{"id":17,"date":"2023-01-27T14:27:23","date_gmt":"2023-01-27T14:27:23","guid":{"rendered":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/?page_id=17"},"modified":"2023-02-06T15:57:20","modified_gmt":"2023-02-06T15:57:20","slug":"home","status":"publish","type":"page","link":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/","title":{"rendered":"Home"},"content":{"rendered":"
[et_pb_section fb_built=”1″ admin_label=”Header” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00ffd8 0%|#0029e2 100%” background_color_gradient_start=”#00ffd8″ background_color_gradient_end=”#0029e2″ background_image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/01\/cyber-security-18.png” parallax=”on” custom_padding=”10vw||” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ z_index=”1″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_font=”Overpass|900|||||||” header_font_size=”84px” background_layout=”dark” header_font_size_tablet=”54px” header_font_size_phone=”32px” header_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/02\/cyber-security-08-1.png” align=”right” _builder_version=”4.16″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”-16vw|-20vw|-4vw|” custom_margin_tablet=”-2vw|0vw|-24vw|” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ z_index=”0″ width=”100%” max_width=”none” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/02\/cyber-security-01.png” show_bottom_space=”off” force_fullwidth=”on” _builder_version=”4.16″ custom_margin=”-40vw||-2px” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Features” _builder_version=”4.16″ global_colors_info=”{}”][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.18.0″ custom_margin=”-8vw||||false” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_blurb title=”Data Analysis” image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/01\/cyber-security-icon-28.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” custom_padding=”||0px|||” global_colors_info=”{}”][\/et_pb_blurb][et_pb_blurb title=”Data Engineering” image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/02\/cyber-security-icon-18.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” global_colors_info=”{}”][\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|-94px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” transform_styles_tablet=”” transform_styles_phone=”” global_colors_info=”{}”][et_pb_blurb title=”Application Managed Services” image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/02\/cyber-security-icon-12.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”][\/et_pb_blurb][et_pb_blurb title=”Resource Planning” image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/02\/cyber-security-icon-36.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”][\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|-188px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” transform_styles_tablet=”” transform_styles_phone=”” global_colors_info=”{}”][et_pb_blurb title=”Digital Transformation” image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/02\/cyber-security-icon-4.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”][\/et_pb_blurb][et_pb_blurb title=”IT Consulting” image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/02\/cyber-security-icon-20.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ next_background_color=”#ffffff” admin_label=”Feature” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_stops=”#004183 0%|#001f4c 100%” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” background_image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/02\/cyber-security-12.png” background_size=”contain” background_position=”top_left” overflow-x=”hidden” overflow-y=”hidden” custom_margin=”||” custom_padding=”24vw|||||” top_divider_height=”26vw” top_divider_flip=”horizontal” bottom_divider_style=”asymmetric” bottom_divider_height=”22vw” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.18.0″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/02\/cyber-security-04-1.png” _builder_version=”4.16″ transform_scale=”130%|130%” transform_scale_tablet=”100%|100%” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate_tablet=”” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin=”100%|100%” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” transform_styles_tablet=”” transform_styles_phone=”” locked=”off” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”||” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Overpass|600|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” background_layout=”dark” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]<\/p>\n
AVTS is the name, where we specialize in providing businesses with data analytics, ServiceNow, Salesforce, resource planning, and application managed services.<\/p>\n
Our data analytics services provide businesses with valuable insights into their data, helping them make informed decisions and drive success. Our team of experts has the skills and knowledge to help businesses make sense of their data and turn it into actionable information.<\/p>\n
\u00a0Our team of certified experts can help businesses optimize their use of these powerful platforms, streamlining processes and increasing efficiency.<\/p>\n
In addition, we offer comprehensive resource planning and application managed services to help businesses stay organized and on top of their operations. Our team can help businesses plan and manage their resources, ensuring that they have the right people, skills, and equipment to meet their goals.<\/p>\n
We understand the importance of staying competitive in today\u2019s fast-paced business world and we are committed to providing our clients with the best possible service and solutions.Contact us today to learn more about how we can help your business thrive with our Data analytics, Data Engineering,IT Staffing and Consulting, Resource Planning and Application Managed Services.<\/span><\/p>\n<\/div>\n<\/div>\n [\/et_pb_text][et_pb_text _builder_version=”4.16″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”][\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#3122b2 0%|#00ffd8 100%” background_color_gradient_start=”#3122b2″ background_color_gradient_end=”#00ffd8″ background_image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/01\/cyber-security-17.png” z_index=”10″ overflow-x=”visible” overflow-y=”visible” custom_padding=”||10vw|||” locked=”off” global_colors_info=”{}”][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”4.16″ background_color=”#ffffff” custom_margin=”-146px|auto|-2px|auto||” custom_padding=”0px||0px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”40px” box_shadow_blur=”60px” box_shadow_spread=”-8px” box_shadow_color=”rgba(10,45,97,0.48)” locked=”off” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ custom_padding=”60px|40px|60px|40px|true|true” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]<\/p>\n [\/et_pb_text][et_pb_blurb title=”(805)-768-4855″ use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.18.0″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”][\/et_pb_blurb][et_pb_blurb title=”1883 Fox Springs Cir [\/et_pb_text][et_pb_text _builder_version=”4.18.0″ text_font=”Overpass|300|||||||” text_text_color=”#0a2d61″ text_font_size=”17px” text_line_height=”1.8em” text_orientation=”center” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”][\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":" A New Paradigm Shift in Business With Data AnalysisAbout AVTS-Creating Sustainable Businesses AVTS is the name, where we specialize in providing businesses with data analytics, ServiceNow, Salesforce, resource planning, and application managed services. Our data analytics services provide businesses with valuable insights into their data, helping them make informed decisions and drive success. Our team […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Contact Us<\/h2>\n
\nNewbury Park, CA 91320 USA
\n” use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”][\/et_pb_blurb][\/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00f6ff 0%|#00ffbf 100%” background_color_gradient_start=”#00f6ff” background_color_gradient_end=”#00ffbf” background_image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/01\/cyber-security-010-1.png” background_size=”contain” background_position=”bottom_left” transform_translate_linked=”off” custom_padding=”60px|40px|60px|20%|true” custom_padding_tablet=”80px|||40px” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” background_last_edited=”on|desktop” background_image_tablet=”http:\/\/zaib.sandbox.etdevs.com\/divi\/wp-content\/uploads\/sites\/2\/2019\/06\/cyber-security-11.png” background_enable_image_tablet=”on” background_position_tablet=”top_left” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” text_orientation=”center” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” text_text_align=”center” locked=”off” global_colors_info=”{}”]<\/p>\nGet Started Now<\/h2>\n