div.et_pb_section.et_pb_section_2{background-size:contain;background-position:center bottom 0px;background-image:url(https://esrchimtox.fr/wp-content/uploads/2025/03/cyber-security-02.png),radial-gradient(circle at top right,#00ffd8 0%,#0029e2 100%)!important}.et_pb_section_2.et_pb_section{padding-bottom:0px}.et_pb_section_2.section_has_divider.et_pb_top_divider .et_pb_top_inside_divider{background-image:url(data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMTAwJSIgaGVpZ2h0PSIyNnZ3IiB2aWV3Qm94PSIwIDAgMTI4MCAxNDAiIHByZXNlcnZlQXNwZWN0UmF0aW89Im5vbmUiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyI+PGcgZmlsbD0iI2ZmZmZmZiI+PHBhdGggZD0iTTEyODAgMTQwVjBIMGwxMjgwIDE0MHoiLz48L2c+PC9zdmc+);background-size:100% 26vw;top:0;height:26vw;z-index:1;transform:scale(-1,1)}.et_pb_image_1{width:70%;transform:scaleX(1.3) scaleY(1.3);transform-origin:100% 0%;text-align:left;margin-left:0}.et_pb_text_2 h2{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:900;font-size:56px;line-height:1.1em}.et_pb_text_2 h3{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:600;font-size:30px;line-height:1.2em}.et_pb_divider_0{margin-bottom:0px!important;width:100px}.et_pb_divider_0:before{border-top-color:#00b4ff;border-top-width:2px}.et_pb_text_3{line-height:1.8em;font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:300;font-size:17px;line-height:1.8em}.et_pb_blurb_2.et_pb_blurb .et_pb_module_header,.et_pb_blurb_2.et_pb_blurb .et_pb_module_header a,.et_pb_blurb_3.et_pb_blurb .et_pb_module_header,.et_pb_blurb_3.et_pb_blurb .et_pb_module_header a,.et_pb_blurb_4.et_pb_blurb .et_pb_module_header,.et_pb_blurb_4.et_pb_blurb .et_pb_module_header a{font-size:18px;color:#0C71C3!important}.et_pb_blurb_2.et_pb_blurb,.et_pb_blurb_3.et_pb_blurb,.et_pb_blurb_4.et_pb_blurb{background-color:#FFFFFF;border-radius:10px 10px 10px 10px;overflow:hidden;border-color:#FFFFFF;height:100px;max-height:100px;padding-top:25px!important;margin-top:0px!important}.et_pb_blurb_2 .et_pb_main_blurb_image .et_pb_only_image_mode_wrap,.et_pb_blurb_2 .et_pb_main_blurb_image .et-pb-icon,.et_pb_blurb_3 .et_pb_main_blurb_image .et_pb_only_image_mode_wrap,.et_pb_blurb_3 .et_pb_main_blurb_image .et-pb-icon,.et_pb_blurb_4 .et_pb_main_blurb_image .et_pb_only_image_mode_wrap,.et_pb_blurb_4 .et_pb_main_blurb_image .et-pb-icon{border-color:#FFFFFF;padding-top:0px!important;margin-top:0px!important}.et_pb_blurb_2,.et_pb_blurb_3,.et_pb_blurb_4{box-shadow:0px 12px 18px -6px #D6D6D6}.et_pb_blurb_2 .et_pb_main_blurb_image .et_pb_image_wrap,.et_pb_blurb_3 .et_pb_main_blurb_image .et_pb_image_wrap,.et_pb_blurb_4 .et_pb_main_blurb_image .et_pb_image_wrap{max-width:120%}div.et_pb_section.et_pb_section_3{background-image:url(https://esrchimtox.fr/wp-content/uploads/2025/03/cyber-security-17.png),radial-gradient(circle at top right,#3122b2 0%,#00ffd8 100%)!important}.et_pb_section_3{overflow-x:visible;overflow-y:visible;z-index:10;position:relative}.et_pb_section_3.et_pb_section{padding-bottom:10vw}.et_pb_column_5{padding-top:30vw}.et_pb_column_6{padding-top:18vw}@media only screen and (min-width:981px){.et_pb_image_1{max-width:70%}}@media only screen and (max-width:980px){div.et_pb_section.et_pb_section_2{background-image:url(http://zaib.sandbox.etdevs.com/divi/wp-content/uploads/sites/2/2019/06/cyber-security-09.png),radial-gradient(circle at top right,#00ffd8 0%,#0029e2 100%)!important}.et_pb_section_2.et_pb_section{padding-bottom:24vw}.et_pb_image_1{margin-top:-16vw!important;max-width:400px;transform:scaleX(1) scaleY(1);transform-origin:100% 0%}.et_pb_image_1 .et_pb_image_wrap img{width:auto}.et_pb_text_2 h2{font-size:38px}.et_pb_text_2 h3{font-size:24px}.et_pb_column_5,.et_pb_column_6{padding-top:0vw}}@media only screen and (max-width:767px){.et_pb_image_1{transform:scaleX(1) scaleY(1);transform-origin:100% 0%}.et_pb_image_1 .et_pb_image_wrap img{width:auto}.et_pb_text_2 h2{font-size:26px}.et_pb_text_2 h3{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:700;font-size:18px}.et_pb_text_3{font-size:14px}}