Archive

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern" z_index="" css=".vc_custom_1571450017832{margin-top: 0px !important;}"][vc_column width="1/12"][/vc_column][vc_column width="10/12"][qode_elements_holder number_of_columns="two_columns" columns_proportion="33_66"][qode_elements_holder_item vertical_alignment="top" advanced_animations="no" item_padding="50px 15px 0 15px"][vc_single_image image="354" img_size="full" alignment="center" qode_css_animation=""][/qode_elements_holder_item][qode_elements_holder_item vertical_alignment="top" advanced_animations="no" item_padding="30px 15px 00px 15px"][vc_column_text]Para proteger suas instalações, as organizações precisam de soluções de controle de acesso completas,...