Welcome to Acing Evil.  For our entire careers we have been introducing
                                                                              enterprises to best of class IT solutions... from computer time-sharing, to capacity planning
                                                                              and programming efficiencies, to the present threat, NETWORK SECURITY.  
                                                                               
                                                                              Over the years, we have witness just what it takes to deliver OUR CLIENTS
                                                                              the very best.  We make no bones about admitting that great products and service make
                                                                              for great sales performance.  But it is more than products and services... it is
                                                                              FOLLOW-THROUGH with SUPERIOR TECHNICAL SUPPORT.  
                                                                               
                                                                              From our origins in computer timesharing -- which
                                                                              WE CONSIDER the ultimate CLIENT/SERVER / ON DEMAND capability -- we find that enterprises such as yours are ONCE AGAIN
                                                                              looking to the cost-effective and technically superior ON DEMAND capabilities to solve your needs.  We know that
                                                                              is a result of two facts:  
                                                                              1) A lot of acquired software is never installed 
                                                                              2)  If installed, a lot of the software's capabilities are not realized because
                                                                              
                                                                                       a) either there is not the person-power
                                                                              on staff to assure this... or
                                                                                       b) the valued tech realized his/her
                                                                              value and left for another opportunity leaving the software on the shelf.
                                                                               
                                                                              Thirty years ago, we embraced the ON DEMAND model.  We knew from even
                                                                              our own selling of that uninstalled software that the ON DEMAND service model would return.  It was only a matter
                                                                              of time.  Today the circle is fully turned back to us. 
                                                                               
                                                                              As one might suspect from our name, we started introducing enterprises
                                                                              to network compliance services.  This we did.  Specifically, it was the PCI
                                                                              -- Payment Card Industry's -- compliance standards.  
                                                                               
                                                                              As we have expanded over the years, we considered several times whether the word
                                                                              "compliance" was limiting to the ON DEMAND network security services which we bring to you.  
                                                                               
                                                                              WE DO NOT ASK THAT QUESTION ANYMORE FOR A REMARKABLE TRANSFORMATION HAS OCCURRED
                                                                              ACROSS THE NETWORK SECURITY BOARD...  
                                                                              
                                                                              Enterprises have come to recognize that industry and government
                                                                              compliances are NOTHING compared to the inherent FIDUCIARY COMPLIANCE all responsible executive and it management has to safeguarding
                                                                              personal data be it financial, medical, insurance, financial, banking, or whatever.  
                                                                              TODAY, IT IS EVERY ETHICAL COMPANY'S MORAL OBLIGATION TO COMPLY WITH THE BEST
                                                                              OF BREED SECURITY SOLUTIONS TO PROTECT ITS DATA and ITS CUSTOMERS DATA.  
                                                                               
                                                                              In the end, the COMPLIANCE is INNER-DIRECTED
                                                                              by companies such as yours.  
                                                                               
                                                                              OUR GOAL IS TO SERVE THAT NEED WITH THE BEST OF BREED ON DEMAND SERVICES WHICH
                                                                              HAVE PASSED THE SCRUTINY OF OUR CAREERS in providing solutions and superior follow-on technical support... and the SCUTINY
                                                                              OF OUR TECHNICAL ADVISORS.
                                                                               
                                                                              Again, Welcome to Acing Evil... We anticipate helping you with YOUR
                                                                              INNER COMPLIANCE NEEDS for data security.  By working with us, we can address multiple disciplines within network security
                                                                              as a more cost effective price.