{"id":13,"date":"2026-02-17T01:21:22","date_gmt":"2026-02-17T01:21:22","guid":{"rendered":"https:\/\/passerum.io\/?page_id=13"},"modified":"2026-03-27T19:17:39","modified_gmt":"2026-03-27T19:17:39","slug":"home","status":"publish","type":"page","link":"https:\/\/passerum.io\/","title":{"rendered":"Home"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Hero&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;_module_preset=&#8221; background_image=&#8221;https:\/\/images.unsplash.com\/photo-1556761175-4b46a572b786?ixid=M3w1ODkyNzF8MHwxfHNlYXJjaHwyfHxtb2Rlcm4lMjBvZmZpY2UlMjBzcGFjZXxlbnwwfDB8fHwxNzcxMjMzNjIwfDA&#038;ixlib=rb-4.1.0&#038;fm=webp&#038;fit=crop&#038;crop=entropy&#038;w=1920&#038;h=1080&#038;q=20&#038;dpr=2&#8243; min_height=&#8221;100vh&#8221; min_height_tablet=&#8221;100vh&#8221; min_height_phone=&#8221;100vh&#8221; min_height_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;10vw||10vw||true|false&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Cybersecurity Risk Assessment for Small and mid-size Businesess&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;f0c675ea-2574-4d0e-b725-30f8550a8550&#8243; title_level=&#8221;h1&#8243; title_font=&#8221;Plus Jakarta Sans|&#8211;et_global_heading_font_weight||on|||||&#8221; title_text_align=&#8221;center&#8221; title_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;rgba(56,56,56,0.98)&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; custom_padding=&#8221;10px||0px||false|false&#8221; custom_margin=&#8221;0px||10px||false|false&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_heading][et_pb_heading title=&#8221;Discover Hidden Vulnerabilities Across Network, Cloud, and AI&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;ddeb8c09-9078-4424-bc15-2efb6572e28e&#8221; title_font=&#8221;Plus Jakarta Sans|&#8211;et_global_heading_font_weight|||||||&#8221; title_text_align=&#8221;center&#8221; title_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;rgba(56,56,56,0.98)&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;0504de1e-f5ff-4281-ba60-cbbe4edf98bc&#8221; header_font=&#8221;Plus Jakarta Sans|&#8211;et_global_heading_font_weight|||||||&#8221; background_color=&#8221;rgba(56,56,56,0.98)&#8221; text_orientation=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-primary-color%22:%91%22link_text_color%22%93,%22gcid-heading-color%22:%91%22header_text_color%22,%22header_4_text_color%22,%22header_3_text_color%22,%22header_2_text_color%22,%22header_5_text_color%22,%22header_6_text_color%22,%22quote_text_color%22%93,%22gcid-secondary-color%22:%91%22quote_border_color%22%93}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Passerum helps SMB IT teams find exposed assets, misconfigurations, and vulnerability risks\u2014then turns findings into a clear, prioritized remediation plan.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;0504de1e-f5ff-4281-ba60-cbbe4edf98bc&#8221; text_font_size=&#8221;19px&#8221; background_color=&#8221;rgba(56,56,56,0.98)&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;||0px|||&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-primary-color%22:%91%22link_text_color%22%93,%22gcid-heading-color%22:%91%22header_text_color%22,%22header_4_text_color%22,%22header_3_text_color%22,%22header_2_text_color%22,%22header_5_text_color%22,%22header_6_text_color%22,%22quote_text_color%22%93,%22gcid-secondary-color%22:%91%22quote_border_color%22%93}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><strong>Built for teams with IT but no dedicated security team<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/meetings-na2.hubspot.com\/francisco-rincon-narros&#8221; button_text=&#8221;Book a Free 30-Minute Consultation&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;ab15fb74-61a3-43aa-96b3-41e09aeef654&#8243; button_text_color=&#8221;#C89D66&#8243; button_bg_color=&#8221;#000000&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; disabled_on=&#8221;on|on|off&#8221; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_row _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; custom_margin=&#8221;|auto|-10px|auto|false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Vulnerability Discovery, Infrastructure Visibility, and AI Risk Audits&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;c33f07d9-41e0-421a-8799-5799df695cce&#8221; title_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; custom_padding_tablet=&#8221;||0px||false|false&#8221; custom_padding_phone=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;0deg&#8221; background_color_gradient_stops=&#8221;#000000 15%|rgba(255,255,255,0) 85%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/images.unsplash.com\/photo-1769739576456-0aefcff3f4b9?ixid=M3w1ODkyNzF8MHwxfHNlYXJjaHw5fHx0ZWFtJTIwY29sbGFib3JhdGlvbiUyMG1lZXRpbmd8ZW58MHwwfHx8MTc3MTI0NTQ0NXww&#038;ixlib=rb-4.1.0&#038;fm=webp&#038;fit=crop&#038;crop=entropy&#038;w=800&#038;h=600&#038;q=20&#038;dpr=2&#8243; custom_padding=&#8221;200px|30px|30px|30px|false|true&#8221; custom_padding_tablet=&#8221;130px|30px|30px|30px|false|true&#8221; custom_padding_phone=&#8221;100px|20px|20px|20px|false|true&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; border_radii=&#8221;on|6px|6px|6px|6px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Vulnerability Discovery&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;8c21dae4-c59d-4c2b-958c-0e045c7f06d6&#8243; title_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;0504de1e-f5ff-4281-ba60-cbbe4edf98bc&#8221; locked=&#8221;off&#8221;]<\/p>\n<p>Identify common security weaknesses\u2014like exposed services, outdated components, and misconfigurations\u2014before they become incidents.<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;Risk Assessment&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206&#8243; button_text_color=&#8221;gcid-heading-color&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{%22gcid-heading-color%22:%91%22button_text_color%22%93,%22gcid-primary-color%22:%91%22button_bg_color%22%93}&#8221; disabled_on=&#8221;on|on|on&#8221; disabled=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;0deg&#8221; background_color_gradient_stops=&#8221;#000000 15%|rgba(255,255,255,0) 85%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/images.unsplash.com\/photo-1686061593213-98dad7c599b9?ixid=M3w1ODkyNzF8MHwxfHNlYXJjaHwxMHx8ZGF0YSUyMGFuYWx5c2lzJTIwZGFzaGJvYXJkfGVufDB8MHx8fDE3NzEyOTExNjJ8MA&#038;ixlib=rb-4.1.0&#038;fm=webp&#038;fit=crop&#038;crop=entropy&#038;w=800&#038;h=600&#038;q=20&#038;dpr=2&#8243; custom_padding=&#8221;200px|30px|30px|30px|false|true&#8221; custom_padding_tablet=&#8221;130px|30px|30px|30px|false|true&#8221; custom_padding_phone=&#8221;100px|20px|20px|20px|false|true&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; border_radii=&#8221;on|6px|6px|6px|6px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Infrastructure Visibility&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;8c21dae4-c59d-4c2b-958c-0e045c7f06d6&#8243; title_text_color=&#8221;#FFFFFF&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;0504de1e-f5ff-4281-ba60-cbbe4edf98bc&#8221; locked=&#8221;off&#8221;]<\/p>\n<p>Get a clear picture of what\u2019s running in your environment\u2014systems, services, and exposure points\u2014so nothing critical is missed.<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;Learn More&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206&#8243; button_text_color=&#8221;#000000&#8243; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-primary-color%22:%91%22button_bg_color%22%93}&#8221; disabled_on=&#8221;on|on|on&#8221; disabled=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; custom_padding_tablet=&#8221;||0px||false|false&#8221; custom_padding_phone=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;0deg&#8221; background_color_gradient_stops=&#8221;#000000 15%|rgba(255,255,255,0) 85%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/images.unsplash.com\/photo-1763568258143-904ea924ac53?ixid=M3w1ODkyNzF8MHwxfHNlYXJjaHw1fHxjeWJlcnNlY3VyaXR5JTIwdGVjaG5vbG9neXxlbnwwfDB8fHwxNzcxMjkxMTYyfDA&#038;ixlib=rb-4.1.0&#038;fm=webp&#038;fit=crop&#038;crop=entropy&#038;w=800&#038;h=600&#038;q=20&#038;dpr=2&#8243; custom_padding=&#8221;200px|30px|30px|30px|false|true&#8221; custom_padding_tablet=&#8221;130px|30px|30px|30px|false|true&#8221; custom_padding_phone=&#8221;100px|20px|20px|20px|false|true&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; border_radii=&#8221;on|6px|6px|6px|6px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;AI Risk Audits for AI Agents &#038; GenAI&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;8c21dae4-c59d-4c2b-958c-0e045c7f06d6&#8243; title_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;0504de1e-f5ff-4281-ba60-cbbe4edf98bc&#8221; locked=&#8221;off&#8221;]<\/p>\n<p>Assess AI systems for bias exposure, inconsistent outputs, unsafe responses, and governance gaps\u2014then receive a structured audit report you can share with stakeholders.<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;Request an AI Risk Audit&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206&#8243; button_text_color=&#8221;#000000&#8243; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-primary-color%22:%91%22button_bg_color%22%93}&#8221; disabled_on=&#8221;on|on|on&#8221; disabled=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;0deg&#8221; background_color_gradient_stops=&#8221;#000000 15%|rgba(255,255,255,0) 85%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/images.unsplash.com\/photo-1758524055641-49f35de917eb?ixid=M3w1ODkyNzF8MHwxfHNlYXJjaHwzfHxwcm9mZXNzaW9uYWwlMjBjb25zdWx0YXRpb258ZW58MHwwfHx8MTc3MTIwMzc1MXww&#038;ixlib=rb-4.1.0&#038;fm=webp&#038;fit=crop&#038;crop=entropy&#038;w=800&#038;h=600&#038;q=20&#038;dpr=2&#8243; custom_padding=&#8221;200px|30px|30px|30px|false|true&#8221; custom_padding_tablet=&#8221;130px|30px|30px|30px|false|true&#8221; custom_padding_phone=&#8221;100px|20px|20px|20px|false|true&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; border_radii=&#8221;on|6px|6px|6px|6px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;30-Minute Security Consultation&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;8c21dae4-c59d-4c2b-958c-0e045c7f06d6&#8243; title_text_color=&#8221;#FFFFFF&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;0504de1e-f5ff-4281-ba60-cbbe4edf98bc&#8221; locked=&#8221;off&#8221;]<\/p>\n<p>Get a focused 30-minute consult to clarify your exposure, prioritize next steps, and decide what\u2019s worth fixing first without a long sales cycle.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/meetings-na2.hubspot.com\/francisco-rincon-narros&#8221; button_text=&#8221;Book a Free 30-Minute Consultation&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206&#8243; button_text_color=&#8221;#000000&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-primary-color%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; disabled_on=&#8221;off|off|on&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; custom_margin=&#8221;|auto||auto|false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Vulnerability Discovery, Infrastructure Visibility, and AI Risk Audits&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;c33f07d9-41e0-421a-8799-5799df695cce&#8221; title_font=&#8221;&#8211;et_global_heading_font|700|||||||&#8221; title_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; custom_padding_tablet=&#8221;||0px||false|false&#8221; custom_padding_phone=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;0deg&#8221; background_color_gradient_stops=&#8221;#000000 15%|rgba(255,255,255,0) 85%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/images.unsplash.com\/photo-1769739576456-0aefcff3f4b9?ixid=M3w1ODkyNzF8MHwxfHNlYXJjaHw5fHx0ZWFtJTIwY29sbGFib3JhdGlvbiUyMG1lZXRpbmd8ZW58MHwwfHx8MTc3MTI0NTQ0NXww&#038;ixlib=rb-4.1.0&#038;fm=webp&#038;fit=crop&#038;crop=entropy&#038;w=800&#038;h=600&#038;q=20&#038;dpr=2&#8243; custom_padding=&#8221;200px|30px|30px|30px|false|true&#8221; custom_padding_tablet=&#8221;130px|30px|30px|30px|false|true&#8221; custom_padding_phone=&#8221;100px|20px|20px|20px|false|true&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; border_radii=&#8221;on|6px|6px|6px|6px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Vulnerability Discovery&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;8c21dae4-c59d-4c2b-958c-0e045c7f06d6&#8243; title_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;0504de1e-f5ff-4281-ba60-cbbe4edf98bc&#8221; locked=&#8221;off&#8221;]<\/p>\n<p>Identify common security weaknesses\u2014like exposed services, outdated components, and misconfigurations\u2014before they become incidents.<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;Risk Assessment&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206&#8243; button_text_color=&#8221;gcid-heading-color&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{%22gcid-heading-color%22:%91%22button_text_color%22%93,%22gcid-primary-color%22:%91%22button_bg_color%22%93}&#8221; disabled_on=&#8221;on|on|on&#8221; disabled=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;0deg&#8221; background_color_gradient_stops=&#8221;#000000 15%|rgba(255,255,255,0) 85%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/images.unsplash.com\/photo-1686061593213-98dad7c599b9?ixid=M3w1ODkyNzF8MHwxfHNlYXJjaHwxMHx8ZGF0YSUyMGFuYWx5c2lzJTIwZGFzaGJvYXJkfGVufDB8MHx8fDE3NzEyOTExNjJ8MA&#038;ixlib=rb-4.1.0&#038;fm=webp&#038;fit=crop&#038;crop=entropy&#038;w=800&#038;h=600&#038;q=20&#038;dpr=2&#8243; custom_padding=&#8221;200px|30px|30px|30px|false|true&#8221; custom_padding_tablet=&#8221;130px|30px|30px|30px|false|true&#8221; custom_padding_phone=&#8221;100px|20px|20px|20px|false|true&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; border_radii=&#8221;on|6px|6px|6px|6px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Infrastructure Visibility&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;8c21dae4-c59d-4c2b-958c-0e045c7f06d6&#8243; title_text_color=&#8221;#FFFFFF&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;0504de1e-f5ff-4281-ba60-cbbe4edf98bc&#8221; locked=&#8221;off&#8221;]<\/p>\n<p>Get a clear picture of what\u2019s running in your environment\u2014systems, services, and exposure points\u2014so nothing critical is missed.<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;Learn More&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206&#8243; button_text_color=&#8221;#000000&#8243; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-primary-color%22:%91%22button_bg_color%22%93}&#8221; disabled_on=&#8221;on|on|on&#8221; disabled=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; custom_padding_tablet=&#8221;||0px||false|false&#8221; custom_padding_phone=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;0deg&#8221; background_color_gradient_stops=&#8221;#000000 15%|rgba(255,255,255,0) 85%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/images.unsplash.com\/photo-1763568258143-904ea924ac53?ixid=M3w1ODkyNzF8MHwxfHNlYXJjaHw1fHxjeWJlcnNlY3VyaXR5JTIwdGVjaG5vbG9neXxlbnwwfDB8fHwxNzcxMjkxMTYyfDA&#038;ixlib=rb-4.1.0&#038;fm=webp&#038;fit=crop&#038;crop=entropy&#038;w=800&#038;h=600&#038;q=20&#038;dpr=2&#8243; custom_padding=&#8221;200px|30px|30px|30px|false|true&#8221; custom_padding_tablet=&#8221;130px|30px|30px|30px|false|true&#8221; custom_padding_phone=&#8221;100px|20px|20px|20px|false|true&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; border_radii=&#8221;on|6px|6px|6px|6px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;AI Risk Audits for AI Agents &#038; GenAI&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;8c21dae4-c59d-4c2b-958c-0e045c7f06d6&#8243; title_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;0504de1e-f5ff-4281-ba60-cbbe4edf98bc&#8221; locked=&#8221;off&#8221;]<\/p>\n<p>Assess AI systems for bias exposure, inconsistent outputs, unsafe responses, and governance gaps\u2014then receive a structured audit report you can share with stakeholders.<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;Request an AI Risk Audit&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206&#8243; button_text_color=&#8221;#000000&#8243; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-primary-color%22:%91%22button_bg_color%22%93}&#8221; disabled_on=&#8221;on|on|on&#8221; disabled=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;0deg&#8221; background_color_gradient_stops=&#8221;#000000 15%|rgba(255,255,255,0) 85%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/images.unsplash.com\/photo-1758524055641-49f35de917eb?ixid=M3w1ODkyNzF8MHwxfHNlYXJjaHwzfHxwcm9mZXNzaW9uYWwlMjBjb25zdWx0YXRpb258ZW58MHwwfHx8MTc3MTIwMzc1MXww&#038;ixlib=rb-4.1.0&#038;fm=webp&#038;fit=crop&#038;crop=entropy&#038;w=800&#038;h=600&#038;q=20&#038;dpr=2&#8243; custom_padding=&#8221;200px|30px|30px|30px|false|true&#8221; custom_padding_tablet=&#8221;130px|30px|30px|30px|false|true&#8221; custom_padding_phone=&#8221;100px|20px|20px|20px|false|true&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; border_radii=&#8221;on|6px|6px|6px|6px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;30-Minute Security Consultation&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;8c21dae4-c59d-4c2b-958c-0e045c7f06d6&#8243; title_text_color=&#8221;#FFFFFF&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;0504de1e-f5ff-4281-ba60-cbbe4edf98bc&#8221; locked=&#8221;off&#8221;]<\/p>\n<p>Get a focused 30-minute consult to clarify your exposure, prioritize next steps, and decide what\u2019s worth fixing first without a long sales cycle.<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;Book a Free 30-Minute Consultation&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206&#8243; button_text_color=&#8221;#000000&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-primary-color%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Text &#038; Image&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,2_3&#8243; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Start With Visibility. Then Reduce Risk.&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;ba4a6336-701f-47b8-bf5c-09da0ce28016&#8243; title_font=&#8221;&#8211;et_global_heading_font|700|||||||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; custom_padding=&#8221;||17px|||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Passerum is designed for small and mid-sized businesses with IT teams who need a clear view of real cybersecurity exposure\u2014plus practical prioritization. Book a free 30-minute consultation to discuss your environment, current tooling, and next steps. If you deploy AI agents or GenAI, we can also scope an AI risk audit.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/images.unsplash.com\/photo-1646166576264-3726d8c66554?ixid=M3w1ODkyNzF8MHwxfHNlYXJjaHw0fHxidXNpbmVzcyUyMGJlbmVmaXRzJTIwZGlzY3Vzc2lvbnxlbnwwfDB8fHwxNzcxMjkxMTYyfDA&#038;ixlib=rb-4.1.0&#038;fm=webp&#038;fit=crop&#038;crop=entropy&#038;w=800&#038;h=600&#038;q=20&#038;dpr=2&#8243; title_text=&#8221;800&#215;600&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;6ed8fd5c-62c5-4100-98c3-7b8b6d2c2ee6&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Lead Generation&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; custom_padding=&#8221;40px||40px||true|false&#8221; custom_padding_tablet=&#8221;30px||30px||true|false&#8221; custom_padding_phone=&#8221;20px||20px||true|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;What You Get From a 30-Minute Security Consultation&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;c33f07d9-41e0-421a-8799-5799df695cce&#8221; title_font=&#8221;&#8211;et_global_heading_font|700|||||||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>In 30 minutes, we\u2019ll review your environment at a high level and identify the most likely sources of exposure\u2014then outline a practical path to improve cybersecurity visibility and prioritize remediation.<\/p>\n<ul>\n<li data-start=\"2628\" data-end=\"2699\">\n<p data-start=\"2630\" data-end=\"2699\">Clarify your biggest risk drivers (network, cloud, tooling, access)<\/p>\n<\/li>\n<li data-start=\"2700\" data-end=\"2753\">\n<p data-start=\"2702\" data-end=\"2753\">Identify likely blind spots and misconfigurations<\/p>\n<\/li>\n<li data-start=\"2754\" data-end=\"2802\">\n<p data-start=\"2756\" data-end=\"2802\">Outline what a scoped assessment would cover<\/p>\n<\/li>\n<li data-start=\"2803\" data-end=\"2838\">\n<p data-start=\"2805\" data-end=\"2838\">Leave with prioritized next steps<\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;92716280-2ae8-4a3a-8254-2d5a51101853&#8243; global_colors_info=&#8221;{%22gcid-primary-color%22:%91%22background_color%22%93}&#8221;][et_pb_heading title=&#8221;Book Your Free 30-Minute Consultation&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;8c21dae4-c59d-4c2b-958c-0e045c7f06d6&#8243; title_font=&#8221;&#8211;et_global_heading_font|700|||||||&#8221; title_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_contact_form captcha=&#8221;off&#8221; success_message=&#8221;Message received. We will be in touch soon!&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;9874b2d1-c631-4413-b13d-a703702f0d2e&#8221; _unique_id=&#8221;44dbb30d-fb7b-4fd1-8be9-5724ac732280&#8243; form_field_focus_background_color=&#8221;gcid-primary-color&#8221; form_field_focus_text_color=&#8221;#FFFFFF&#8221; title_text_color=&#8221;#000000&#8243; form_field_font=&#8221;&#8211;et_global_body_font|600||on|||||&#8221; button_text_color=&#8221;#000000&#8243; button_border_color=&#8221;#000000&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-830e736d-f9b1-4fad-8a7d-98407745daa5%22:%91%22border_color_all%22,%22border_color_all%22,%22border_color_all%22,%22border_color_all%22,%22border_color_all%22,%22border_color_all%22,%22border_color_all%22,%22border_color_all%22,%22border_color_all%22%93,%22gcid-primary-color%22:%91%22form_field_focus_background_color%22%93}&#8221;][et_pb_contact_field field_id=&#8221;Email&#8221; field_title=&#8221;Email Address&#8221; field_type=&#8221;email&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; form_field_background_color=&#8221;RGBA(255,255,255,0)&#8221; form_field_text_color=&#8221;#000000&#8243; border_color_all=&#8221;#707070&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Name&#8221; field_title=&#8221;Name&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; form_field_text_color=&#8221;#000000&#8243; border_color_all=&#8221;#707070&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Interest&#8221; field_title=&#8221;What do you want help with?&#8221; field_type=&#8221;select&#8221; select_options=&#8221;%91{%22value%22:%22Vulnerability Discovery \/ Exposure Review%22,%22checked%22:0,%22dragID%22:-1},{%22value%22:%22AI Risk Audit (AI Agents \/ GenAI)%22,%22checked%22:0,%22dragID%22:0},{%22value%22:%22General Security Consultation%22,%22checked%22:0,%22dragID%22:1},{%22value%22:%22Not Sure Yet%22,%22checked%22:0,%22dragID%22:2}%93&#8243; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; form_field_text_color=&#8221;#000000&#8243; background_color=&#8221;RGBA(255,255,255,0)&#8221; background_enable_color=&#8221;on&#8221; positioning=&#8221;relative&#8221; overflow-x=&#8221;visible&#8221; overflow-y=&#8221;visible&#8221; border_color_all=&#8221;#707070&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Message&#8221; field_title=&#8221;How can we help you?&#8221; field_type=&#8221;text&#8221; required_mark=&#8221;off&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; form_field_text_color=&#8221;#000000&#8243; border_color_all=&#8221;#707070&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; disabled_on=&#8221;on|on|off&#8221; admin_label=&#8221;Testimonials&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Built on Recognized Cybersecurity Frameworks&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;c33f07d9-41e0-421a-8799-5799df695cce&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; title_font=&#8221;&#8211;et_global_heading_font|700|||||||&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4 data-start=\"1213\" data-end=\"1385\"><strong>NIST Cybersecurity Framework (CSF)<\/strong><\/h4>\n<p data-start=\"1213\" data-end=\"1385\">Passerum aligns risk identification and prioritization with the NIST CSF core functions \u2014 Identify, Protect, Detect, Respond, and Recover \u2014 adapted for SMB IT environments.<\/p>\n<p data-start=\"1387\" data-end=\"1407\">Focus areas include:<\/p>\n<ul data-start=\"1408\" data-end=\"1502\">\n<li data-start=\"1408\" data-end=\"1428\">\n<p data-start=\"1410\" data-end=\"1428\">Asset visibility<\/p>\n<\/li>\n<li data-start=\"1429\" data-end=\"1455\">\n<p data-start=\"1431\" data-end=\"1455\">Vulnerability exposure<\/p>\n<\/li>\n<li data-start=\"1456\" data-end=\"1479\">\n<p data-start=\"1458\" data-end=\"1479\">Risk prioritization<\/p>\n<\/li>\n<li data-start=\"1480\" data-end=\"1502\">\n<p data-start=\"1482\" data-end=\"1502\">Incident readiness<\/p>\n<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4 data-start=\"1213\" data-end=\"1385\"><strong>NIST AI Risk Management Framework (AI RMF)<\/strong><\/h4>\n<p data-start=\"1596\" data-end=\"1718\">For organizations deploying AI agents or GenAI systems, Passerum incorporates principles from the NIST AI RMF to evaluate:<\/p>\n<ul data-start=\"1720\" data-end=\"1840\">\n<li data-start=\"1720\" data-end=\"1737\">\n<p data-start=\"1722\" data-end=\"1737\">Bias exposure<\/p>\n<\/li>\n<li data-start=\"1738\" data-end=\"1760\">\n<p data-start=\"1740\" data-end=\"1760\">Output reliability<\/p>\n<\/li>\n<li data-start=\"1761\" data-end=\"1780\">\n<p data-start=\"1763\" data-end=\"1780\">Governance gaps<\/p>\n<\/li>\n<li data-start=\"1781\" data-end=\"1808\">\n<p data-start=\"1783\" data-end=\"1808\">Accountability controls<\/p>\n<\/li>\n<li data-start=\"1809\" data-end=\"1840\">\n<p data-start=\"1811\" data-end=\"1840\">Risk documentation maturity<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1842\" data-end=\"1922\">AI audits are structured, repeatable, and focused on real-world deployment risk.<\/p>\n<ul data-start=\"1408\" data-end=\"1502\"><\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4 data-start=\"1213\" data-end=\"1385\"><strong>ISO 27001 &amp; Risk-Based Controls<\/strong><\/h4>\n<p data-start=\"2005\" data-end=\"2080\">Passerum\u2019s risk prioritization logic follows ISO 27001 risk-based thinking:<\/p>\n<ul data-start=\"2082\" data-end=\"2210\">\n<li data-start=\"2082\" data-end=\"2116\">\n<p data-start=\"2084\" data-end=\"2116\">Likelihood \u00d7 Impact evaluation<\/p>\n<\/li>\n<li data-start=\"2117\" data-end=\"2147\">\n<p data-start=\"2119\" data-end=\"2147\">Control gap identification<\/p>\n<\/li>\n<li data-start=\"2148\" data-end=\"2175\">\n<p data-start=\"2150\" data-end=\"2175\">Documentation readiness<\/p>\n<\/li>\n<li data-start=\"2176\" data-end=\"2210\">\n<p data-start=\"2178\" data-end=\"2210\">Continuous improvement mindset<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"2212\" data-end=\"2289\">This ensures assessments are business-aligned, not just technically detailed.<\/p>\n<ul data-start=\"1408\" data-end=\"1502\"><\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; disabled_on=&#8221;off|off|on&#8221; admin_label=&#8221;Testimonials&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Built on Recognized Cybersecurity Frameworks&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;c33f07d9-41e0-421a-8799-5799df695cce&#8221; title_font=&#8221;&#8211;et_global_heading_font|700|||||||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4 data-start=\"1213\" data-end=\"1385\"><strong>NIST Cybersecurity Framework (CSF)<\/strong><\/h4>\n<p data-start=\"1213\" data-end=\"1385\">Passerum aligns risk identification and prioritization with the NIST CSF core functions \u2014 Identify, Protect, Detect, Respond, and Recover \u2014 adapted for SMB IT environments.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4 data-start=\"1213\" data-end=\"1385\"><strong>NIST AI Risk Management Framework (AI RMF)<\/strong><\/h4>\n<p data-start=\"1596\" data-end=\"1718\">For organizations deploying AI agents or GenAI systems, Passerum incorporates principles from the NIST AI RMF in our AI Auditing.<\/p>\n<ul data-start=\"1408\" data-end=\"1502\"><\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4 data-start=\"1213\" data-end=\"1385\"><strong>ISO 27001 &amp; Risk-Based Controls<\/strong><\/h4>\n<p data-start=\"2005\" data-end=\"2080\">Passerum\u2019s risk prioritization logic follows ISO 27001 risk-based thinking to ensure that the assessments are business-aligned, not just technically detailed.<\/p>\n<ul data-start=\"1408\" data-end=\"1502\"><\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; disabled_on=&#8221;on|on|on&#8221; admin_label=&#8221;Frequently Asked Questions&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; disabled=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_row _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Your Questions Answered&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;c33f07d9-41e0-421a-8799-5799df695cce&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Find answers to the most common questions about Passerum&#8217;s cybersecurity services and how we can help protect your business.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; custom_padding=&#8221;||27px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_accordion open_toggle_text_color=&#8221;gcid-heading-color&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;73efbc9d-37bf-4f75-b3d8-498640ef079f&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22%93,%22gcid-primary-color%22:%91%22open_toggle_text_color%22,%22icon_color%22%93,%22gcid-heading-color%22:%91%22toggle_text_color%22,%22toggle_text_color%22,%22open_toggle_text_color%22%93,%22gcid-body-color%22:%91%22body_text_color%22,%22body_text_color%22,%22body_text_color%22,%22body_text_color%22,%22body_text_color%22,%22body_text_color%22,%22body_text_color%22,%22body_text_color%22,%22body_text_color%22,%22body_text_color%22%93,%22gcid-3e0ae39b-d026-4173-b444-0c785917aeff%22:%91%22body_text_color%22%93,%22gcid-828accbb-1ed2-407d-95be-20ab4e191566%22:%91%22border_color_all%22%93}&#8221;][et_pb_accordion_item title=&#8221;What does Passerum do?&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;550abe5c-b505-4d6b-adc7-570bd7cc1217&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Passerum is a cybersecurity risk assessment platform that helps SMBs discover vulnerabilities, improve infrastructure visibility, and prioritize remediation. We also offer AI risk audits for AI agents and GenAI systems.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What is an AI risk audit and who needs it?&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;550abe5c-b505-4d6b-adc7-570bd7cc1217&#8243; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]<\/p>\n<p>An AI risk audit evaluates AI agents and GenAI systems for risks like bias exposure, inconsistent outputs, unsafe responses, and governance gaps\u2014especially when AI is used in customer-facing workflows or decision support.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Do you offer free risk assessments or free scans?&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;550abe5c-b505-4d6b-adc7-570bd7cc1217&#8243; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]<\/p>\n<p>We don\u2019t offer full assessments for free. We offer a free 30-minute consultation to help you understand your situation and decide what to do next.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What happens during the free 30-minute consultation?&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;550abe5c-b505-4d6b-adc7-570bd7cc1217&#8243; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]<\/p>\n<p>We review your environment at a high level, identify likely exposure points and blind spots, and outline practical next steps. If needed, we\u2019ll recommend a scoped assessment based on your goals.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Is Passerum for businesses without a cybersecurity team?&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;550abe5c-b505-4d6b-adc7-570bd7cc1217&#8243; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]<\/p>\n<p>Yes. Passerum is built for SMBs with IT teams who need clear visibility and prioritization without adding heavy security overhead.<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Ready to Secure Your Business?&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;ba4a6336-701f-47b8-bf5c-09da0ce28016&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_button button_url=&#8221;https:\/\/meetings-na2.hubspot.com\/francisco-rincon-narros&#8221; button_text=&#8221;Get Started Now&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;1bffc0fc-42a0-49d1-bd9a-ae3ade2d7206&#8243; button_text_color=&#8221;#C67000&#8243; button_bg_color=&#8221;#000000&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Frequently Asked Questions&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Your Questions Answered&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;c33f07d9-41e0-421a-8799-5799df695cce&#8221; title_font=&#8221;&#8211;et_global_heading_font|700|||||||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;2c55a9c4-feed-423b-9edb-ae0b5b365cac&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Find answers to the most common questions about Passerum&#8217;s cybersecurity services and how we can help protect your business.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_accordion open_toggle_text_color=&#8221;gcid-heading-color&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;73efbc9d-37bf-4f75-b3d8-498640ef079f&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22,%22quote_icon_color%22%93,%22gcid-primary-color%22:%91%22open_toggle_text_color%22,%22icon_color%22%93,%22gcid-heading-color%22:%91%22toggle_text_color%22,%22toggle_text_color%22,%22open_toggle_text_color%22%93,%22gcid-body-color%22:%91%22body_text_color%22,%22body_text_color%22,%22body_text_color%22,%22body_text_color%22,%22body_text_color%22,%22body_text_color%22,%22body_text_color%22,%22body_text_color%22,%22body_text_color%22,%22body_text_color%22%93,%22gcid-3e0ae39b-d026-4173-b444-0c785917aeff%22:%91%22body_text_color%22%93,%22gcid-828accbb-1ed2-407d-95be-20ab4e191566%22:%91%22border_color_all%22%93}&#8221;][et_pb_accordion_item title=&#8221;What does Passerum do?&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;550abe5c-b505-4d6b-adc7-570bd7cc1217&#8243; global_colors_info=&#8221;{}&#8221; toggle_font=&#8221;&#8211;et_global_heading_font|700|||||||&#8221; closed_toggle_font=&#8221;|700|||||||&#8221;]<\/p>\n<p>Passerum is a cybersecurity risk assessment platform that helps SMBs discover vulnerabilities, improve infrastructure visibility, and prioritize remediation. We also offer AI risk audits for AI agents and GenAI systems.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What is an AI risk audit and who needs it?&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;550abe5c-b505-4d6b-adc7-570bd7cc1217&#8243; global_colors_info=&#8221;{}&#8221; toggle_font=&#8221;&#8211;et_global_heading_font|700|||||||&#8221; closed_toggle_font=&#8221;|700|||||||&#8221; open=&#8221;off&#8221;]<\/p>\n<p>An AI risk audit evaluates AI agents and GenAI systems for risks like bias exposure, inconsistent outputs, unsafe responses, and governance gaps\u2014especially when AI is used in customer-facing workflows or decision support.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Do you offer free risk assessments or free scans?&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;550abe5c-b505-4d6b-adc7-570bd7cc1217&#8243; global_colors_info=&#8221;{}&#8221; toggle_font=&#8221;&#8211;et_global_heading_font|700|||||||&#8221; closed_toggle_font=&#8221;|700|||||||&#8221; open=&#8221;off&#8221;]<\/p>\n<p>We don\u2019t offer full assessments for free. We offer a free 30-minute consultation to help you understand your situation and decide what to do next.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What happens during the free 30-minute consultation?&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;550abe5c-b505-4d6b-adc7-570bd7cc1217&#8243; global_colors_info=&#8221;{}&#8221; toggle_font=&#8221;&#8211;et_global_heading_font|700|||||||&#8221; closed_toggle_font=&#8221;|700|||||||&#8221; open=&#8221;off&#8221;]<\/p>\n<p>We review your environment at a high level, identify likely exposure points and blind spots, and outline practical next steps. If needed, we\u2019ll recommend a scoped assessment based on your goals.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Is Passerum for businesses without a cybersecurity team?&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;550abe5c-b505-4d6b-adc7-570bd7cc1217&#8243; global_colors_info=&#8221;{}&#8221; toggle_font=&#8221;&#8211;et_global_heading_font|700|||||||&#8221; closed_toggle_font=&#8221;|700|||||||&#8221; open=&#8221;off&#8221;]<\/p>\n<p>Yes. Passerum is built for SMBs with IT teams who need clear visibility and prioritization without adding heavy security overhead.<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; disabled_on=&#8221;on|on|off&#8221; admin_label=&#8221;Call to Action&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;gcid-primary-color&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{%22gcid-primary-color%22:%91%22background_color%22%93}&#8221;][et_pb_row column_structure=&#8221;3_4,1_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; background_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_cta title=&#8221;Ready to Get Clarity on Your Exposure?&#8221; button_url=&#8221;#&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;be0cc754-576a-4b1c-868d-f6226f85de4d&#8221; header_text_align=&#8221;left&#8221; body_text_align=&#8221;left&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; button_alignment=&#8221;left&#8221; border_style_all=&#8221;none&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-828accbb-1ed2-407d-95be-20ab4e191566%22:%91%22border_color_all%22%93,%22gcid-heading-color%22:%91%22header_text_color%22%93,%22gcid-body-color%22:%91%22body_text_color%22%93,%22gcid-f2943306-fa6c-45f0-b632-5fc00151366a%22:%91%22button_text_color%22,%22button_text_color%22%93,%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22button_text_color%22,%22button_text_color%22,%22button_text_color%22%93}&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221;]<\/p>\n<p>Book a free 30-minute consultation to discuss your environment, likely exposure points, and the fastest path to reduce risk. If you\u2019re deploying AI agents or GenAI, request an AI risk audit to document and reduce AI-driven risk.<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; custom_padding=&#8221;150px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/meetings-na2.hubspot.com\/francisco-rincon-narros&#8221; button_text=&#8221;Book your 30 Minute Free Consultation&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; button_text_color=&#8221;#c67000&#8243; button_bg_color=&#8221;#000000&#8243; button_border_radius=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; disabled_on=&#8221;off|off|on&#8221; admin_label=&#8221;Call to Action&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;gcid-primary-color&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{%22gcid-primary-color%22:%91%22background_color%22%93}&#8221;][et_pb_row column_structure=&#8221;3_4,1_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;5138c454-be54-4233-bd3b-f8e6a8747976&#8243; background_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_cta title=&#8221;Talk to an expert today and start your journey to a more secured IT future&#8221; button_url=&#8221;#&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;be0cc754-576a-4b1c-868d-f6226f85de4d&#8221; header_text_align=&#8221;left&#8221; body_text_align=&#8221;left&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; button_alignment=&#8221;left&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;justified&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; border_style_all=&#8221;none&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-828accbb-1ed2-407d-95be-20ab4e191566%22:%91%22border_color_all%22%93,%22gcid-heading-color%22:%91%22header_text_color%22%93,%22gcid-body-color%22:%91%22body_text_color%22%93,%22gcid-f2943306-fa6c-45f0-b632-5fc00151366a%22:%91%22button_text_color%22,%22button_text_color%22%93,%22gcid-36fd78a7-34bc-404d-873c-dafa34efaae5%22:%91%22button_text_color%22,%22button_text_color%22,%22button_text_color%22%93}&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221;][\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;73121f80-a3ef-4484-8763-c3f18e3c56d2&#8243; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/meetings-na2.hubspot.com\/francisco-rincon-narros&#8221; button_text=&#8221;Book your 30 Minute Free Consultation&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; button_text_color=&#8221;#c67000&#8243; button_bg_color=&#8221;#000000&#8243; button_border_radius=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Passerum helps SMB IT teams find exposed assets, misconfigurations, and vulnerability risks\u2014then turns findings into a clear, prioritized remediation plan.Built for teams with IT but no dedicated security teamIdentify common security weaknesses\u2014like exposed services, outdated components, and misconfigurations\u2014before they become incidents.Get a clear picture of what\u2019s running in your environment\u2014systems, services, and exposure points\u2014so nothing [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-13","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/passerum.io\/index.php\/wp-json\/wp\/v2\/pages\/13","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/passerum.io\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/passerum.io\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/passerum.io\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/passerum.io\/index.php\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":38,"href":"https:\/\/passerum.io\/index.php\/wp-json\/wp\/v2\/pages\/13\/revisions"}],"predecessor-version":[{"id":274,"href":"https:\/\/passerum.io\/index.php\/wp-json\/wp\/v2\/pages\/13\/revisions\/274"}],"wp:attachment":[{"href":"https:\/\/passerum.io\/index.php\/wp-json\/wp\/v2\/media?parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}