7th Floor
Glass Tower 115 C Palanca,
Legazpi Village, Makati City,
1229 Philippines
Our Services
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ next_background_color=”#F2F2FA” _builder_version=”4.16″ custom_padding=”57px|0px|0px|0px|false|false” bottom_divider_style=”waves2″ bottom_divider_height=”368px” bottom_divider_repeat=”0.6x” bottom_divider_height_tablet=”220px” bottom_divider_height_phone=”160px” bottom_divider_height_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.21.0″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”19px” text_line_height=”2em” ul_font=”||||||||” header_font=”||||||||” header_2_font=”Roboto|700|||||||” header_2_font_size=”40px” header_2_line_height=”130%” header_3_font=”||||||||” max_width=”800px” max_width_last_edited=”off|desktop” custom_margin=”||50px|||” custom_padding=”|||” header_2_font_size_tablet=”35px” header_2_font_size_phone=”28px” header_2_font_size_last_edited=”on|phone” global_colors_info=”{}”]Our Cybersecurity Services cover everything from Threat Intelligence to Online Assets Protection, Data Privacy, and more.
In today’s digital age, businesses are more vulnerable than ever. Protect your business from cyber threats and online defacement with our cyber security services.
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_image src=”https://ipvnetwork.com/wp-content/uploads/2019/09/Dash.jpg” align_tablet=”center” align_phone=”” align_last_edited=”on|desktop” _builder_version=”4.16″ animation_style=”zoom” animation_intensity_zoom=”6%” hover_enabled=”0″ border_radii=”on|10px|10px|10px|10px” border_width_all=”20px” border_color_all=”rgba(255,255,255,0)” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” global_colors_info=”{}” sticky_enabled=”0″ disabled_on=”on|on|on” disabled=”on”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|tablet” admin_label=” Market Research” _builder_version=”4.16″ background_color=”#F2F2FA” custom_margin_tablet=”” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”0px||80px||false|false” custom_padding_tablet=”” custom_padding_phone=”0px|||” saved_tabs=”all” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ custom_padding=”||0px|||” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_blurb title=”Targeted Threat Intelligence” icon_placement=”left” content_max_width=”1100px” image_icon_width_tablet=”” image_icon_width_phone=”” image_icon_width_last_edited=”on|phone” _builder_version=”4.21.0″ header_level=”h3″ header_font=”Roboto|700|||||||” header_font_size=”25px” header_line_height=”1.7em” body_font=”||||||||” body_font_size=”17px” body_line_height=”160%” background_color=”#ffffff” text_orientation=”center” module_alignment=”left” custom_margin=”||0px|” custom_padding=”20px|20px|20px|20px|false|true” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|phone” animation=”off” header_font_size_tablet=”” header_font_size_phone=”18px” header_font_size_last_edited=”on|desktop” body_font_size_tablet=”” body_font_size_phone=”14px” body_font_size_last_edited=”on|phone” text_orientation_tablet=”” text_orientation_phone=”left” text_orientation_last_edited=”on|phone” border_radii=”|10px|10px||” border_width_all_image=”50px” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” icon_font_size_tablet=”” icon_font_size_phone=”32px” icon_font_size_last_edited=”on|phone” global_colors_info=”{}”]Comprehensive defense solutions to ensure that your company is protected from cyber security threats and attacks.
[/et_pb_blurb][et_pb_toggle title=”Learn More” module_class=”services-more” _builder_version=”4.16″ title_font=”Roboto|700|||||||” title_font_size=”18px” title_line_height=”1.7em” body_font=”||||||||” body_font_size=”16px” body_line_height=”2em” background_color=”#ffffff” custom_margin=”||12%|” custom_padding=”|30px||30px” animation_style=”fold” animation_direction=”top” border_radii=”|||10px|10px” border_width_all=”0px” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” global_colors_info=”{}”]Targeted Cyber Intelligence Analysis
Weekly, monthly, or quarterly reports detailing your cyber threat landscape, clarifying high severity indicators, and identifying key trends.
Email Alerts
Real-time email alerts on cyber indicators of potential targeted attacks, providing immediate analysis on the potential cyber threat and recommended mitigation.
Cyber and Fraud Intelligence Investigations
Comprehensive investigations on specific cyberattacks – from corporate fraud and online counterfeit to intellectual property theft and industrial espionage.
Threat Actors Investigations
Cyber investigations and complex analysis on specific threat actors and their techniques, behavior, and communication patterns, motives, and networks they belong to using our sophisticated machine learning capabilities in Argos.
Malware Analysis
Malware investigations on specific malware and comprehensive analysis report on malware exploitation, threat actors behind it, motives, and more.
Cyber Threat Briefing
Briefing of stakeholders on typical cyber attacks and threat actors in the industry and location and reinforcing it with incident response services.
Weekly Digest
Weekly cyber news digest on key cyber events happening around the globe across specific industries and specific cyber domains.
Formidable cyber security strategy to protect your brand from defacement threats.
[/et_pb_blurb][et_pb_toggle title=”Learn More” module_class=”services-more” _builder_version=”4.16″ title_font=”Roboto|700|||||||” title_font_size=”18px” title_line_height=”1.7em” body_font=”||||||||” body_font_size=”16px” body_line_height=”2em” background_color=”#ffffff” custom_margin=”||12%|” custom_padding=”|30px||30px” animation_style=”fold” animation_direction=”top” border_radii=”|||10px|10px” border_width_all=”0px” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” locked=”off” global_colors_info=”{}”]Sentiment analysis
Sentiment analysis and reports on potential defacement of your brand, including highlighting opinion leaders and trends, using the Argos platform online asset protection module.
Cyber security management through round-the-clock monitoring and incident management by our cyber security specialists.
[/et_pb_blurb][et_pb_toggle title=”Learn More” module_class=”services-more” _builder_version=”4.16″ title_font=”Roboto|700|||||||” title_font_size=”18px” title_line_height=”1.7em” body_font=”||||||||” body_font_size=”16px” body_line_height=”2em” background_color=”#ffffff” custom_margin=”||12%|” custom_padding=”|30px||30px” animation_style=”fold” animation_direction=”top” border_radii=”|||10px|10px” border_width_all=”0px” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” locked=”off” global_colors_info=”{}”]Managed SOC
Round-the-clock monitoring and incident management by cyber security specialists, providing contextual threat intelligence and enabling proactive response through a unified dashboard allowing collaboration and quick resolution.
An intelligent risk-based vulnerability management Robot.
[/et_pb_blurb][et_pb_toggle title=”Learn More” module_class=”services-more” _builder_version=”4.21.0″ title_font=”Roboto|700|||||||” title_font_size=”18px” title_line_height=”1.7em” body_font=”||||||||” body_font_size=”16px” body_line_height=”2em” background_color=”#ffffff” custom_margin=”||12%|” custom_padding=”|30px||30px” animation_style=”fold” animation_direction=”top” border_radii=”|||10px|10px” border_width_all=”0px” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” locked=”off” global_colors_info=”{}”]A fully automated AI-based technology that assesses and identifies vulnerabilities not only in applications but also in systems and networks. Enabling enterprise and web application teams, independent software vendors, governments, education, DevOps and anyone responsible for ensuring software security to affordably and efficiently test their systems. Modeled with a collective knowledge of threats, vulnerabilities, and exploits and equipped with state-of-the-art hacking techniques. Acting like a real attacker, relentlessly locate exploits and documents their findings.
[/et_pb_toggle][et_pb_blurb title=”Unified Identity Protection” icon_placement=”left” image_icon_width_tablet=”” image_icon_width_phone=”” image_icon_width_last_edited=”on|desktop” admin_label=”Unified Identity Protection” _builder_version=”4.21.0″ header_font=”Roboto|700|||||||” header_font_size=”25px” header_line_height=”130%” body_font=”||||||||” body_font_size=”17px” body_line_height=”160%” background_color=”#ffffff” text_orientation=”center” module_alignment=”left” custom_margin=”||0px|” custom_padding=”20px|20px|20px|20px|false|true” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|phone” animation_style=”zoom” animation_intensity_zoom=”8%” animation=”off” header_font_size_tablet=”” header_font_size_phone=”18px” header_font_size_last_edited=”on|desktop” body_font_size_tablet=”” body_font_size_phone=”14px” body_font_size_last_edited=”on|phone” text_orientation_tablet=”” text_orientation_phone=”left” text_orientation_last_edited=”on|phone” border_radii=”|10px|10px||” border_width_all_image=”50px” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” icon_font_size_tablet=”” icon_font_size_phone=”32px” icon_font_size_last_edited=”on|desktop” global_colors_info=”{}”]Additional layer of security on top of your existing identity solutions in the network.
[/et_pb_blurb][et_pb_toggle title=”Learn More” module_class=”services-more” _builder_version=”4.21.0″ title_font=”Roboto|700|||||||” title_font_size=”18px” title_line_height=”1.7em” body_font=”||||||||” body_font_size=”16px” body_line_height=”2em” background_color=”#ffffff” custom_margin=”||12%|” custom_padding=”|30px||30px” animation_style=”fold” animation_direction=”top” border_radii=”|||10px|10px” border_width_all=”0px” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” locked=”off” global_colors_info=”{}”]Augments and orchestrates any type of Identity Solution, hence the Unified Identity Protection. It doesn’t manage identities of users in the organization (like Active Directory or Azure AD or PAM). What It offers is a platform that provides an additional layer of security on top of the existing identity solutions in the network.
We do this in 2 ways:
1. By providing full visibility to all the authentications taking place and scoring each authentication based on the risk it poses to the network.
2. Having the ability to intervene with the authentication flow by blocking authentications or implementing MFA.
We do all of this without making any code changes to the applications or making changes to the servers in the network.
Cyber protection for your online data and brand reputation.
[/et_pb_blurb][et_pb_toggle title=”Learn More” module_class=”services-more” _builder_version=”4.16″ title_font=”Roboto|700|||||||” title_font_size=”18px” title_line_height=”1.7em” body_font=”||||||||” body_font_size=”16px” body_line_height=”2em” background_color=”#ffffff” custom_margin=”||12%|” custom_padding=”|30px||30px” animation_style=”fold” animation_direction=”top” border_radii=”|||10px|10px” border_width_all=”0px” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” global_colors_info=”{}”]Blacklist Service
Blacklist reports for defined blacklisted words/links on given clients’ official pages, as well as blacklisted IPs’ “whitelisting.”
Social Media Communities Investigation
Monitoring and investigation of activities of social media to identify fake network or channel activities (ie fake FB pages), as well as malicious activities on social media assets related to our clients.
Domain and Fake FB Pages Takedown
Takedown of abusive domains and fake Facebook pages on behalf of our clients.
Web Application, Mobile Application, Infrastructure/ WiFi, and SAAS Application testing as a service.
[/et_pb_blurb][et_pb_toggle title=”Learn More” module_class=”services-more” _builder_version=”4.16″ title_font=”Roboto|700|||||||” title_font_size=”18px” title_line_height=”1.7em” body_font=”||||||||” body_font_size=”16px” body_line_height=”2em” background_color=”#ffffff” custom_margin=”||12%|” custom_padding=”|30px||30px” animation_style=”fold” animation_direction=”top” border_radii=”|||10px|10px” border_width_all=”0px” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” locked=”off” global_colors_info=”{}”]Our CyberOPS team simulates real attack scenarios on your systems, designed to evaluate your controls according to industry’s best practices, and assesses the potential threats and the impact of a breach on your business, as well as possible mitigations.
[/et_pb_toggle][et_pb_blurb title=”API Security” icon_placement=”left” image_icon_width_tablet=”” image_icon_width_phone=”” image_icon_width_last_edited=”on|desktop” admin_label=”API Security” _builder_version=”4.21.0″ header_font=”Roboto|700|||||||” header_font_size=”25px” header_line_height=”130%” body_font=”||||||||” body_font_size=”17px” body_line_height=”160%” background_color=”#ffffff” text_orientation=”center” module_alignment=”left” custom_margin=”||0px|” custom_padding=”20px|20px|20px|20px|false|true” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|phone” animation_style=”zoom” animation_intensity_zoom=”8%” animation=”off” header_font_size_tablet=”” header_font_size_phone=”18px” header_font_size_last_edited=”on|desktop” body_font_size_tablet=”” body_font_size_phone=”14px” body_font_size_last_edited=”on|phone” text_orientation_tablet=”” text_orientation_phone=”left” text_orientation_last_edited=”on|phone” border_radii=”|10px|10px||” border_width_all_image=”50px” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” icon_font_size_tablet=”” icon_font_size_phone=”32px” icon_font_size_last_edited=”on|desktop” global_colors_info=”{}”]Protect APIs from real-time attacks through automated detection and response mechanisms.
[/et_pb_blurb][et_pb_toggle title=”Learn More” module_class=”services-more” _builder_version=”4.21.0″ title_font=”Roboto|700|||||||” title_font_size=”18px” title_line_height=”1.7em” body_font=”||||||||” body_font_size=”16px” body_line_height=”2em” background_color=”#ffffff” custom_margin=”||12%|” custom_padding=”|30px||30px” animation_style=”fold” animation_direction=”top” border_radii=”|||10px|10px” border_width_all=”0px” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” locked=”off” global_colors_info=”{}”]Complete API Security that covers the entire lifecycle of an API.
Discovery
• External API Attack Surface (Recon)
• Shadow & Rogue APIs
• Detailed Inventory including data-types
Posture Management
• Coverage of OWASP Top 10 & more
• Proactive governance of leading practice
• Correlation of API attributes (context)
Runtime Protection
• Fine-grained AI/ML behavioral anomaly detection
• Blocking and prevention
• Workflow integrations
API Security
• Shift Left with on-demand, scheduled of CI/CD integrated API testing, including against business logic Testing
[/et_pb_toggle][et_pb_blurb title=”Zero Trust” icon_placement=”left” image_icon_width_tablet=”” image_icon_width_phone=”” image_icon_width_last_edited=”on|desktop” admin_label=”Zero Trust” _builder_version=”4.21.0″ header_font=”Roboto|700|||||||” header_font_size=”25px” header_line_height=”130%” body_font=”||||||||” body_font_size=”17px” body_line_height=”160%” background_color=”#ffffff” text_orientation=”center” module_alignment=”left” custom_margin=”||0px|” custom_padding=”20px|20px|20px|20px|false|true” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|phone” animation_style=”zoom” animation_intensity_zoom=”8%” animation=”off” header_font_size_tablet=”” header_font_size_phone=”18px” header_font_size_last_edited=”on|desktop” body_font_size_tablet=”” body_font_size_phone=”14px” body_font_size_last_edited=”on|phone” text_orientation_tablet=”” text_orientation_phone=”left” text_orientation_last_edited=”on|phone” border_radii=”|10px|10px||” border_width_all_image=”50px” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” icon_font_size_tablet=”” icon_font_size_phone=”32px” icon_font_size_last_edited=”on|desktop” global_colors_info=”{}”]
A cloud native platform that connects and secures users, workloads, and devices over any network from any location.
[/et_pb_blurb][et_pb_toggle title=”Learn More” module_class=”services-more” _builder_version=”4.21.0″ title_font=”Roboto|700|||||||” title_font_size=”18px” title_line_height=”1.7em” body_font=”||||||||” body_font_size=”16px” body_line_height=”2em” background_color=”#ffffff” custom_margin=”||12%|” custom_padding=”|30px||30px” animation_style=”fold” animation_direction=”top” border_radii=”|||10px|10px” border_width_all=”0px” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” locked=”off” global_colors_info=”{}”]Enables organizations to implement Zero Trust principles and authenticate users and devices before granting access to sensitive data or systems.
1. Zero Network Access
Connect users to apps, not corporate networks, to prevent lateral movement
2. Zero Attack Surface
Make apps invisible so they can’t be attacked
3. Zero Passthrough Connections
Proxy architechture for better cyberthreat and data protection
Empower your employees with Automated Cyber Awareness Training
Phishing Simulation – Deploys intelligent simulated attacks on your employees via email and SMS
Cywareness – A propriety AI cyber awareness system offers a unique combination of technologies to teach and test employees according to their level.
Online Courses – We offer a wide range
of IT and cybersecurity courses and workshops suitable for all levels, from beginners through to seasoned professionals. Each class is conducted online by an experienced lecturer.
Cyber Challenge – An integrative, technology-based event that combines cybersecurity training with a competitive, gamified environment.
Online Academy – A successful academy training programs are now also available online. From cyber essentials to blue team, red team and CISO training, we cover all the key cyber disciplines.
[/et_pb_toggle][/et_pb_column][/et_pb_row][et_pb_row disabled_on=”on|on|on” _builder_version=”4.16″ disabled=”on” collapsed=”off” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][dsm_icon_divider use_icon=”on” font_icon=”||divi||400″ icon_color=”#000000″ use_icon_font_size=”on” icon_font_size=”31px” color=”#000000″ _builder_version=”4.16″ custom_padding=”23px||23px||true|false” global_colors_info=”{}”][/dsm_icon_divider][et_pb_text _builder_version=”4.16″ text_font=”||||||||” text_font_size=”16px” text_line_height=”2em” ul_font=”||||||||” header_font=”||||||||” header_2_font=”Roboto|700|||||||” header_2_font_size=”39px” header_2_line_height=”130%” header_3_font=”||||||||” text_orientation=”center” max_width=”800px” max_width_last_edited=”off|desktop” module_alignment=”center” custom_margin=”|||” custom_padding=”|||” header_2_font_size_tablet=”35px” header_2_font_size_phone=”28px” header_2_font_size_last_edited=”on|phone” global_colors_info=”{}”]We can also help with your Daily Business Operations and Online Marketing needs.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ disabled_on=”on|on|on” _builder_version=”4.16″ disabled=”on” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_blurb title=”Digital Marketing” use_icon=”on” font_icon=”||divi||400″ icon_color=”#76ce44″ icon_placement=”left” image_icon_width=”64px” content_max_width=”1100px” image_icon_width_tablet=”64px” image_icon_width_phone=”32px” image_icon_width_last_edited=”on|phone” _builder_version=”4.16″ header_level=”h3″ header_font=”Roboto|700|||||||” header_font_size=”25px” header_line_height=”1.7em” body_font=”||||||||” body_font_size=”17px” body_line_height=”160%” background_color=”#ffffff” text_orientation=”center” module_alignment=”left” custom_margin=”||0px|” custom_padding=”20px|20px|20px|20px|false|true” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|phone” animation=”off” header_font_size_tablet=”” header_font_size_phone=”18px” header_font_size_last_edited=”on|desktop” body_font_size_tablet=”” body_font_size_phone=”14px” body_font_size_last_edited=”on|phone” text_orientation_tablet=”” text_orientation_phone=”left” text_orientation_last_edited=”on|phone” border_radii=”|10px|10px||” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” icon_font_size=”64px” icon_font_size_tablet=”” icon_font_size_phone=”32px” icon_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”]Boost your online reach with dynamic digital marketing through social media, ads, SEO, PPC, and website development.
[/et_pb_blurb][et_pb_toggle title=”Learn More” admin_label=”Toggle” module_class=”services-more” _builder_version=”4.16″ title_font=”Roboto|700|||||||” title_font_size=”18px” title_line_height=”1.7em” body_font=”||||||||” body_font_size=”16px” body_line_height=”2em” background_color=”#ffffff” custom_margin=”||12%|” custom_padding=”|30px||30px” animation_style=”fold” animation_direction=”top” border_radii=”|||10px|10px” border_width_all=”0px” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” locked=”off” global_colors_info=”{}”]Pepper VA also has a team of digital marketing experts that can help you earn that rightful spot online. They can analyze your requirements, develop a website that converts, and assist you in implementing digital marketing strategies for your business.
- Ads (Google and Social Media ads)
- Social Media (Community Management)
- SEO (Search Engine Optimization)
- Website (Design and Content)
- PPC (Pay-per-click Marketing)
Virtual assistance services to clients and businesses, specializing in executive assistance, digital marketing, and project management.
[/et_pb_blurb][et_pb_toggle title=”Learn More” module_class=”services-more” _builder_version=”4.16″ title_font=”Roboto|700|||||||” title_font_size=”18px” title_line_height=”1.7em” body_font=”||||||||” body_font_size=”16px” body_line_height=”2em” background_color=”#ffffff” custom_margin=”||12%|” custom_padding=”|30px||30px” animation_style=”fold” animation_direction=”top” border_radii=”|||10px|10px” border_width_all=”0px” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” locked=”off” global_colors_info=”{}”]Pepper Virtual Assistants or Pepper VA is the subsidiary of IPV Network that provides virtual assistance services to clients and businesses all over the world. Established in 2009, Pepper VA is composed of a dynamic and competent team of experienced virtual assistants specializing in executive and marketing assistance and project management. The company also provides creative services, such as copywriting and web design.
Pepper VA has helped business owners streamline their tasks and processes, allowing them to focus on their core business and pursue their passions. It is committed to providing jobs to fellow Filipinos while showcasing world-class skills, dedication, and hard work.
The name Pepper was inspired by the extraordinary personal assistant of an iron-clad superhero. Behind his success is a woman named Pepper. In the same way, behind thriving SMEs is a virtual assistant from Pepper VA!
[/et_pb_toggle][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” admin_label=”Our Partners” _builder_version=”4.22.2″ background_color=”#efefef” use_background_color_gradient=”on” background_color_gradient_stops=”#ffffff 0%|#F2F2FA 50%” background_color_gradient_start=”#ffffff” background_color_gradient_end=”#F2F2FA” background_color_gradient_end_position=”50%” background_size=”initial” custom_padding=”|||” custom_padding_tablet=”5%||5%||true” custom_padding_phone=”|||” top_divider_style=”clouds2″ top_divider_color=”RGBA(255,255,255,0)” bottom_divider_height=”200px” bottom_divider_flip=”horizontal” background_color_gradient_stops_tablet=”#ffffff 0%|#F2F2FA 50%” background_color_gradient_stops_phone=”#ffffff 0%|#F2F2FA 50%” global_module=”50145″ saved_tabs=”all” locked=”off” collapsed=”off” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.16″ text_font=”|300|||||||” text_font_size=”16px” text_line_height=”2em” ul_font=”||||||||” header_font=”||||||||” header_2_font=”Roboto|700|||||||” header_2_font_size=”45px” header_2_line_height=”1.2em” header_3_font=”||||||||” text_orientation=”center” max_width=”800px” max_width_last_edited=”off|desktop” module_alignment=”center” custom_margin=”|||” custom_margin_tablet=”|115px||” custom_margin_phone=”|-100px||” custom_margin_last_edited=”off|desktop” custom_padding=”|||” header_2_font_size_tablet=”35px” header_2_font_size_phone=”28px” header_2_font_size_last_edited=”on|phone” global_colors_info=”{}”]Our Partners
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}”][dsm_image_carousel gallery_ids=”51100,50951,50937,50935,50710,51120″ gallery_orderby=”rand” sizes=”medium” centered_slides=”on” speed=”2506″ autoplay_speed=”100″ space_between=”50″ infinite_smooth_scrolling=”on” touch_move=”on” slide_to_show_last_edited=”off|desktop” _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}”][/dsm_image_carousel][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ use_custom_gutter=”on” gutter_width=”2″ disabled_on=”on|on|on” _builder_version=”4.16″ max_width=”1440px” module_alignment=”center” custom_margin=”|||” custom_padding=”|||” use_custom_width=”on” custom_width_px=”1440px” disabled=”on” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_testimonial author=”Kip Ferguson” company_name=”Michigan Advertising” portrait_url=”https://ipvnetwork.com/wp-content/uploads/2019/09/20150524002__Kip_Ferguson_CMED-edited.jpg” quote_icon=”off” quote_icon_color=”#b5b5b5″ quote_icon_background_color=”#ffffff” disabled_on=”off|off|off” _builder_version=”4.16″ body_font=”||||||||” body_font_size=”16px” body_line_height=”2em” background_color=”#ffffff” custom_padding=”40px|30px|40px|30px|true|true” border_radii=”on|10px|10px|10px|10px” border_color_all_portrait=”#ffffff” box_shadow_style=”preset1″ box_shadow_blur=”70px” box_shadow_color=”rgba(110,130,208,0.18)” global_colors_info=”{}”]“Working with a virtual assistant was new for me. I tried two services and was already having trouble with the other one when I found Pepper. I did not have any problems with Pepper, in fact, they exceeded my expectations! Everything was handled nicely and timely. I know I will have more work for Pepper in the near future!”
[/et_pb_testimonial][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_testimonial author=”Kristen Luke” company_name=”Kaleido Creative Studio” portrait_url=”https://ipvnetwork.com/wp-content/uploads/2019/09/u1QB-FOH.jpg” quote_icon=”off” quote_icon_color=”#b5b5b5″ quote_icon_background_color=”#ffffff” _builder_version=”4.16″ body_font=”||||||||” body_font_size=”16px” body_line_height=”2em” background_color=”rgba(255,255,255,0.45)” custom_margin=”|||” custom_padding=”40px|30px|40px|30px|true|true” border_radii=”on|10px|10px|10px|10px” border_color_all_portrait=”#ffffff” box_shadow_style=”preset1″ box_shadow_blur=”50px” box_shadow_color=”rgba(110,130,208,0.18)” global_colors_info=”{}”]“I hired Pepper Virtual Assistants in the early days of my business to help with administrative tasks. I have been nothing but pleased with the company, and especially my personal VA. Even now that I have three employees, I still use Pepper to help with data entry and the management of my social media accounts. The quality of Pepper’s work has far surpassed my expectations. I would recommend them without question to anyone looking for a virtual assistant.”
[/et_pb_testimonial][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_testimonial author=”Nikki Striefler” company_name=”Glad.is” portrait_url=”https://ipvnetwork.com/wp-content/uploads/2019/09/Nikki_bio.jpg” quote_icon=”off” quote_icon_color=”#b5b5b5″ quote_icon_background_color=”#ffffff” _builder_version=”4.16″ body_font=”||||||||” body_font_size=”16px” body_line_height=”2em” background_color=”rgba(255,255,255,0.45)” custom_margin=”|||” custom_padding=”40px|30px|40px|30px|true|true” border_radii=”on|10px|10px|10px|10px” border_color_all_portrait=”#ffffff” box_shadow_style=”preset1″ box_shadow_blur=”50px” box_shadow_color=”rgba(110,130,208,0.18)” global_colors_info=”{}”]“wow, thanks guys, you ARE amazing at Pepper! You’ve handled everything I’ve thrown at you…professionally, and at record speed. (I really need to write you guys a linked in recco and do some other PR to show my thanks..!)”
[/et_pb_testimonial][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|desktop” prev_background_color=”#efefef” admin_label=”Footer” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_stops=”rgba(12,12,12,0.43) 0%|rgba(0,0,0,0.82) 100%” background_color_gradient_overlays_image=”on” background_color_gradient_start=”rgba(12,12,12,0.43)” background_color_gradient_end=”rgba(0,0,0,0.82)” background_image=”https://ipvnetwork.com/wp-content/uploads/2019/08/ipv-bg-footer.jpg” custom_padding=”10vw||2vw||false|false” custom_padding_tablet=”100px||25px||false|false” custom_padding_phone=”||||true” top_divider_style=”ramp2″ top_divider_height=”250px” top_divider_flip=”vertical” top_divider_height_tablet=”150px” top_divider_height_phone=”110px” top_divider_height_last_edited=”on|desktop” background_color_gradient_stops_tablet=”rgba(12,12,12,0.43) 0%|rgba(0,0,0,0.82) 100%” background_color_gradient_stops_phone=”rgba(12,12,12,0.43) 0%|rgba(0,0,0,0.82) 100%” global_module=”49844″ saved_tabs=”all” global_colors_info=”{}”][et_pb_row module_class=” et_pb_row_fullwidth” _builder_version=”4.16″ width=”89%” width_tablet=”80%” width_phone=”” width_last_edited=”on|desktop” max_width=”89%” max_width_tablet=”80%” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin_phone=”|||” custom_margin_last_edited=”off|desktop” custom_padding=”|||” make_fullwidth=”on” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_font=”||||||||” header_2_font=”Roboto|700|||||||” header_2_font_size=”67px” header_2_line_height=”1.4em” header_3_font=”Roboto|700||on|||||” header_3_text_align=”center” header_3_text_color=”#ffffff” header_3_font_size=”24px” header_3_letter_spacing=”5px” header_3_line_height=”2em” text_orientation=”center” background_layout=”dark” max_width=”850px” module_alignment=”center” custom_margin=”|||” custom_padding=”|||” text_font_size_last_edited=”off|desktop” header_2_font_size_tablet=”49px” header_2_font_size_phone=”39px” header_2_font_size_last_edited=”on|desktop” header_3_font_size_tablet=”16px” header_3_font_size_phone=”14px” header_3_font_size_last_edited=”on|phone” global_colors_info=”{}”]