[vc_row content_placement=”middle” enable_overlay=”yes” css=”.vc_custom_1610887462832{padding-top: 90px !important;padding-bottom: 80px !important;background-image: url(https://stukorea.com/wp-content/uploads/2021/01/titlebar-2.jpg?id=4614) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}” overlay_bg=”rgba(32, 32, 69, 0.8)”][vc_column][ld_fancy_heading tag=”h6″ transform=”text-uppercase” use_custom_fonts_title=”true” color=”rgb(255, 255, 255)” fs=”text_small:12px” fw=”text_small:700″ ls=”text_small:0.08em” margin=”bottom_small:4em”]Services[/ld_fancy_heading][/vc_column][vc_column offset=”vc_col-md-6″][ld_fancy_heading use_custom_fonts_title=”true” color=”rgb(255, 255, 255)” fs=”text_large:74px” lh=”text_small:0.9em”]IT Business Solutions.[/ld_fancy_heading][/vc_column][vc_column width=”1/2″ offset=”vc_col-lg-offset-2 vc_col-lg-4 vc_col-md-offset-1 vc_col-md-5″][ld_fancy_heading tag=”p” use_custom_fonts_title=”true” color=”rgba(255, 255, 255, 0.7)” fs=”text_small:19px” lh=”text_small:1.3em”]Hub IT allows your business and technology computers to store, transmit, analyze, and manipulate big data.[/ld_fancy_heading][/vc_column][/vc_row][vc_row css=”.vc_custom_1608628242000{padding-top: 60px !important;padding-bottom: 60px !important;}”][vc_column enable_pin=”enable_pin” width=”1/3″ offset=”vc_col-md-3″][ld_fancy_heading tag=”h6″ transform=”text-uppercase” use_custom_fonts_title=”true” fs=”text_small:12px” fw=”text_small:700″ ls=”text_small:0.08em” margin=”bottom_small:4em”]It services[/ld_fancy_heading][ld_custom_menu source=”custom” localscroll=”yes” icon_pos=”text-left” use_custom_fonts_menu=”true” items=”%5B%7B%22label%22%3A%22ID%20Pass%20Security%22%2C%22url%22%3A%22%23id-pass-security%22%2C%22icon_classname%22%3A%22lqd-icn-ess%20icon-ion-ios-arrow-down%22%2C%22icon_alignment%22%3A%22right-icon%22%7D%2C%7B%22label%22%3A%22Face%20ID%20Protection%22%2C%22url%22%3A%22%23face-id-protection%22%2C%22icon_classname%22%3A%22lqd-icn-ess%20icon-ion-ios-arrow-down%22%2C%22icon_alignment%22%3A%22right-icon%22%7D%2C%7B%22label%22%3A%22Financial%20Security%22%2C%22url%22%3A%22%23financial-security%22%2C%22icon_classname%22%3A%22lqd-icn-ess%20icon-ion-ios-arrow-down%22%2C%22icon_alignment%22%3A%22right-icon%22%7D%2C%7B%22label%22%3A%22Digital%20Solutions%22%2C%22url%22%3A%22%23digital-solutions%22%2C%22icon_classname%22%3A%22lqd-icn-ess%20icon-ion-ios-arrow-down%22%2C%22icon_alignment%22%3A%22right-icon%22%7D%5D” fs=”16px” fw=”500″ color=”rgb(150, 150, 150)” hcolor=”rgb(0, 0, 0)” spacing=”28″][/vc_column][vc_column width=”2/3″ offset=”vc_col-md-9″][vc_text_separator title=”ID PASS SECURITY” title_align=”separator_align_left” css=”.vc_custom_1608633814527{margin-bottom: 3.5em !important;}” el_id=”id-pass-security”][ld_content_box template=”s01b” box_height_b=”h-pt-50″ show_button=”yes” ib_style=”btn-underlined” ib_title=”Learn more” ib_i_type=”linea” use_custom_fonts_title=”true” ib_i_add_icon=”true” title=”ID Pass Security” ib_i_icon_linea=”lqd-icn-ess icon-ion-ios-arrow-forward” ib_color=”rgb(255, 255, 255)” ib_fs=”13px” ib_lh=”1em” image=”4461″ overlay_color=”linear-gradient(0deg, #0b102c 0%, rgba(255, 255, 255, 0) 60%)” ib_hover_color=”rgb(255, 255, 255)” fs=”40px”]Hub IT allows your business and technology computers to store, transmit, analyze, and manipulate big data.[/ld_content_box][vc_text_separator title=”FACE ID PROTECTION” title_align=”separator_align_left” css=”.vc_custom_1608633825357{margin-top: 3.75em !important;margin-bottom: 3.5em !important;}” el_id=”face-id-protection”][ld_content_box template=”s01b” box_height_b=”h-pt-50″ show_button=”yes” ib_style=”btn-underlined” ib_title=”Learn more” ib_i_type=”linea” use_custom_fonts_title=”true” ib_i_add_icon=”true” title=”Face ID Protection” ib_i_icon_linea=”lqd-icn-ess icon-ion-ios-arrow-forward” ib_color=”rgb(255, 255, 255)” ib_fs=”13px” ib_lh=”1em” image=”4462″ overlay_color=”linear-gradient(0deg, #0b102c 0%, rgba(255, 255, 255, 0) 60%)” ib_hover_color=”rgb(255, 255, 255)” fs=”40px”]Hub IT allows your business and technology computers to store, transmit, analyze, and manipulate big data.[/ld_content_box][vc_text_separator title=”FINANCIAL SECURITY” title_align=”separator_align_left” css=”.vc_custom_1608633837498{margin-top: 3.75em !important;margin-bottom: 3.5em !important;}” el_id=”financial-security”][ld_content_box template=”s01b” box_height_b=”h-pt-50″ show_button=”yes” ib_style=”btn-underlined” ib_title=”Learn more” ib_i_type=”linea” use_custom_fonts_title=”true” ib_i_add_icon=”true” title=”Financial Security” ib_i_icon_linea=”lqd-icn-ess icon-ion-ios-arrow-forward” ib_color=”rgb(255, 255, 255)” ib_fs=”13px” ib_lh=”1em” image=”4464″ overlay_color=”linear-gradient(0deg, #0b102c 0%, rgba(255, 255, 255, 0) 60%)” ib_hover_color=”rgb(255, 255, 255)” fs=”40px”]Hub IT allows your business and technology computers to store, transmit, analyze, and manipulate big data.[/ld_content_box][vc_text_separator title=”DIGITAL SOLUTIONS” title_align=”separator_align_left” css=”.vc_custom_1608633847456{margin-top: 3.75em !important;margin-bottom: 3.5em !important;}” el_id=”digital-solutions”][ld_content_box template=”s01b” box_height_b=”h-pt-50″ show_button=”yes” ib_style=”btn-underlined” ib_title=”Learn more” ib_i_type=”linea” use_custom_fonts_title=”true” ib_i_add_icon=”true” title=”Digital solutions” ib_i_icon_linea=”lqd-icn-ess icon-ion-ios-arrow-forward” ib_color=”rgb(255, 255, 255)” ib_fs=”13px” ib_lh=”1em” image=”4463″ overlay_color=”linear-gradient(0deg, #0b102c 0%, rgba(255, 255, 255, 0) 60%)” ib_hover_color=”rgb(255, 255, 255)” fs=”40px”]Hub IT allows your business and technology computers to store, transmit, analyze, and manipulate big data.[/ld_content_box][/vc_column][/vc_row]