1:"$Sreact.fragment" 2:I[5500,["/_next/static/chunks/e9233006304db403.js"],"Image"] 10:I[22016,["/_next/static/chunks/e9233006304db403.js"],""] 11:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/7340adf74ff47ec0.js"],"OutletBoundary"] 12:"$Sreact.suspense" 0:{"buildId":"1_7GfoAioU3NaHecXPaeH","rsc":["$","$1","c",{"children":[["$","main",null,{"className":"w-full overflow-x-hidden","children":[["$","section",null,{"className":"relative bg-[#081020] py-36 overflow-hidden","children":[["$","div",null,{"className":"absolute inset-y-0 right-0 w-[42%]","children":[["$","$L2",null,{"src":"/images/editorial-bg.webp","alt":"Cybersecurity operations center","fill":true,"className":"object-cover","priority":true}],["$","div",null,{"className":"absolute inset-0 bg-gradient-to-l from-[#081020]/20 via-[#081020]/60 to-[#081020]"}]]}],["$","div",null,{"className":"relative mx-auto max-w-5xl px-6","children":[["$","p",null,{"className":"text-xs tracking-[0.3em] text-blue-400 uppercase","children":"About the Company"}],["$","h1",null,{"className":"mt-8 text-4xl md:text-5xl font-semibold text-white leading-tight max-w-3xl","children":["Engineering secure systems",["$","br",null,{}],"for mission-critical operations."]}],["$","p",null,{"className":"mt-10 max-w-3xl text-lg text-slate-300 leading-relaxed","children":"Simplified Datahub Solutions delivers enterprise cybersecurity, infrastructure, and ICT services for organizations that prioritize reliability, governance, and long-term operational resilience."}]]}]]}],["$","section",null,{"className":"bg-[#0B1730] py-32","children":["$","div",null,{"className":"mx-auto max-w-6xl px-6","children":[["$","h2",null,{"className":"text-2xl font-semibold text-white","children":"Core Capabilities"}],["$","div",null,{"className":"mt-20 space-y-20 border-l border-white/10 pl-14","children":[["$","div","Cybersecurity",{"className":"relative","children":[["$","span",null,{"className":"absolute -left-[31px] top-2 h-3 w-3 rounded-full bg-blue-500"}],["$","h3",null,{"className":"text-xl font-medium text-white","children":"Cybersecurity"}],["$","p",null,{"className":"mt-4 max-w-3xl text-slate-300 leading-relaxed","children":"Layered controls designed to protect networks, endpoints, applications, and data against evolving threats."}],["$","ul",null,{"className":"mt-6 space-y-2 text-slate-300","children":[["$","li","Network & Endpoint Security",{"className":"flex items-start gap-3","children":[["$","span",null,{"className":"mt-2 h-1.5 w-1.5 rounded-full bg-blue-400"}],["$","span",null,{"children":"Network & Endpoint Security"}]]}],["$","li","Cloud & Identity Security",{"className":"flex items-start gap-3","children":[["$","span",null,{"className":"mt-2 h-1.5 w-1.5 rounded-full bg-blue-400"}],["$","span",null,{"children":"Cloud & Identity Security"}]]}],["$","li","Governance & Compliance",{"className":"flex items-start gap-3","children":[["$","span",null,{"className":"mt-2 h-1.5 w-1.5 rounded-full bg-blue-400"}],["$","span",null,{"children":"Governance & Compliance"}]]}]]}],["$","div",null,{"className":"mt-14 relative aspect-[16/7] rounded-2xl overflow-hidden border border-white/10","children":[["$","$L2",null,{"src":"/images/architecture.webp","alt":"Enterprise IT architecture overview","fill":true,"className":"object-cover","priority":true}],["$","div",null,{"className":"absolute inset-0 bg-gradient-to-t from-[#0B1730]/60 via-transparent to-transparent"}]]}]]}],["$","div","Infrastructure",{"className":"relative","children":[["$","span",null,{"className":"absolute -left-[31px] top-2 h-3 w-3 rounded-full bg-blue-500"}],["$","h3",null,{"className":"text-xl font-medium text-white","children":"Infrastructure"}],["$","p",null,{"className":"mt-4 max-w-3xl text-slate-300 leading-relaxed","children":"Design and deployment of resilient server, storage, virtualization, and backup environments."}],"$undefined",false]}],["$","div","Professional & Consultancy",{"className":"relative","children":[["$","span",null,{"className":"absolute -left-[31px] top-2 h-3 w-3 rounded-full bg-blue-500"}],["$","h3",null,{"className":"text-xl font-medium text-white","children":"Professional & Consultancy"}],["$","p",null,{"className":"mt-4 max-w-3xl text-slate-300 leading-relaxed","children":"Advisory services aligned with governance, compliance, and operational continuity."}],"$undefined",false]}]]}]]}]}],"$L3","$L4","$L5","$L6","$L7","$L8","$L9"]}],null,"$La"]}],"loading":null,"isPartial":false} 3:["$","section",null,{"className":"bg-[#0E1627] py-28","children":["$","div",null,{"className":"mx-auto max-w-6xl px-6","children":[["$","h2",null,{"className":"text-2xl font-semibold text-white","children":"Our Engineering Principles"}],["$","div",null,{"className":"mt-14 grid grid-cols-1 md:grid-cols-3 gap-14","children":[["$","div",null,{"children":[["$","h3",null,{"className":"text-lg font-medium text-white","children":"Security-First Architecture"}],["$","p",null,{"className":"mt-4 text-sm leading-relaxed text-slate-300","children":"Security controls, access models, and monitoring are designed into systems from inception — not retrofitted after deployment."}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-lg font-medium text-white","children":"Operationally Viable Design"}],["$","p",null,{"className":"mt-4 text-sm leading-relaxed text-slate-300","children":"We design systems that can be realistically operated, maintained, audited, and supported over their full lifecycle."}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-lg font-medium text-white","children":"Governance by Default"}],["$","p",null,{"className":"mt-4 text-sm leading-relaxed text-slate-300","children":"Documentation, change control, and accountability are treated as engineering requirements — not administrative afterthoughts."}]]}]]}]]}]}] 4:["$","section",null,{"className":"bg-gradient-to-b from-[#0C1424] to-[#0E1B34] py-28","children":["$","div",null,{"className":"mx-auto max-w-7xl px-6 grid md:grid-cols-[2fr_3fr] gap-16 items-start","children":[["$","div",null,{"children":[["$","h2",null,{"className":"text-2xl font-semibold text-white","children":"Operating Model"}],["$","p",null,{"className":"mt-6 text-slate-300 leading-relaxed max-w-md","children":"Our delivery model is built on structured assessment, security-first design, controlled implementation, and SLA-driven operational support."}],["$","ul",null,{"className":"mt-8 space-y-3 text-slate-300 max-w-md","children":[["$","li",null,{"children":"• Pre-implementation risk assessment"}],["$","li",null,{"children":"• Standards-aligned architecture design"}],["$","li",null,{"children":"• Controlled change & documentation"}],["$","li",null,{"children":"• Ongoing monitoring and accountability"}]]}]]}],["$","div",null,{"className":"border-l border-white/10 pl-10","children":["$","svg",null,{"viewBox":"0 0 1200 700","className":"w-full h-auto","xmlns":"http://www.w3.org/2000/svg","children":[["$","defs",null,{"children":["$","linearGradient",null,{"id":"panel","x1":"0","y1":"0","x2":"1","y2":"1","children":[["$","stop",null,{"offset":"0%","stopColor":"#1E3A8A"}],["$","stop",null,{"offset":"100%","stopColor":"#0B1530"}]]}]}],["$","text",null,{"x":"600","y":"60","textAnchor":"middle","fill":"#FFFFFF","fontSize":"34","fontWeight":"600","children":"Enterprise IT Operating Model"}],[["$","g","Assessment",{"children":[["$","rect",null,{"x":"120","y":140,"rx":"16","ry":"16","width":"420","height":"80","fill":"url(#panel)","stroke":"rgba(255,255,255,0.15)"}],["$","text",null,{"x":"160","y":172,"fill":"#FFFFFF","fontSize":"20","fontWeight":"600","children":"Assessment"}],["$","text",null,{"x":"160","y":196,"fill":"#CBD5E1","fontSize":"14","children":"Pre-implementation risk assessment"}],["$","line",null,{"x1":"330","y1":220,"x2":"330","y2":250,"stroke":"rgba(255,255,255,0.3)","strokeWidth":"2","markerEnd":"url(#arrow)"}]]}],["$","g","System Design",{"children":[["$","rect",null,{"x":"120","y":250,"rx":"16","ry":"16","width":"420","height":"80","fill":"url(#panel)","stroke":"rgba(255,255,255,0.15)"}],["$","text",null,{"x":"160","y":282,"fill":"#FFFFFF","fontSize":"20","fontWeight":"600","children":"System Design"}],["$","text",null,{"x":"160","y":306,"fill":"#CBD5E1","fontSize":"14","children":"Security-first architecture design"}],["$","line",null,{"x1":"330","y1":330,"x2":"330","y2":360,"stroke":"rgba(255,255,255,0.3)","strokeWidth":"2","markerEnd":"url(#arrow)"}]]}],["$","g","Implementation",{"children":[["$","rect",null,{"x":"120","y":360,"rx":"16","ry":"16","width":"420","height":"80","fill":"url(#panel)","stroke":"rgba(255,255,255,0.15)"}],["$","text",null,{"x":"160","y":392,"fill":"#FFFFFF","fontSize":"20","fontWeight":"600","children":"Implementation"}],["$","text",null,{"x":"160","y":416,"fill":"#CBD5E1","fontSize":"14","children":"Controlled deployment & change mgmt"}],["$","line",null,{"x1":"330","y1":440,"x2":"330","y2":470,"stroke":"rgba(255,255,255,0.3)","strokeWidth":"2","markerEnd":"url(#arrow)"}]]}],["$","g","Operation & Support",{"children":[["$","rect",null,{"x":"120","y":470,"rx":"16","ry":"16","width":"420","height":"80","fill":"url(#panel)","stroke":"rgba(255,255,255,0.15)"}],["$","text",null,{"x":"160","y":502,"fill":"#FFFFFF","fontSize":"20","fontWeight":"600","children":"Operation & Support"}],["$","text",null,{"x":"160","y":526,"fill":"#CBD5E1","fontSize":"14","children":"Monitoring & SLA-driven support"}],false]}]],[["$","g","Risk Assessment",{"children":[["$","rect",null,{"x":"700","y":160,"rx":"14","ry":"14","width":"380","height":"70","fill":"rgba(255,255,255,0.04)","stroke":"rgba(255,255,255,0.12)"}],["$","text",null,{"x":"730","y":190,"fill":"#FFFFFF","fontSize":"18","fontWeight":"500","children":"Risk Assessment"}],["$","text",null,{"x":"730","y":212,"fill":"#94A3B8","fontSize":"13","children":"Identify and mitigate risks"}],["$","line",null,{"x1":"540","y1":195,"x2":"700","y2":195,"stroke":"rgba(255,255,255,0.25)","strokeWidth":"2","markerEnd":"url(#arrow)"}]]}],["$","g","Security Alignment",{"children":[["$","rect",null,{"x":"700","y":260,"rx":"14","ry":"14","width":"380","height":"70","fill":"rgba(255,255,255,0.04)","stroke":"rgba(255,255,255,0.12)"}],["$","text",null,{"x":"730","y":290,"fill":"#FFFFFF","fontSize":"18","fontWeight":"500","children":"Security Alignment"}],["$","text",null,{"x":"730","y":312,"fill":"#94A3B8","fontSize":"13","children":"Industry standards & best practices"}],["$","line",null,{"x1":"540","y1":295,"x2":"700","y2":295,"stroke":"rgba(255,255,255,0.25)","strokeWidth":"2","markerEnd":"url(#arrow)"}]]}],["$","g","Change Control",{"children":[["$","rect",null,{"x":"700","y":360,"rx":"14","ry":"14","width":"380","height":"70","fill":"rgba(255,255,255,0.04)","stroke":"rgba(255,255,255,0.12)"}],"$Lb","$Lc","$Ld"]}],"$Le"],"$Lf"]}]}]]}]}] 5:["$","section",null,{"className":"bg-[#0C1424] py-28","children":["$","div",null,{"className":"mx-auto max-w-6xl px-6","children":[["$","h2",null,{"className":"text-2xl font-semibold text-white","children":"Engagement Scope & Delivery Assurance"}],["$","div",null,{"className":"mt-14 grid grid-cols-1 md:grid-cols-2 gap-14 items-center","children":[["$","div",null,{"className":"space-y-6 text-slate-300 leading-relaxed","children":[["$","p",null,{"children":"Client engagements typically begin with a structured assessment of the existing environment, including architecture, security posture, operational processes, and risk exposure."}],["$","p",null,{"children":"All solutions are designed with defined scope, documented architecture, implementation controls, and clear operational ownership to ensure long-term maintainability and audit readiness."}],["$","p",null,{"children":"Delivery is governed through agreed milestones, change control procedures, and acceptance criteria aligned with enterprise ICT practices."}]]}],["$","div",null,{"className":"relative aspect-[4/3] rounded-2xl overflow-hidden border border-white/10","children":[["$","$L2",null,{"src":"/images/engagement-process.webp","alt":"Structured enterprise ICT engagement and delivery process","fill":true,"className":"object-cover","priority":false}],["$","div",null,{"className":"absolute inset-0 bg-gradient-to-t from-[#0C1424]/50 via-transparent to-transparent"}]]}]]}]]}]}] 6:["$","section",null,{"className":"bg-[#0B1730] py-28","children":["$","div",null,{"className":"mx-auto max-w-6xl px-6","children":["$","div",null,{"className":"rounded-2xl border border-white/10 bg-[#0A1324]/80 px-10 py-12","children":["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-3 gap-12 items-start","children":[["$","div",null,{"children":["$","h3",null,{"className":"text-sm font-semibold uppercase tracking-wider text-blue-400","children":"Compliance & Governance"}]}],["$","div",null,{"className":"md:col-span-2 space-y-6 text-slate-300 leading-relaxed","children":[["$","p",null,{"children":"Delivery aligns with commonly adopted enterprise security and risk management practices, ensuring systems are designed, implemented, and operated within controlled governance models."}],["$","ul",null,{"className":"space-y-3 text-sm text-slate-400","children":[["$","li",null,{"children":"• Controlled change and release management"}],["$","li",null,{"children":"• Defined access governance and accountability"}],["$","li",null,{"children":"• Documented architecture and operational ownership"}],["$","li",null,{"children":"• Audit-aware delivery for regulated environments"}]]}]]}]]}]}]}]}] 7:["$","section",null,{"className":"bg-[#050A14] border-y border-white/10","children":["$","div",null,{"className":"mx-auto max-w-7xl px-6 py-12 grid grid-cols-2 md:grid-cols-4 gap-10","children":[["$","div","Incorporated",{"children":[["$","p",null,{"className":"text-[11px] uppercase tracking-widest text-slate-400","children":"Incorporated"}],["$","p",null,{"className":"mt-2 text-white font-medium","children":"2024 · Kenya"}]]}],["$","div","Legal Status",{"children":[["$","p",null,{"className":"text-[11px] uppercase tracking-widest text-slate-400","children":"Legal Status"}],["$","p",null,{"className":"mt-2 text-white font-medium","children":"Private Limited Company"}]]}],["$","div","Operating Region",{"children":[["$","p",null,{"className":"text-[11px] uppercase tracking-widest text-slate-400","children":"Operating Region"}],["$","p",null,{"className":"mt-2 text-white font-medium","children":"East Africa"}]]}],["$","div","Core Focus",{"children":[["$","p",null,{"className":"text-[11px] uppercase tracking-widest text-slate-400","children":"Core Focus"}],["$","p",null,{"className":"mt-2 text-white font-medium","children":"Cybersecurity · Infrastructure · ICT"}]]}]]}]}] 8:["$","section",null,{"className":"py-24 bg-[#0C1424]","children":["$","div",null,{"className":"mx-auto max-w-7xl px-6","children":[["$","h2",null,{"className":"text-3xl font-semibold text-white","children":"Technology Partners"}],["$","p",null,{"className":"mt-3 max-w-2xl text-sm text-slate-400","children":"Technology platforms we deploy and support"}],["$","div",null,{"className":"mt-12 grid grid-cols-2 md:grid-cols-4 gap-10 items-center","children":[["$","div","dell",{"className":" flex justify-center opacity-80 grayscale transition duration-300 hover:grayscale-0 hover:opacity-100 ","children":["$","$L2",null,{"src":"/images/partners/dell.webp","alt":"dell logo","width":140,"height":60,"className":"object-contain"}]}],["$","div","hpe",{"className":" flex justify-center opacity-80 grayscale transition duration-300 hover:grayscale-0 hover:opacity-100 ","children":["$","$L2",null,{"src":"/images/partners/hpe.webp","alt":"hpe logo","width":140,"height":60,"className":"object-contain"}]}],["$","div","fortinet",{"className":" flex justify-center opacity-80 grayscale transition duration-300 hover:grayscale-0 hover:opacity-100 ","children":["$","$L2",null,{"src":"/images/partners/fortinet.webp","alt":"fortinet logo","width":140,"height":60,"className":"object-contain"}]}],["$","div","sophos",{"className":" flex justify-center opacity-80 grayscale transition duration-300 hover:grayscale-0 hover:opacity-100 ","children":["$","$L2",null,{"src":"/images/partners/sophos.webp","alt":"sophos logo","width":140,"height":60,"className":"object-contain"}]}],["$","div","vmware",{"className":" flex justify-center opacity-80 grayscale transition duration-300 hover:grayscale-0 hover:opacity-100 ","children":["$","$L2",null,{"src":"/images/partners/vmware.webp","alt":"vmware logo","width":140,"height":60,"className":"object-contain"}]}],["$","div","veeam",{"className":" flex justify-center opacity-80 grayscale transition duration-300 hover:grayscale-0 hover:opacity-100 ","children":["$","$L2",null,{"src":"/images/partners/veeam.webp","alt":"veeam logo","width":140,"height":60,"className":"object-contain"}]}],["$","div","lenovo",{"className":" flex justify-center opacity-80 grayscale transition duration-300 hover:grayscale-0 hover:opacity-100 ","children":["$","$L2",null,{"src":"/images/partners/lenovo.webp","alt":"lenovo logo","width":140,"height":60,"className":"object-contain"}]}],["$","div","checkpoint",{"className":" flex justify-center opacity-80 grayscale transition duration-300 hover:grayscale-0 hover:opacity-100 ","children":["$","$L2",null,{"src":"/images/partners/checkpoint.webp","alt":"checkpoint logo","width":140,"height":60,"className":"object-contain"}]}]]}]]}]}] 9:["$","section",null,{"className":"\n relative\n py-24\n bg-gradient-to-b\n from-[#0B1F3B]\n to-[#0E2447]\n bg-[#0E1627] py-24","children":["$","div",null,{"className":"mx-auto w-full ","style":{"maxWidth":"1280px","paddingLeft":"1.5rem","paddingRight":"1.5rem"},"children":["$","div",null,{"className":"max-w-2xl","children":[["$","h2",null,{"className":"text-2xl font-semibold text-white","children":"Ready to Work With Us?"}],["$","p",null,{"className":"mt-4 text-slate-400 leading-relaxed","children":"Whether you’re planning a new initiative or strengthening existing systems, our team can help you move forward with clarity and confidence."}],["$","div",null,{"className":"mt-8","children":["$","$L10",null,{"href":"/request-consultation","children":["$","button",null,{"className":"bg-blue-600 hover:bg-blue-500 text-white px-7","style":{"padding":"0.75rem 1.5rem","borderRadius":"14px","fontWeight":500,"transition":"all 0.2s ease","cursor":"pointer","background":"#1F4ED8","color":"#0F172A","border":"none"},"children":"Start a Conversation"}]}]}]]}]}]}] a:["$","$L11",null,{"children":["$","$12",null,{"name":"Next.MetadataOutlet","children":"$@13"}]}] b:["$","text",null,{"x":"730","y":390,"fill":"#FFFFFF","fontSize":"18","fontWeight":"500","children":"Change Control"}] c:["$","text",null,{"x":"730","y":412,"fill":"#94A3B8","fontSize":"13","children":"Disciplined change management"}] d:["$","line",null,{"x1":"540","y1":395,"x2":"700","y2":395,"stroke":"rgba(255,255,255,0.25)","strokeWidth":"2","markerEnd":"url(#arrow)"}] e:["$","g","SLA Commitment",{"children":[["$","rect",null,{"x":"700","y":460,"rx":"14","ry":"14","width":"380","height":"70","fill":"rgba(255,255,255,0.04)","stroke":"rgba(255,255,255,0.12)"}],["$","text",null,{"x":"730","y":490,"fill":"#FFFFFF","fontSize":"18","fontWeight":"500","children":"SLA Commitment"}],["$","text",null,{"x":"730","y":512,"fill":"#94A3B8","fontSize":"13","children":"Accountability & service stability"}],["$","line",null,{"x1":"540","y1":495,"x2":"700","y2":495,"stroke":"rgba(255,255,255,0.25)","strokeWidth":"2","markerEnd":"url(#arrow)"}]]}] f:["$","defs",null,{"children":["$","marker",null,{"id":"arrow","markerWidth":"10","markerHeight":"10","refX":"6","refY":"3","orient":"auto","children":["$","path",null,{"d":"M0,0 L0,6 L9,3 z","fill":"rgba(255,255,255,0.4)"}]}]}] 13:null