1:"$Sreact.fragment" 2:I[612,["874","static/chunks/874-866dfb8345ea763a.js","598","static/chunks/598-50062353ea8bad93.js","246","static/chunks/246-82feede0b50128e9.js","599","static/chunks/599-200ddf7bb293a0be.js","177","static/chunks/app/layout-2fe904c5b3aeb49d.js"],"Header"] 3:I[7555,[],""] 4:I[1295,[],""] 5:I[6874,["874","static/chunks/874-866dfb8345ea763a.js","682","static/chunks/app/services/security-solutions/cyber-security/page-f58ee3e44f777b1f.js"],""] 6:I[9665,[],"OutletBoundary"] 9:I[9665,[],"ViewportBoundary"] b:I[9665,[],"MetadataBoundary"] d:I[6614,[],""] :HL["/_next/static/css/2380f30211133ee6.css","style"] :HL["/_next/static/css/eec2e6111d317a42.css","style"] 0:{"P":null,"b":"0ra9lbhfz5ehrLRghlpLf","p":"","c":["","services","security-solutions","cyber-security"],"i":false,"f":[[["",{"children":["services",{"children":["security-solutions",{"children":["cyber-security",{"children":["__PAGE__",{}]}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/2380f30211133ee6.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","link","1",{"rel":"stylesheet","href":"/_next/static/css/eec2e6111d317a42.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"en","suppressHydrationWarning":true,"children":["$","body",null,{"className":"__variable_9a8899 __variable_069ab3 antialiased min-h-screen flex flex-col","children":[["$","$L2",null,{}],["$","main",null,{"className":"flex-1","children":["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]}]]}]}]]}],{"children":["services",["$","$1","c",{"children":[null,["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["security-solutions",["$","$1","c",{"children":[null,["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["cyber-security",["$","$1","c",{"children":[null,["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","div",null,{"className":"min-h-screen","children":[["$","div",null,{"className":"min-h-screen pt-32 pb-20","children":["$","div",null,{"className":"container max-w-5xl","children":[["$","div",null,{"style":{"--poly-roundness":"6px"},"className":"bg-[#262626]/50 transform-gpu font-medium text-foreground/50 backdrop-blur-xs font-mono text-sm inline-flex items-center justify-center px-3 h-8 border border-border [clip-path:polygon(var(--poly-roundness)_0,calc(100%_-_var(--poly-roundness))_0,100%_var(--poly-roundness),100%_calc(100%_-_var(--poly-roundness)),calc(100%_-_var(--poly-roundness))_100%,var(--poly-roundness)_100%,0_calc(100%_-_var(--poly-roundness)),0_var(--poly-roundness))] mb-6","children":[["$","span",null,{"style":{"--h":"12px","--hh":"1.5px"},"className":"absolute inline-block w-[var(--h)] top-[var(--hh)] left-[var(--hh)] h-[2px] -rotate-45 origin-top -translate-x-1/2 bg-border"}],["$","span",null,{"style":{"--h":"12px","--hh":"1.5px"},"className":"absolute w-[var(--h)] top-[var(--hh)] right-[var(--hh)] h-[2px] bg-border rotate-45 translate-x-1/2"}],["$","span",null,{"style":{"--h":"12px","--hh":"1.5px"},"className":"absolute w-[var(--h)] bottom-[var(--hh)] left-[var(--hh)] h-[2px] bg-border rotate-45 -translate-x-1/2"}],["$","span",null,{"style":{"--h":"12px","--hh":"1.5px"},"className":"absolute w-[var(--h)] bottom-[var(--hh)] right-[var(--hh)] h-[2px] bg-border -rotate-45 translate-x-1/2"}],["$","span",null,{"className":"inline-block size-2.5 rounded-full bg-primary mr-2 shadow-glow shadow-primary/50"}],"Services"]}],["$","p",null,{"className":"font-mono text-sm text-primary mb-2","children":"Advanced Protection"}],["$","h1",null,{"className":"text-4xl sm:text-5xl md:text-6xl font-sentient mb-6","children":"Cyber Security"}],["$","p",null,{"className":"font-mono text-base text-foreground/60 leading-relaxed max-w-3xl","children":"Enterprise-grade cybersecurity solutions to protect your organization from sophisticated cyber threats, data breaches, and malicious attacks. Our comprehensive approach ensures your digital assets remain secure 24/7 with cutting-edge technology and expert monitoring."}],["$","div",null,{"className":"mt-12 grid sm:grid-cols-2 lg:grid-cols-4 gap-4","children":[["$","div","0",{"className":"p-4 border border-border rounded-lg text-center","children":[["$","div",null,{"className":"w-10 h-10 mx-auto mb-3 rounded-full bg-primary/10 flex items-center justify-center text-primary","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield w-5 h-5","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","span",null,{"className":"font-mono text-xs text-foreground/80","children":"Reduce cyber attack risk by up to 95%"}]]}],["$","div","1",{"className":"p-4 border border-border rounded-lg text-center","children":[["$","div",null,{"className":"w-10 h-10 mx-auto mb-3 rounded-full bg-primary/10 flex items-center justify-center text-primary","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-zap w-5 h-5","children":[["$","path","1xq2db",{"d":"M4 14a1 1 0 0 1-.78-1.63l9.9-10.2a.5.5 0 0 1 .86.46l-1.92 6.02A1 1 0 0 0 13 10h7a1 1 0 0 1 .78 1.63l-9.9 10.2a.5.5 0 0 1-.86-.46l1.92-6.02A1 1 0 0 0 11 14z"}],"$undefined"]}]}],["$","span",null,{"className":"font-mono text-xs text-foreground/80","children":"24/7 threat monitoring and response"}]]}],["$","div","2",{"className":"p-4 border border-border rounded-lg text-center","children":[["$","div",null,{"className":"w-10 h-10 mx-auto mb-3 rounded-full bg-primary/10 flex items-center justify-center text-primary","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-users w-5 h-5","children":[["$","path","1yyitq",{"d":"M16 21v-2a4 4 0 0 0-4-4H6a4 4 0 0 0-4 4v2"}],["$","circle","nufk8",{"cx":"9","cy":"7","r":"4"}],["$","path","kshegd",{"d":"M22 21v-2a4 4 0 0 0-3-3.87"}],["$","path","1da9ce",{"d":"M16 3.13a4 4 0 0 1 0 7.75"}],"$undefined"]}]}],["$","span",null,{"className":"font-mono text-xs text-foreground/80","children":"Compliance with international standards"}]]}],["$","div","3",{"className":"p-4 border border-border rounded-lg text-center","children":[["$","div",null,{"className":"w-10 h-10 mx-auto mb-3 rounded-full bg-primary/10 flex items-center justify-center text-primary","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-clock w-5 h-5","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","polyline","68esgv",{"points":"12 6 12 12 16 14"}],"$undefined"]}]}],["$","span",null,{"className":"font-mono text-xs text-foreground/80","children":"Minimize downtime from security incidents"}]]}]]}],["$","div",null,{"className":"mt-16","children":[["$","h2",null,{"className":"text-xl font-sentient mb-8","children":"Our Comprehensive Solutions"}],["$","div",null,{"className":"grid sm:grid-cols-2 gap-6","children":[["$","div","0",{"className":"p-6 border border-border rounded-lg hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"w-12 h-12 rounded-lg bg-primary/10 flex items-center justify-center mb-4","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield w-6 h-6 text-primary","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","h3",null,{"className":"font-sentient text-lg mb-2","children":"Threat Detection & Response"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 leading-relaxed","children":"Real-time monitoring and automated response to security incidents using AI-powered threat intelligence and machine learning algorithms."}]]}],["$","div","1",{"className":"p-6 border border-border rounded-lg hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"w-12 h-12 rounded-lg bg-primary/10 flex items-center justify-center mb-4","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-bug w-6 h-6 text-primary","children":[["$","path","fmnt4t",{"d":"m8 2 1.88 1.88"}],["$","path","qol33r",{"d":"M14.12 3.88 16 2"}],["$","path","d7y7pr",{"d":"M9 7.13v-1a3.003 3.003 0 1 1 6 0v1"}],["$","path","xs1cw7",{"d":"M12 20c-3.3 0-6-2.7-6-6v-3a4 4 0 0 1 4-4h4a4 4 0 0 1 4 4v3c0 3.3-2.7 6-6 6"}],["$","path","1qisl0",{"d":"M12 20v-9"}],["$","path","32zzws",{"d":"M6.53 9C4.6 8.8 3 7.1 3 5"}],["$","path","82j7cp",{"d":"M6 13H2"}],["$","path","4p0ekp",{"d":"M3 21c0-2.1 1.7-3.9 3.8-4"}],["$","path","18gb23",{"d":"M20.97 5c0 2.1-1.6 3.8-3.5 4"}],["$","path","1jl80f",{"d":"M22 13h-4"}],["$","path","k3fwyw",{"d":"M17.2 17c2.1.1 3.8 1.9 3.8 4"}],"$undefined"]}]}],["$","h3",null,{"className":"font-sentient text-lg mb-2","children":"Vulnerability Assessment"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 leading-relaxed","children":"Comprehensive security audits and penetration testing to identify and remediate vulnerabilities before attackers exploit them."}]]}],["$","div","2",{"className":"p-6 border border-border rounded-lg hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"w-12 h-12 rounded-lg bg-primary/10 flex items-center justify-center mb-4","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-lock w-6 h-6 text-primary","children":[["$","rect","1w4ew1",{"width":"18","height":"11","x":"3","y":"11","rx":"2","ry":"2"}],["$","path","fwvmzm",{"d":"M7 11V7a5 5 0 0 1 10 0v4"}],"$undefined"]}]}],["$","h3",null,{"className":"font-sentient text-lg mb-2","children":"Endpoint Protection"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 leading-relaxed","children":"Advanced endpoint detection and response (EDR) solutions for all devices in your network with zero-day threat protection."}]]}],["$","div","3",{"className":"p-6 border border-border rounded-lg hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"w-12 h-12 rounded-lg bg-primary/10 flex items-center justify-center mb-4","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-triangle-alert w-6 h-6 text-primary","children":[["$","path","wmoenq",{"d":"m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3"}],["$","path","juzpu7",{"d":"M12 9v4"}],["$","path","p32p05",{"d":"M12 17h.01"}],"$undefined"]}]}],["$","h3",null,{"className":"font-sentient text-lg mb-2","children":"Incident Response"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 leading-relaxed","children":"24/7 security operations center (SOC) with rapid incident response and forensic analysis capabilities to minimize damage."}]]}],["$","div","4",{"className":"p-6 border border-border rounded-lg hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"w-12 h-12 rounded-lg bg-primary/10 flex items-center justify-center mb-4","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-file-search w-6 h-6 text-primary","children":[["$","path","tnqrlb",{"d":"M14 2v4a2 2 0 0 0 2 2h4"}],["$","path","ms7g94",{"d":"M4.268 21a2 2 0 0 0 1.727 1H18a2 2 0 0 0 2-2V7l-5-5H6a2 2 0 0 0-2 2v3"}],["$","path","1j6qii",{"d":"m9 18-1.5-1.5"}],["$","circle","ufru5t",{"cx":"5","cy":"14","r":"3"}],"$undefined"]}]}],["$","h3",null,{"className":"font-sentient text-lg mb-2","children":"Security Compliance"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 leading-relaxed","children":"Ensure compliance with ISO 27001, GDPR, HIPAA, PCI-DSS, SOC 2, and other regulatory requirements with automated reporting."}]]}],["$","div","5",{"className":"p-6 border border-border rounded-lg hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"w-12 h-12 rounded-lg bg-primary/10 flex items-center justify-center mb-4","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-refresh-cw w-6 h-6 text-primary","children":[["$","path","v9h5vc",{"d":"M3 12a9 9 0 0 1 9-9 9.75 9.75 0 0 1 6.74 2.74L21 8"}],["$","path","1q7to0",{"d":"M21 3v5h-5"}],["$","path","3uifl3",{"d":"M21 12a9 9 0 0 1-9 9 9.75 9.75 0 0 1-6.74-2.74L3 16"}],["$","path","1cv678",{"d":"M8 16H3v5"}],"$undefined"]}]}],["$","h3",null,{"className":"font-sentient text-lg mb-2","children":"Security Awareness Training"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 leading-relaxed","children":"Employee training programs to build a security-conscious culture and reduce human error risks through interactive modules."}]]}]]}]]}],["$","div",null,{"className":"mt-16 p-8 border border-border rounded-lg bg-foreground/5","children":[["$","h3",null,{"className":"text-lg font-sentient mb-3","children":"Ready to Secure Your Infrastructure?"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 mb-6","children":["Contact our experts today to discuss how our ","cyber security"," solutions can transform your business operations."]}],["$","$L5",null,{"href":"/contact","className":"inline-block border border-primary text-primary px-6 py-2 font-mono text-sm hover:bg-primary hover:text-background transition-colors","children":"[Get Free Consultation]"}]]}]]}]}],["$","div",null,{"className":"bg-foreground/5 py-20","children":["$","div",null,{"className":"container max-w-5xl","children":[["$","div",null,{"className":"text-center mb-12","children":[["$","div",null,{"style":{"--poly-roundness":"6px"},"className":"bg-[#262626]/50 transform-gpu font-medium text-foreground/50 backdrop-blur-xs font-mono text-sm inline-flex items-center justify-center px-3 h-8 border border-border [clip-path:polygon(var(--poly-roundness)_0,calc(100%_-_var(--poly-roundness))_0,100%_var(--poly-roundness),100%_calc(100%_-_var(--poly-roundness)),calc(100%_-_var(--poly-roundness))_100%,var(--poly-roundness)_100%,0_calc(100%_-_var(--poly-roundness)),0_var(--poly-roundness))] mb-4","children":[["$","span",null,{"style":{"--h":"12px","--hh":"1.5px"},"className":"absolute inline-block w-[var(--h)] top-[var(--hh)] left-[var(--hh)] h-[2px] -rotate-45 origin-top -translate-x-1/2 bg-border"}],["$","span",null,{"style":{"--h":"12px","--hh":"1.5px"},"className":"absolute w-[var(--h)] top-[var(--hh)] right-[var(--hh)] h-[2px] bg-border rotate-45 translate-x-1/2"}],["$","span",null,{"style":{"--h":"12px","--hh":"1.5px"},"className":"absolute w-[var(--h)] bottom-[var(--hh)] left-[var(--hh)] h-[2px] bg-border rotate-45 -translate-x-1/2"}],["$","span",null,{"style":{"--h":"12px","--hh":"1.5px"},"className":"absolute w-[var(--h)] bottom-[var(--hh)] right-[var(--hh)] h-[2px] bg-border -rotate-45 translate-x-1/2"}],["$","span",null,{"className":"inline-block size-2.5 rounded-full bg-primary mr-2 shadow-glow shadow-primary/50"}],"Advanced Services"]}],["$","h2",null,{"className":"text-3xl md:text-4xl font-sentient mb-4","children":["Comprehensive Security ",["$","i",null,{"className":"font-light","children":"Solutions"}]]}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 max-w-2xl mx-auto","children":"From network security to cloud protection, we offer end-to-end cybersecurity services tailored to your business needs"}]]}],["$","div",null,{"className":"grid md:grid-cols-3 gap-6","children":[["$","div","0",{"className":"p-6 border border-border rounded-lg bg-background hover:border-primary/50 transition-all hover:shadow-lg hover:shadow-primary/10","children":[["$","div",null,{"className":"w-14 h-14 rounded-lg bg-primary/10 flex items-center justify-center mb-4","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-eye w-7 h-7 text-primary","children":[["$","path","1nclc0",{"d":"M2.062 12.348a1 1 0 0 1 0-.696 10.75 10.75 0 0 1 19.876 0 1 1 0 0 1 0 .696 10.75 10.75 0 0 1-19.876 0"}],["$","circle","1v7zrd",{"cx":"12","cy":"12","r":"3"}],"$undefined"]}]}],["$","h3",null,{"className":"font-sentient text-xl mb-3","children":"Security Monitoring"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 mb-4 leading-relaxed","children":"Continuous surveillance of your IT infrastructure with SIEM integration and real-time alerting"}],["$","ul",null,{"className":"space-y-2","children":[["$","li","0",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"24/7 SOC monitoring"]}],["$","li","1",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"Log analysis"]}],["$","li","2",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"Behavioral analytics"]}],["$","li","3",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"Threat hunting"]}]]}]]}],["$","div","1",{"className":"p-6 border border-border rounded-lg bg-background hover:border-primary/50 transition-all hover:shadow-lg hover:shadow-primary/10","children":[["$","div",null,{"className":"w-14 h-14 rounded-lg bg-primary/10 flex items-center justify-center mb-4","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-database w-7 h-7 text-primary","children":[["$","ellipse","msslwz",{"cx":"12","cy":"5","rx":"9","ry":"3"}],["$","path","1wlel7",{"d":"M3 5V19A9 3 0 0 0 21 19V5"}],["$","path","mv7ke4",{"d":"M3 12A9 3 0 0 0 21 12"}],"$undefined"]}]}],["$","h3",null,{"className":"font-sentient text-xl mb-3","children":"Data Protection"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 mb-4 leading-relaxed","children":"Safeguard sensitive data with encryption, DLP solutions, and secure backup strategies"}],["$","ul",null,{"className":"space-y-2","children":[["$","li","0",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"Data encryption"]}],["$","li","1",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"Access control"]}],["$","li","2",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"Backup & recovery"]}],["$","li","3",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"Data loss prevention"]}]]}]]}],["$","div","2",{"className":"p-6 border border-border rounded-lg bg-background hover:border-primary/50 transition-all hover:shadow-lg hover:shadow-primary/10","children":[["$","div",null,{"className":"w-14 h-14 rounded-lg bg-primary/10 flex items-center justify-center mb-4","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-network w-7 h-7 text-primary","children":[["$","rect","4q2zg0",{"x":"16","y":"16","width":"6","height":"6","rx":"1"}],["$","rect","8cvhb9",{"x":"2","y":"16","width":"6","height":"6","rx":"1"}],["$","rect","1egb70",{"x":"9","y":"2","width":"6","height":"6","rx":"1"}],["$","path","1jsf9p",{"d":"M5 16v-3a1 1 0 0 1 1-1h12a1 1 0 0 1 1 1v3"}],["$","path","2874zd",{"d":"M12 12V8"}],"$undefined"]}]}],["$","h3",null,{"className":"font-sentient text-xl mb-3","children":"Network Security"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 mb-4 leading-relaxed","children":"Protect your network perimeter with firewalls, IDS/IPS, and secure network architecture"}],["$","ul",null,{"className":"space-y-2","children":[["$","li","0",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"Next-gen firewalls"]}],["$","li","1",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"VPN solutions"]}],["$","li","2",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"Network segmentation"]}],["$","li","3",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"DDoS protection"]}]]}]]}],["$","div","3",{"className":"p-6 border border-border rounded-lg bg-background hover:border-primary/50 transition-all hover:shadow-lg hover:shadow-primary/10","children":[["$","div",null,{"className":"w-14 h-14 rounded-lg bg-primary/10 flex items-center justify-center mb-4","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-server w-7 h-7 text-primary","children":[["$","rect","ngkwjq",{"width":"20","height":"8","x":"2","y":"2","rx":"2","ry":"2"}],["$","rect","iecqi9",{"width":"20","height":"8","x":"2","y":"14","rx":"2","ry":"2"}],["$","line","16zg32",{"x1":"6","x2":"6.01","y1":"6","y2":"6"}],["$","line","nzw8ys",{"x1":"6","x2":"6.01","y1":"18","y2":"18"}],"$undefined"]}]}],["$","h3",null,{"className":"font-sentient text-xl mb-3","children":"Application Security"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 mb-4 leading-relaxed","children":"Secure your applications throughout the development lifecycle with DevSecOps practices"}],["$","ul",null,{"className":"space-y-2","children":[["$","li","0",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"Code review"]}],["$","li","1",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"SAST/DAST testing"]}],["$","li","2",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"API security"]}],["$","li","3",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"Container security"]}]]}]]}],["$","div","4",{"className":"p-6 border border-border rounded-lg bg-background hover:border-primary/50 transition-all hover:shadow-lg hover:shadow-primary/10","children":[["$","div",null,{"className":"w-14 h-14 rounded-lg bg-primary/10 flex items-center justify-center mb-4","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-cloud w-7 h-7 text-primary","children":[["$","path","p7xjir",{"d":"M17.5 19H9a7 7 0 1 1 6.71-9h1.79a4.5 4.5 0 1 1 0 9Z"}],"$undefined"]}]}],["$","h3",null,{"className":"font-sentient text-xl mb-3","children":"Cloud Security"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 mb-4 leading-relaxed","children":"Comprehensive cloud security for AWS, Azure, and GCP with CSPM and CWPP solutions"}],["$","ul",null,{"className":"space-y-2","children":[["$","li","0",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"Cloud posture management"]}],["$","li","1",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"Identity & access"]}],["$","li","2",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"Workload protection"]}],["$","li","3",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"Compliance monitoring"]}]]}]]}],["$","div","5",{"className":"p-6 border border-border rounded-lg bg-background hover:border-primary/50 transition-all hover:shadow-lg hover:shadow-primary/10","children":[["$","div",null,{"className":"w-14 h-14 rounded-lg bg-primary/10 flex items-center justify-center mb-4","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-smartphone w-7 h-7 text-primary","children":[["$","rect","1yt0o3",{"width":"14","height":"20","x":"5","y":"2","rx":"2","ry":"2"}],["$","path","mhygvu",{"d":"M12 18h.01"}],"$undefined"]}]}],["$","h3",null,{"className":"font-sentient text-xl mb-3","children":"Mobile Security"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 mb-4 leading-relaxed","children":"Protect mobile devices and applications with MDM, MAM, and mobile threat defense"}],["$","ul",null,{"className":"space-y-2","children":[["$","li","0",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"Device management"]}],["$","li","1",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"App security"]}],["$","li","2",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"Mobile threat defense"]}],["$","li","3",{"className":"flex items-center gap-2 font-mono text-xs text-foreground/70","children":[["$","div",null,{"className":"w-1.5 h-1.5 rounded-full bg-primary"}],"BYOD policies"]}]]}]]}]]}]]}]}],["$","div",null,{"className":"py-20","children":["$","div",null,{"className":"container max-w-5xl","children":[["$","div",null,{"className":"text-center mb-12","children":[["$","div",null,{"style":{"--poly-roundness":"6px"},"className":"bg-[#262626]/50 transform-gpu font-medium text-foreground/50 backdrop-blur-xs font-mono text-sm inline-flex items-center justify-center px-3 h-8 border border-border [clip-path:polygon(var(--poly-roundness)_0,calc(100%_-_var(--poly-roundness))_0,100%_var(--poly-roundness),100%_calc(100%_-_var(--poly-roundness)),calc(100%_-_var(--poly-roundness))_100%,var(--poly-roundness)_100%,0_calc(100%_-_var(--poly-roundness)),0_var(--poly-roundness))] mb-4","children":[["$","span",null,{"style":{"--h":"12px","--hh":"1.5px"},"className":"absolute inline-block w-[var(--h)] top-[var(--hh)] left-[var(--hh)] h-[2px] -rotate-45 origin-top -translate-x-1/2 bg-border"}],["$","span",null,{"style":{"--h":"12px","--hh":"1.5px"},"className":"absolute w-[var(--h)] top-[var(--hh)] right-[var(--hh)] h-[2px] bg-border rotate-45 translate-x-1/2"}],["$","span",null,{"style":{"--h":"12px","--hh":"1.5px"},"className":"absolute w-[var(--h)] bottom-[var(--hh)] left-[var(--hh)] h-[2px] bg-border rotate-45 -translate-x-1/2"}],["$","span",null,{"style":{"--h":"12px","--hh":"1.5px"},"className":"absolute w-[var(--h)] bottom-[var(--hh)] right-[var(--hh)] h-[2px] bg-border -rotate-45 translate-x-1/2"}],["$","span",null,{"className":"inline-block size-2.5 rounded-full bg-primary mr-2 shadow-glow shadow-primary/50"}],"Our Approach"]}],["$","h2",null,{"className":"text-3xl md:text-4xl font-sentient mb-4","children":["Multi-Layered Security ",["$","i",null,{"className":"font-light","children":"Framework"}]]}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 max-w-2xl mx-auto","children":"We implement defense-in-depth strategies to ensure comprehensive protection at every level"}]]}],["$","div",null,{"className":"grid md:grid-cols-2 gap-8","children":[["$","div","0",{"className":"p-8 border border-border rounded-lg hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"flex items-start gap-4 mb-4","children":[["$","span",null,{"className":"text-5xl font-sentient text-primary/20","children":"01"}],["$","div",null,{"children":[["$","h3",null,{"className":"font-sentient text-2xl mb-2","children":"Assessment & Planning"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 leading-relaxed","children":"Comprehensive security audit and risk assessment to identify vulnerabilities and create a tailored security roadmap"}]]}]]}],["$","div",null,{"className":"mt-6 pt-6 border-t border-border","children":[["$","p",null,{"className":"font-mono text-xs text-foreground/50 mb-3 uppercase tracking-wider","children":"Key Deliverables"}],["$","div",null,{"className":"grid grid-cols-2 gap-2","children":[["$","div","0",{"className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-1 h-1 rounded-full bg-primary"}],["$","span",null,{"className":"font-mono text-xs text-foreground/70","children":"Security audit report"}]]}],["$","div","1",{"className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-1 h-1 rounded-full bg-primary"}],["$","span",null,{"className":"font-mono text-xs text-foreground/70","children":"Risk assessment"}]]}],["$","div","2",{"className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-1 h-1 rounded-full bg-primary"}],["$","span",null,{"className":"font-mono text-xs text-foreground/70","children":"Security roadmap"}]]}],["$","div","3",{"className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-1 h-1 rounded-full bg-primary"}],["$","span",null,{"className":"font-mono text-xs text-foreground/70","children":"Compliance gap analysis"}]]}]]}]]}]]}],["$","div","1",{"className":"p-8 border border-border rounded-lg hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"flex items-start gap-4 mb-4","children":[["$","span",null,{"className":"text-5xl font-sentient text-primary/20","children":"02"}],["$","div",null,{"children":[["$","h3",null,{"className":"font-sentient text-2xl mb-2","children":"Implementation"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 leading-relaxed","children":"Deploy advanced security solutions including firewalls, EDR, SIEM, and other protective measures"}]]}]]}],["$","div",null,{"className":"mt-6 pt-6 border-t border-border","children":[["$","p",null,{"className":"font-mono text-xs text-foreground/50 mb-3 uppercase tracking-wider","children":"Key Deliverables"}],["$","div",null,{"className":"grid grid-cols-2 gap-2","children":[["$","div","0",{"className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-1 h-1 rounded-full bg-primary"}],["$","span",null,{"className":"font-mono text-xs text-foreground/70","children":"Security tools deployment"}]]}],["$","div","1",{"className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-1 h-1 rounded-full bg-primary"}],["$","span",null,{"className":"font-mono text-xs text-foreground/70","children":"Network hardening"}]]}],["$","div","2",{"className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-1 h-1 rounded-full bg-primary"}],["$","span",null,{"className":"font-mono text-xs text-foreground/70","children":"Access controls"}]]}],["$","div","3",{"className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-1 h-1 rounded-full bg-primary"}],["$","span",null,{"className":"font-mono text-xs text-foreground/70","children":"Encryption setup"}]]}]]}]]}]]}],["$","div","2",{"className":"p-8 border border-border rounded-lg hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"flex items-start gap-4 mb-4","children":[["$","span",null,{"className":"text-5xl font-sentient text-primary/20","children":"03"}],["$","div",null,{"children":[["$","h3",null,{"className":"font-sentient text-2xl mb-2","children":"Monitoring & Response"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 leading-relaxed","children":"24/7 security monitoring with rapid incident response and continuous threat intelligence updates"}]]}]]}],["$","div",null,{"className":"mt-6 pt-6 border-t border-border","children":[["$","p",null,{"className":"font-mono text-xs text-foreground/50 mb-3 uppercase tracking-wider","children":"Key Deliverables"}],["$","div",null,{"className":"grid grid-cols-2 gap-2","children":[["$","div","0",{"className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-1 h-1 rounded-full bg-primary"}],["$","span",null,{"className":"font-mono text-xs text-foreground/70","children":"SOC monitoring"}]]}],["$","div","1",{"className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-1 h-1 rounded-full bg-primary"}],["$","span",null,{"className":"font-mono text-xs text-foreground/70","children":"Incident response"}]]}],["$","div","2",{"className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-1 h-1 rounded-full bg-primary"}],["$","span",null,{"className":"font-mono text-xs text-foreground/70","children":"Threat intelligence"}]]}],["$","div","3",{"className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-1 h-1 rounded-full bg-primary"}],["$","span",null,{"className":"font-mono text-xs text-foreground/70","children":"Security alerts"}]]}]]}]]}]]}],["$","div","3",{"className":"p-8 border border-border rounded-lg hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"flex items-start gap-4 mb-4","children":[["$","span",null,{"className":"text-5xl font-sentient text-primary/20","children":"04"}],["$","div",null,{"children":[["$","h3",null,{"className":"font-sentient text-2xl mb-2","children":"Optimization & Training"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 leading-relaxed","children":"Continuous improvement of security posture with regular updates, testing, and employee training programs"}]]}]]}],["$","div",null,{"className":"mt-6 pt-6 border-t border-border","children":[["$","p",null,{"className":"font-mono text-xs text-foreground/50 mb-3 uppercase tracking-wider","children":"Key Deliverables"}],["$","div",null,{"className":"grid grid-cols-2 gap-2","children":[["$","div","0",{"className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-1 h-1 rounded-full bg-primary"}],["$","span",null,{"className":"font-mono text-xs text-foreground/70","children":"Security updates"}]]}],["$","div","1",{"className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-1 h-1 rounded-full bg-primary"}],["$","span",null,{"className":"font-mono text-xs text-foreground/70","children":"Penetration testing"}]]}],["$","div","2",{"className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-1 h-1 rounded-full bg-primary"}],["$","span",null,{"className":"font-mono text-xs text-foreground/70","children":"Staff training"}]]}],["$","div","3",{"className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-1 h-1 rounded-full bg-primary"}],["$","span",null,{"className":"font-mono text-xs text-foreground/70","children":"Policy refinement"}]]}]]}]]}]]}]]}]]}]}],["$","div",null,{"className":"bg-foreground/5 py-20","children":["$","div",null,{"className":"container max-w-5xl","children":[["$","div",null,{"className":"text-center mb-12","children":[["$","div",null,{"style":{"--poly-roundness":"6px"},"className":"bg-[#262626]/50 transform-gpu font-medium text-foreground/50 backdrop-blur-xs font-mono text-sm inline-flex items-center justify-center px-3 h-8 border border-border [clip-path:polygon(var(--poly-roundness)_0,calc(100%_-_var(--poly-roundness))_0,100%_var(--poly-roundness),100%_calc(100%_-_var(--poly-roundness)),calc(100%_-_var(--poly-roundness))_100%,var(--poly-roundness)_100%,0_calc(100%_-_var(--poly-roundness)),0_var(--poly-roundness))] mb-4","children":[["$","span",null,{"style":{"--h":"12px","--hh":"1.5px"},"className":"absolute inline-block w-[var(--h)] top-[var(--hh)] left-[var(--hh)] h-[2px] -rotate-45 origin-top -translate-x-1/2 bg-border"}],["$","span",null,{"style":{"--h":"12px","--hh":"1.5px"},"className":"absolute w-[var(--h)] top-[var(--hh)] right-[var(--hh)] h-[2px] bg-border rotate-45 translate-x-1/2"}],["$","span",null,{"style":{"--h":"12px","--hh":"1.5px"},"className":"absolute w-[var(--h)] bottom-[var(--hh)] left-[var(--hh)] h-[2px] bg-border rotate-45 -translate-x-1/2"}],["$","span",null,{"style":{"--h":"12px","--hh":"1.5px"},"className":"absolute w-[var(--h)] bottom-[var(--hh)] right-[var(--hh)] h-[2px] bg-border -rotate-45 translate-x-1/2"}],["$","span",null,{"className":"inline-block size-2.5 rounded-full bg-primary mr-2 shadow-glow shadow-primary/50"}],"Industry Recognition"]}],["$","h2",null,{"className":"text-3xl md:text-4xl font-sentient mb-4","children":["Certified & ",["$","i",null,{"className":"font-light","children":"Trusted"}]]}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 max-w-2xl mx-auto","children":"Our team holds industry-leading certifications and follows best practices"}]]}],["$","div",null,{"className":"grid sm:grid-cols-2 lg:grid-cols-4 gap-6","children":[["$","div","0",{"className":"p-6 border border-border rounded-lg bg-background text-center hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"w-16 h-16 mx-auto mb-4 rounded-full bg-primary/10 flex items-center justify-center","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield w-8 h-8 text-primary","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","h4",null,{"className":"font-sentient text-lg mb-2","children":"ISO 27001"}],["$","p",null,{"className":"font-mono text-xs text-foreground/60","children":"Information Security Management"}]]}],["$","div","1",{"className":"p-6 border border-border rounded-lg bg-background text-center hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"w-16 h-16 mx-auto mb-4 rounded-full bg-primary/10 flex items-center justify-center","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield w-8 h-8 text-primary","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","h4",null,{"className":"font-sentient text-lg mb-2","children":"SOC 2 Type II"}],["$","p",null,{"className":"font-mono text-xs text-foreground/60","children":"Service Organization Control"}]]}],["$","div","2",{"className":"p-6 border border-border rounded-lg bg-background text-center hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"w-16 h-16 mx-auto mb-4 rounded-full bg-primary/10 flex items-center justify-center","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield w-8 h-8 text-primary","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","h4",null,{"className":"font-sentient text-lg mb-2","children":"CISSP"}],["$","p",null,{"className":"font-mono text-xs text-foreground/60","children":"Certified Information Systems Security Professional"}]]}],["$","div","3",{"className":"p-6 border border-border rounded-lg bg-background text-center hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"w-16 h-16 mx-auto mb-4 rounded-full bg-primary/10 flex items-center justify-center","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield w-8 h-8 text-primary","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","h4",null,{"className":"font-sentient text-lg mb-2","children":"CEH"}],["$","p",null,{"className":"font-mono text-xs text-foreground/60","children":"Certified Ethical Hacker"}]]}],["$","div","4",{"className":"p-6 border border-border rounded-lg bg-background text-center hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"w-16 h-16 mx-auto mb-4 rounded-full bg-primary/10 flex items-center justify-center","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield w-8 h-8 text-primary","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","h4",null,{"className":"font-sentient text-lg mb-2","children":"CISM"}],["$","p",null,{"className":"font-mono text-xs text-foreground/60","children":"Certified Information Security Manager"}]]}],["$","div","5",{"className":"p-6 border border-border rounded-lg bg-background text-center hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"w-16 h-16 mx-auto mb-4 rounded-full bg-primary/10 flex items-center justify-center","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield w-8 h-8 text-primary","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","h4",null,{"className":"font-sentient text-lg mb-2","children":"CompTIA Security+"}],["$","p",null,{"className":"font-mono text-xs text-foreground/60","children":"Security Fundamentals"}]]}],["$","div","6",{"className":"p-6 border border-border rounded-lg bg-background text-center hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"w-16 h-16 mx-auto mb-4 rounded-full bg-primary/10 flex items-center justify-center","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield w-8 h-8 text-primary","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","h4",null,{"className":"font-sentient text-lg mb-2","children":"OSCP"}],["$","p",null,{"className":"font-mono text-xs text-foreground/60","children":"Offensive Security Certified Professional"}]]}],["$","div","7",{"className":"p-6 border border-border rounded-lg bg-background text-center hover:border-primary/50 transition-colors","children":[["$","div",null,{"className":"w-16 h-16 mx-auto mb-4 rounded-full bg-primary/10 flex items-center justify-center","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield w-8 h-8 text-primary","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","h4",null,{"className":"font-sentient text-lg mb-2","children":"GIAC"}],["$","p",null,{"className":"font-mono text-xs text-foreground/60","children":"Global Information Assurance Certification"}]]}]]}]]}]}],["$","div",null,{"className":"py-20","children":["$","div",null,{"className":"container max-w-5xl","children":["$","div",null,{"className":"grid sm:grid-cols-2 lg:grid-cols-4 gap-8","children":[["$","div","0",{"className":"text-center","children":[["$","div",null,{"className":"text-5xl font-sentient text-primary mb-2","children":"500+"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60","children":"Protected Organizations"}]]}],["$","div","1",{"className":"text-center","children":[["$","div",null,{"className":"text-5xl font-sentient text-primary mb-2","children":"99.9%"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60","children":"Threat Detection Rate"}]]}],["$","div","2",{"className":"text-center","children":[["$","div",null,{"className":"text-5xl font-sentient text-primary mb-2","children":"24/7"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60","children":"Security Monitoring"}]]}],["$","div","3",{"className":"text-center","children":[["$","div",null,{"className":"text-5xl font-sentient text-primary mb-2","children":"<15min"}],["$","p",null,{"className":"font-mono text-sm text-foreground/60","children":"Average Response Time"}]]}]]}]}]}],["$","div",null,{"className":"bg-foreground/5 py-20","children":["$","div",null,{"className":"container max-w-5xl","children":["$","div",null,{"className":"p-12 border border-border rounded-lg bg-background text-center","children":[["$","h3",null,{"className":"text-3xl font-sentient mb-4","children":["Ready to Strengthen Your ",["$","i",null,{"className":"font-light","children":"Cyber Defenses"}],"?"]}],["$","p",null,{"className":"font-mono text-sm text-foreground/60 mb-8 max-w-2xl mx-auto","children":"Don't wait for a breach to happen. Our cybersecurity experts are ready to assess your security posture and implement robust protection measures tailored to your organization."}],["$","div",null,{"className":"flex flex-wrap gap-4 justify-center","children":[["$","$L5",null,{"href":"/contact","className":"inline-block bg-primary text-background px-8 py-3 font-mono text-sm hover:bg-primary/90 transition-colors","children":"[Schedule Security Assessment]"}],["$","$L5",null,{"href":"/work-gallery","className":"inline-block border border-primary text-primary px-8 py-3 font-mono text-sm hover:bg-primary hover:text-background transition-colors","children":"[View Case Studies]"}]]}]]}]}]}]]}],"$undefined",null,["$","$L6",null,{"children":["$L7","$L8",null]}]]}],{},null,false]},null,false]},null,false]},null,false]},null,false],["$","$1","h",{"children":[null,["$","$1","QaILyPdda-cuTOUddqVb_",{"children":[["$","$L9",null,{"children":"$La"}],null]}],["$","$Lb",null,{"children":"$Lc"}]]}],false]],"m":"$undefined","G":["$d","$undefined"],"s":false,"S":true} a:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] 7:null 8:null c:[["$","title","0",{"children":"IT-INNOVATORSS "}],["$","meta","1",{"name":"description","content":"Innovative IT Solutions for Your Business Growth"}],["$","link","2",{"rel":"icon","href":"/favicon.ico","type":"image/x-icon","sizes":"16x16"}]]