1:"$Sreact.fragment" 2:I[92825,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/7340adf74ff47ec0.js"],"ClientSegmentRoot"] 3:I[42525,["/_next/static/chunks/e9233006304db403.js"],"default"] 4:I[39756,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/7340adf74ff47ec0.js"],"default"] 5:I[37457,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/7340adf74ff47ec0.js"],"default"] 11:I[68027,[],"default"] :HL["/_next/static/chunks/17a6e432ecb79440.css","style"] 0:{"P":null,"b":"1_7GfoAioU3NaHecXPaeH","c":["","services","cybersecurity"],"q":"","i":false,"f":[[["",{"children":["services",{"children":["cybersecurity",{"children":["__PAGE__",{}]}]}]},"$undefined","$undefined",true],[["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/chunks/17a6e432ecb79440.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","script","script-0",{"src":"/_next/static/chunks/e9233006304db403.js","async":true,"nonce":"$undefined"}]],["$","$L2",null,{"Component":"$3","slots":{"children":["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]},"serverProvidedParams":{"params":{},"promises":["$@6"]}}]]}],{"children":[["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":[["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":[["$","$1","c",{"children":[[["$","section",null,{"className":"\n relative\n py-24\n bg-gradient-to-b\n from-[#0B1F3B]\n to-[#0E2447]\n relative bg-[#020617] pt-28 pb-24 overflow-hidden","children":[["$","div",null,{"className":"absolute inset-0 bg-[radial-gradient(circle_at_70%_40%,rgba(56,189,248,0.12),transparent_55%)]"}],["$","div",null,{"className":"mx-auto w-full relative z-10","style":{"maxWidth":"1280px","paddingLeft":"1.5rem","paddingRight":"1.5rem"},"children":["$","div",null,{"className":"max-w-2xl","children":[["$","div",null,{"className":"mb-6 inline-flex items-center gap-2 rounded-full border border-blue-500/30 bg-blue-500/10 px-4 py-1.5 text-sm text-blue-300","children":"Enterprise Cybersecurity"}],["$","h1",null,{"className":"text-4xl font-semibold leading-tight text-white md:text-6xl","children":["Threat Detection",["$","br",null,{}],["$","span",null,{"className":"text-blue-400","children":"& Response"}]]}],["$","p",null,{"className":"mt-6 text-lg text-slate-300","children":"AI-powered threat detection identifies and neutralizes security risks in real time before they impact your business."}],["$","ul",null,{"className":"mt-8 space-y-3 text-slate-300","children":[["$","li","Real-time threat monitoring",{"className":"flex items-center gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-check h-5 w-5 text-blue-400","aria-hidden":"true","children":[["$","path","1gmf2c",{"d":"M20 6 9 17l-5-5"}],"$undefined"]}],"Real-time threat monitoring"]}],["$","li","24/7 Security Operations Center (SOC)",{"className":"flex items-center gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-check h-5 w-5 text-blue-400","aria-hidden":"true","children":["$L7","$undefined"]}],"24/7 Security Operations Center (SOC)"]}],"$L8","$L9"]}],"$La"]}]}]]}],"$Lb","$Lc","$Ld","$Le"],null,"$Lf"]}],{},null,false,false]},null,false,false]},null,false,false]},null,false,false],"$L10",false]],"m":"$undefined","G":["$11",[]],"S":true} 12:I[22016,["/_next/static/chunks/e9233006304db403.js"],""] 13:I[5500,["/_next/static/chunks/e9233006304db403.js"],"Image"] 16:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/7340adf74ff47ec0.js"],"OutletBoundary"] 17:"$Sreact.suspense" 19:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/7340adf74ff47ec0.js"],"ViewportBoundary"] 1b:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/7340adf74ff47ec0.js"],"MetadataBoundary"] 7:["$","path","1gmf2c",{"d":"M20 6 9 17l-5-5"}] 8:["$","li","Automated incident response",{"className":"flex items-center gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-check h-5 w-5 text-blue-400","aria-hidden":"true","children":[["$","path","1gmf2c",{"d":"M20 6 9 17l-5-5"}],"$undefined"]}],"Automated incident response"]}] 9:["$","li","Threat intelligence integration",{"className":"flex items-center gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-check h-5 w-5 text-blue-400","aria-hidden":"true","children":[["$","path","1gmf2c",{"d":"M20 6 9 17l-5-5"}],"$undefined"]}],"Threat intelligence integration"]}] a:["$","div",null,{"className":"mt-10","children":["$","$L12",null,{"href":"/request-consultation","children":["$","button",null,{"className":"bg-blue-600 hover:bg-blue-500 text-white px-7","style":{"padding":"0.75rem 1.5rem","borderRadius":"14px","fontWeight":500,"transition":"all 0.2s ease","cursor":"pointer","background":"#1F4ED8","color":"#0F172A","border":"none"},"children":"Request Consultation"}]}]}] b:[["$","section","Data Encryption",{"className":"\n relative\n py-24\n bg-gradient-to-b\n from-[#0B1F3B]\n to-[#0E2447]\n bg-[#0C1424]","children":["$","div",null,{"className":"mx-auto w-full ","style":{"maxWidth":"1280px","paddingLeft":"1.5rem","paddingRight":"1.5rem"},"children":["$","div",null,{"className":"grid gap-14 items-center md:grid-cols-2","children":[["$","div",null,{"className":"\n relative h-[280px] w-full\n rounded-2xl overflow-hidden\n border border-white/10 bg-white/5\n md:order-1\n ","children":["$","$L13",null,{"src":"/images/encryption.webp","alt":"Data Encryption","fill":true,"className":"object-cover opacity-90","priority":true}]}],["$","div",null,{"className":"\n max-w-xl\n md:order-2\n ","children":[["$","h2",null,{"className":"text-3xl font-semibold text-white md:text-4xl","children":"Data Encryption"}],["$","p",null,{"className":"mt-4 text-slate-300","children":"Military-grade encryption protects sensitive data at rest and in transit across all platforms and devices."}],["$","ul",null,{"className":"mt-6 space-y-3 text-slate-300","children":[["$","li","AES-256 encryption standards",{"className":"flex items-center gap-3","children":[["$","span",null,{"className":"h-2 w-2 rounded-full bg-blue-400"}],"AES-256 encryption standards"]}],["$","li","End-to-end encrypted communications",{"className":"flex items-center gap-3","children":[["$","span",null,{"className":"h-2 w-2 rounded-full bg-blue-400"}],"End-to-end encrypted communications"]}],["$","li","Centralized key management",{"className":"flex items-center gap-3","children":[["$","span",null,{"className":"h-2 w-2 rounded-full bg-blue-400"}],"Centralized key management"]}]]}]]}]]}]}]}],["$","section","Security Monitoring",{"className":"\n relative\n py-24\n bg-gradient-to-b\n from-[#0B1F3B]\n to-[#0E2447]\n bg-[#020617]","children":["$","div",null,{"className":"mx-auto w-full ","style":{"maxWidth":"1280px","paddingLeft":"1.5rem","paddingRight":"1.5rem"},"children":["$","div",null,{"className":"grid gap-14 items-center md:grid-cols-2","children":[["$","div",null,{"className":"\n relative h-[280px] w-full\n rounded-2xl overflow-hidden\n border border-white/10 bg-white/5\n md:order-2\n ","children":["$","$L13",null,{"src":"/images/monitoring.webp","alt":"Security Monitoring","fill":true,"className":"object-cover opacity-90","priority":false}]}],["$","div",null,{"className":"\n max-w-xl\n md:order-1\n ","children":[["$","h2",null,{"className":"text-3xl font-semibold text-white md:text-4xl","children":"Security Monitoring"}],["$","p",null,{"className":"mt-4 text-slate-300","children":"Continuous monitoring and alerting ensures visibility into suspicious activity across your infrastructure."}],["$","ul",null,{"className":"mt-6 space-y-3 text-slate-300","children":[["$","li","24/7 monitoring coverage",{"className":"flex items-center gap-3","children":[["$","span",null,{"className":"h-2 w-2 rounded-full bg-blue-400"}],"24/7 monitoring coverage"]}],["$","li","Real-time security alerts",{"className":"flex items-center gap-3","children":[["$","span",null,{"className":"h-2 w-2 rounded-full bg-blue-400"}],"Real-time security alerts"]}],["$","li","Centralized security visibility",{"className":"flex items-center gap-3","children":[["$","span",null,{"className":"h-2 w-2 rounded-full bg-blue-400"}],"Centralized security visibility"]}]]}]]}]]}]}]}],["$","section","Data Loss Prevention",{"className":"\n relative\n py-24\n bg-gradient-to-b\n from-[#0B1F3B]\n to-[#0E2447]\n bg-[#0C1424]","children":["$","div",null,{"className":"mx-auto w-full ","style":{"maxWidth":"1280px","paddingLeft":"1.5rem","paddingRight":"1.5rem"},"children":["$","div",null,{"className":"grid gap-14 items-center md:grid-cols-2","children":["$L14","$L15"]}]}]}]] c:["$","section",null,{"className":"\n relative\n py-24\n bg-gradient-to-b\n from-[#0B1F3B]\n to-[#0E2447]\n bg-[#0C1424] py-24","children":["$","div",null,{"className":"mx-auto w-full ","style":{"maxWidth":"1280px","paddingLeft":"1.5rem","paddingRight":"1.5rem"},"children":[["$","h2",null,{"className":"text-white text-2xl md:text-3xl","style":{"fontSize":"clamp(2rem, 4vw, 2.75rem)","fontWeight":600,"lineHeight":1.3,"color":"rgba(255,255,255,0.95)","textAlign":"center"},"children":"How We Deliver Cybersecurity"}],["$","p",null,{"className":"mt-4 mx-auto max-w-[640px] text-center text-slate-400 text-sm leading-relaxed","children":"Our delivery approach ensures consistent protection, rapid response, and continuous improvement across your security environment."}],["$","div",null,{"className":"relative mt-16","children":[["$","div",null,{"className":"absolute left-0 right-0 top-[24px] hidden h-px bg-white/10 md:block"}],["$","div",null,{"className":"grid gap-12 md:grid-cols-4","children":[["$","div","01",{"className":"relative text-center md:text-left","children":[["$","div",null,{"className":"mx-auto mb-5 flex h-12 w-12 items-center justify-center rounded-full border border-white/15 bg-white/5 text-xs font-semibold text-blue-400 md:mx-0","children":"01"}],["$","h3",null,{"className":"text-base font-semibold text-white","children":"Assess"}],["$","p",null,{"className":"mt-2 text-sm leading-relaxed text-slate-300","children":"Identify critical assets, exposure points, and existing security gaps."}]]}],["$","div","02",{"className":"relative text-center md:text-left","children":[["$","div",null,{"className":"mx-auto mb-5 flex h-12 w-12 items-center justify-center rounded-full border border-white/15 bg-white/5 text-xs font-semibold text-blue-400 md:mx-0","children":"02"}],["$","h3",null,{"className":"text-base font-semibold text-white","children":"Design"}],["$","p",null,{"className":"mt-2 text-sm leading-relaxed text-slate-300","children":"Define security controls and protections aligned to your risk profile."}]]}],["$","div","03",{"className":"relative text-center md:text-left","children":[["$","div",null,{"className":"mx-auto mb-5 flex h-12 w-12 items-center justify-center rounded-full border border-white/15 bg-white/5 text-xs font-semibold text-blue-400 md:mx-0","children":"03"}],["$","h3",null,{"className":"text-base font-semibold text-white","children":"Protect"}],["$","p",null,{"className":"mt-2 text-sm leading-relaxed text-slate-300","children":"Deploy monitoring, detection, and response mechanisms across systems."}]]}],["$","div","04",{"className":"relative text-center md:text-left","children":[["$","div",null,{"className":"mx-auto mb-5 flex h-12 w-12 items-center justify-center rounded-full border border-white/15 bg-white/5 text-xs font-semibold text-blue-400 md:mx-0","children":"04"}],["$","h3",null,{"className":"text-base font-semibold text-white","children":"Monitor & Improve"}],["$","p",null,{"className":"mt-2 text-sm leading-relaxed text-slate-300","children":"Continuously detect threats, respond to incidents, and strengthen defenses."}]]}]]}]]}]]}]}] d:["$","section",null,{"className":"\n relative\n py-24\n bg-gradient-to-b\n from-[#0B1F3B]\n to-[#0E2447]\n bg-[#0C1424] py-24","children":["$","div",null,{"className":"mx-auto w-full ","style":{"maxWidth":"1280px","paddingLeft":"1.5rem","paddingRight":"1.5rem"},"children":[["$","h2",null,{"className":"text-white text-2xl md:text-3xl","style":{"fontSize":"clamp(2rem, 4vw, 2.75rem)","fontWeight":600,"lineHeight":1.3,"color":"rgba(255,255,255,0.95)","textAlign":"left"},"children":"Trust & Assurance"}],["$","p",null,{"className":"mt-4 max-w-[680px] text-slate-400 text-sm leading-relaxed","children":"Organizations trust our cybersecurity services for their consistency, clarity, and alignment with established security standards."}],["$","div",null,{"className":"mt-14 grid gap-6 md:grid-cols-3","children":[["$","div","Standards-Aligned",{"className":" rounded-xl border border-white/10 bg-white/[0.04] px-8 py-7 ","children":[["$","h3",null,{"className":"text-base font-semibold text-white","children":"Standards-Aligned"}],["$","p",null,{"className":"mt-3 text-sm leading-relaxed text-slate-300","children":"Our security services align with recognized frameworks including ISO and NIST to support compliance and audit readiness."}]]}],["$","div","Proactive Defense",{"className":" rounded-xl border border-white/10 bg-white/[0.04] px-8 py-7 ","children":[["$","h3",null,{"className":"text-base font-semibold text-white","children":"Proactive Defense"}],["$","p",null,{"className":"mt-3 text-sm leading-relaxed text-slate-300","children":"We identify and respond to threats early, reducing risk before incidents disrupt operations."}]]}],["$","div","Enterprise-Ready Delivery",{"className":" rounded-xl border border-white/10 bg-white/[0.04] px-8 py-7 ","children":[["$","h3",null,{"className":"text-base font-semibold text-white","children":"Enterprise-Ready Delivery"}],["$","p",null,{"className":"mt-3 text-sm leading-relaxed text-slate-300","children":"Our approach is designed to support complex, mission-critical environments at scale."}]]}]]}]]}]}] e:["$","section",null,{"className":"\n relative\n py-24\n bg-gradient-to-b\n from-[#0B1F3B]\n to-[#0E2447]\n relative overflow-hidden bg-[#0B1220]","children":[["$","div",null,{"className":"pointer-events-none absolute inset-0 bg-[radial-gradient(circle_at_top,rgba(59,130,246,0.15),transparent_60%)]"}],["$","div",null,{"className":"mx-auto w-full ","style":{"maxWidth":"1280px","paddingLeft":"1.5rem","paddingRight":"1.5rem"},"children":["$","div",null,{"className":"relative rounded-3xl border border-white/10 bg-white/5 px-8 py-16 text-center backdrop-blur-xl md:px-20","children":[["$","h2",null,{"className":"text-white","style":{"fontSize":"clamp(2rem, 4vw, 2.75rem)","fontWeight":600,"lineHeight":1.3,"color":"rgba(255,255,255,0.95)","textAlign":"center"},"children":"Let’s Build Something Reliable"}],["$","p",null,{"className":"mx-auto mt-6 max-w-[720px] text-slate-300 leading-relaxed","children":"Whether you’re planning a new system, upgrading infrastructure, or strengthening security, our team is ready to support you with structured, enterprise-grade solutions."}],["$","div",null,{"className":"mt-10 flex flex-col items-center justify-center gap-4 sm:flex-row","children":[["$","$L12",null,{"href":"/contact","children":["$","button",null,{"style":{"padding":"0.75rem 1.5rem","borderRadius":"14px","fontWeight":500,"transition":"all 0.2s ease","cursor":"pointer","background":"#1F4ED8","color":"#0F172A","border":"none"},"children":"Talk to an Expert"}]}],["$","$L12",null,{"href":"/services","children":["$","button",null,{"style":{"padding":"0.75rem 1.5rem","borderRadius":"14px","fontWeight":500,"transition":"all 0.2s ease","cursor":"pointer","background":"transparent","color":"#1F4ED8","border":"1px solid #1F4ED8"},"children":"Explore Our Services"}]}]]}]]}]}]]}] f:["$","$L16",null,{"children":["$","$17",null,{"name":"Next.MetadataOutlet","children":"$@18"}]}] 10:["$","$1","h",{"children":[null,["$","$L19",null,{"children":"$L1a"}],["$","div",null,{"hidden":true,"children":["$","$L1b",null,{"children":["$","$17",null,{"name":"Next.Metadata","children":"$L1c"}]}]}],null]}] 6:"$0:f:0:1:0:props:children:1:props:serverProvidedParams:params" 14:["$","div",null,{"className":"\n relative h-[280px] w-full\n rounded-2xl overflow-hidden\n border border-white/10 bg-white/5\n md:order-1\n ","children":["$","$L13",null,{"src":"/images/dlp.webp","alt":"Data Loss Prevention","fill":true,"className":"object-cover opacity-90","priority":false}]}] 15:["$","div",null,{"className":"\n max-w-xl\n md:order-2\n ","children":[["$","h2",null,{"className":"text-3xl font-semibold text-white md:text-4xl","children":"Data Loss Prevention"}],["$","p",null,{"className":"mt-4 text-slate-300","children":"Advanced DLP solutions prevent unauthorized access, transfer, and leakage of sensitive information."}],["$","ul",null,{"className":"mt-6 space-y-3 text-slate-300","children":[["$","li","Data classification & labeling",{"className":"flex items-center gap-3","children":[["$","span",null,{"className":"h-2 w-2 rounded-full bg-blue-400"}],"Data classification & labeling"]}],["$","li","Policy-based enforcement",{"className":"flex items-center gap-3","children":[["$","span",null,{"className":"h-2 w-2 rounded-full bg-blue-400"}],"Policy-based enforcement"]}],["$","li","Deep content inspection",{"className":"flex items-center gap-3","children":[["$","span",null,{"className":"h-2 w-2 rounded-full bg-blue-400"}],"Deep content inspection"]}]]}]]}] 1a:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] 1d:I[27201,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/7340adf74ff47ec0.js"],"IconMark"] 18:null 1c:[["$","link","0",{"rel":"icon","href":"/favicon.ico?favicon.0b3bf435.ico","sizes":"256x256","type":"image/x-icon"}],["$","$L1d","1",{}]]