-size:24px}.et_pb_blurb_3 .et_pb_main_blurb_image .et_pb_image_wrap,.et_pb_blurb_4 .et_pb_main_blurb_image .et_pb_image_wrap,.et_pb_blurb_5 .et_pb_main_blurb_image .et_pb_image_wrap{width:120px}.et_pb_column_14{background-position:left top;background-image:url(http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-11.png),radial-gradient(circle at top right,#00f6ff 0%,#00ffbf 100%);background-color:initial;padding-top:80px;padding-left:40px}}@media only screen and (max-width:767px){.et_pb_text_5 h2,.et_pb_text_7 h2,.et_pb_text_8 h2{font-size:26px}.et_pb_text_5 h3{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:700;font-size:18px}.et_pb_text_6,.et_pb_text_9{font-size:14px}.et_pb_blurb_3 .et_pb_main_blurb_image .et_pb_image_wrap,.et_pb_blurb_4 .et_pb_main_blurb_image .et_pb_image_wrap,.et_pb_blurb_5 .et_pb_main_blurb_image .et_pb_image_wrap{width:50px}}