1:"$Sreact.fragment" 2:I[9304,["63","static/chunks/63-573e27aedec47ebd.js","874","static/chunks/874-36a0dbb3a3ecbf77.js","765","static/chunks/765-cd6547e88da8c7e9.js","177","static/chunks/app/layout-1022a7d6152003e5.js"],"ThemeProvider"] 3:I[7659,["63","static/chunks/63-573e27aedec47ebd.js","874","static/chunks/874-36a0dbb3a3ecbf77.js","765","static/chunks/765-cd6547e88da8c7e9.js","177","static/chunks/app/layout-1022a7d6152003e5.js"],"default"] 4:I[7555,[],""] 5:I[1295,[],""] 6:I[6874,["63","static/chunks/63-573e27aedec47ebd.js","874","static/chunks/874-36a0dbb3a3ecbf77.js","7","static/chunks/app/services/cybersecurity/page-75ef88deec4a9395.js"],""] 7:I[3063,["63","static/chunks/63-573e27aedec47ebd.js","874","static/chunks/874-36a0dbb3a3ecbf77.js","7","static/chunks/app/services/cybersecurity/page-75ef88deec4a9395.js"],"Image"] 8:I[9665,[],"OutletBoundary"] b:I[9665,[],"ViewportBoundary"] d:I[9665,[],"MetadataBoundary"] f:I[6614,[],""] :HL["/_next/static/css/c6b8d6ecb0054a3d.css","style"] 0:{"P":null,"b":"gxDP9owgOWVAomzJX7oV5","p":"","c":["","services","cybersecurity"],"i":false,"f":[[["",{"children":["services",{"children":["cybersecurity",{"children":["__PAGE__",{}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/c6b8d6ecb0054a3d.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"en","children":["$","body",null,{"className":"__className_e8ce0c","children":["$","$L2",null,{"attribute":"class","defaultTheme":"light","enableSystem":true,"disableTransitionOnChange":true,"children":[["$","$L3",null,{}],["$","main",null,{"children":["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]}],["$","footer",null,{"className":"bg-gray-900 text-white pt-16 pb-8","children":["$","div",null,{"className":"container mx-auto px-4","children":[["$","div",null,{"className":"mb-12 bg-gray-800/50 p-8 rounded-lg","children":["$","div",null,{"className":"grid md:grid-cols-2 gap-8 items-center","children":[["$","div",null,{"children":[["$","h3",null,{"className":"text-2xl font-bold mb-2","children":"Stay Informed"}],["$","p",null,{"className":"text-gray-300","children":"Subscribe to our newsletter for the latest industry insights and company updates."}]]}],["$","div",null,{"children":["$","form",null,{"className":"flex flex-col sm:flex-row gap-4","children":[["$","input",null,{"type":"email","placeholder":"Your email address","className":"flex-grow px-4 py-3 rounded-md bg-gray-700 border border-gray-600 text-white focus:outline-none focus:border-primary"}],["$","button",null,{"type":"submit","className":"px-6 py-3 bg-primary text-white rounded-md font-semibold hover:bg-primary/90 transition-all whitespace-nowrap","children":"Subscribe"}]]}]}]]}]}],["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-2 lg:grid-cols-4 gap-8 mb-12","children":[["$","div",null,{"className":"lg:col-span-1","children":[["$","$L6",null,{"href":"/","className":"inline-block mb-6","children":["$","$L7",null,{"src":"/images/jijo-logo-new.png","alt":"Jijo Consultancy Group","width":500,"height":200,"className":"h-40 w-auto"}]}],["$","p",null,{"className":"text-gray-400 mb-6","children":"Jijo Consultancy Group delivers innovative technology solutions that help businesses transform, optimize, and grow in today's digital landscape."}],["$","div",null,{"className":"flex space-x-4","children":[["$","a",null,{"href":"#","className":"w-10 h-10 rounded-full bg-gray-800 flex items-center justify-center text-gray-300 hover:bg-primary hover:text-white transition-colors","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":18,"height":18,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-facebook","children":[["$","path","1jg4f8",{"d":"M18 2h-3a5 5 0 0 0-5 5v3H7v4h3v8h4v-8h3l1-4h-4V7a1 1 0 0 1 1-1h3z"}],"$undefined"]}]}],["$","a",null,{"href":"#","className":"w-10 h-10 rounded-full bg-gray-800 flex items-center justify-center text-gray-300 hover:bg-primary hover:text-white transition-colors","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":18,"height":18,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-twitter","children":[["$","path","pff0z6",{"d":"M22 4s-.7 2.1-2 3.4c1.6 10-9.4 17.3-18 11.6 2.2.1 4.4-.6 6-2C3 15.5.5 9.6 3 5c2.2 2.6 5.6 4.1 9 4-.9-4.2 4-6.6 7-3.8 1.1 0 3-1.2 3-1.2z"}],"$undefined"]}]}],["$","a",null,{"href":"#","className":"w-10 h-10 rounded-full bg-gray-800 flex items-center justify-center text-gray-300 hover:bg-primary hover:text-white transition-colors","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":18,"height":18,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-linkedin","children":[["$","path","c2jq9f",{"d":"M16 8a6 6 0 0 1 6 6v7h-4v-7a2 2 0 0 0-2-2 2 2 0 0 0-2 2v7h-4v-7a6 6 0 0 1 6-6z"}],["$","rect","mk3on5",{"width":"4","height":"12","x":"2","y":"9"}],["$","circle","bt5ra8",{"cx":"4","cy":"4","r":"2"}],"$undefined"]}]}],["$","a",null,{"href":"#","className":"w-10 h-10 rounded-full bg-gray-800 flex items-center justify-center text-gray-300 hover:bg-primary hover:text-white transition-colors","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":18,"height":18,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-instagram","children":[["$","rect","2e1cvw",{"width":"20","height":"20","x":"2","y":"2","rx":"5","ry":"5"}],["$","path","9exkf1",{"d":"M16 11.37A4 4 0 1 1 12.63 8 4 4 0 0 1 16 11.37z"}],["$","line","r4j83e",{"x1":"17.5","x2":"17.51","y1":"6.5","y2":"6.5"}],"$undefined"]}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-lg font-semibold mb-6 text-white","children":"Services"}],["$","ul",null,{"className":"space-y-3","children":[["$","li","Digital Strategy",{"children":["$","$L6",null,{"href":"/services/digital-strategy","className":"text-gray-400 hover:text-white transition-colors flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":14,"height":14,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right mr-2 text-primary","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}],"Digital Strategy"]}]}],["$","li","Cloud Transformation",{"children":["$","$L6",null,{"href":"/services/cloud-transformation","className":"text-gray-400 hover:text-white transition-colors flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":14,"height":14,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right mr-2 text-primary","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}],"Cloud Transformation"]}]}],["$","li","Data & Analytics",{"children":["$","$L6",null,{"href":"/services/data-analytics","className":"text-gray-400 hover:text-white transition-colors flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":14,"height":14,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right mr-2 text-primary","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}],"Data & Analytics"]}]}],["$","li","Cybersecurity",{"children":["$","$L6",null,{"href":"/services/cybersecurity","className":"text-gray-400 hover:text-white transition-colors flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":14,"height":14,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right mr-2 text-primary","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}],"Cybersecurity"]}]}],["$","li","Application Development",{"children":["$","$L6",null,{"href":"/services/application-development","className":"text-gray-400 hover:text-white transition-colors flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":14,"height":14,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right mr-2 text-primary","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}],"Application Development"]}]}],["$","li","Digital Experience",{"children":["$","$L6",null,{"href":"/services/digital-experience","className":"text-gray-400 hover:text-white transition-colors flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":14,"height":14,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right mr-2 text-primary","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}],"Digital Experience"]}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-lg font-semibold mb-6 text-white","children":"Company"}],["$","ul",null,{"className":"space-y-3","children":[["$","li","About Us",{"children":["$","$L6",null,{"href":"/about","className":"text-gray-400 hover:text-white transition-colors flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":14,"height":14,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right mr-2 text-primary","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}],"About Us"]}]}],["$","li","Case Studies",{"children":["$","$L6",null,{"href":"/case-studies","className":"text-gray-400 hover:text-white transition-colors flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":14,"height":14,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right mr-2 text-primary","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}],"Case Studies"]}]}],["$","li","Insights",{"children":["$","$L6",null,{"href":"/insights","className":"text-gray-400 hover:text-white transition-colors flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":14,"height":14,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right mr-2 text-primary","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}],"Insights"]}]}],["$","li","Careers",{"children":["$","$L6",null,{"href":"/careers","className":"text-gray-400 hover:text-white transition-colors flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":14,"height":14,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right mr-2 text-primary","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}],"Careers"]}]}],["$","li","Contact",{"children":["$","$L6",null,{"href":"/contact","className":"text-gray-400 hover:text-white transition-colors flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":14,"height":14,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right mr-2 text-primary","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}],"Contact"]}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-lg font-semibold mb-6 text-white","children":"Contact Us"}],["$","ul",null,{"className":"space-y-4","children":[["$","li",null,{"className":"flex items-start","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":18,"height":18,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-map-pin mr-3 text-primary flex-shrink-0 mt-1","children":[["$","path","1r0f0z",{"d":"M20 10c0 4.993-5.539 10.193-7.399 11.799a1 1 0 0 1-1.202 0C9.539 20.193 4 14.993 4 10a8 8 0 0 1 16 0"}],["$","circle","ilqhr7",{"cx":"12","cy":"10","r":"3"}],"$undefined"]}],["$","span",null,{"className":"text-gray-400","children":"Hurlingham, Nairobi, Kenya"}]]}],["$","li",null,{"className":"flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":18,"height":18,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-phone mr-3 text-primary","children":[["$","path","foiqr5",{"d":"M22 16.92v3a2 2 0 0 1-2.18 2 19.79 19.79 0 0 1-8.63-3.07 19.5 19.5 0 0 1-6-6 19.79 19.79 0 0 1-3.07-8.67A2 2 0 0 1 4.11 2h3a2 2 0 0 1 2 1.72 12.84 12.84 0 0 0 .7 2.81 2 2 0 0 1-.45 2.11L8.09 9.91a16 16 0 0 0 6 6l1.27-1.27a2 2 0 0 1 2.11-.45 12.84 12.84 0 0 0 2.81.7A2 2 0 0 1 22 16.92z"}],"$undefined"]}],["$","a",null,{"href":"tel:+254704101444","className":"text-gray-400 hover:text-white transition-colors","children":"+254704101444"}]]}],["$","li",null,{"className":"flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":18,"height":18,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-mail mr-3 text-primary","children":[["$","rect","18n3k1",{"width":"20","height":"16","x":"2","y":"4","rx":"2"}],["$","path","1ocrg3",{"d":"m22 7-8.97 5.7a1.94 1.94 0 0 1-2.06 0L2 7"}],"$undefined"]}],["$","a",null,{"href":"mailto:info@jijoconsultancy.com","className":"text-gray-400 hover:text-white transition-colors","children":"info@jijoconsultancy.com"}]]}]]}]]}]]}],["$","div",null,{"className":"border-t border-gray-800 pt-8","children":["$","div",null,{"className":"flex flex-col md:flex-row justify-between items-center","children":[["$","p",null,{"className":"text-gray-500 text-sm mb-4 md:mb-0","children":["© ",2025," Jijo Consultancy Group. All rights reserved."]}],["$","div",null,{"className":"flex space-x-6","children":[["$","$L6",null,{"href":"/privacy-policy","className":"text-gray-500 hover:text-white text-sm transition-colors","children":"Privacy Policy"}],["$","$L6",null,{"href":"/terms-of-service","className":"text-gray-500 hover:text-white text-sm transition-colors","children":"Terms of Service"}],["$","$L6",null,{"href":"/cookies-policy","className":"text-gray-500 hover:text-white text-sm transition-colors","children":"Cookies Policy"}]]}]]}]}]]}]}]]}]}]}]]}],{"children":["services",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["cybersecurity",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","div",null,{"className":"pt-20","children":[["$","section",null,{"className":"relative py-16 bg-gradient-to-r from-[#0e3e7b] to-[#a4238c] text-white","children":["$","div",null,{"className":"container mx-auto px-4","children":["$","div",null,{"className":"max-w-3xl","children":[["$","h1",null,{"className":"text-4xl md:text-5xl font-bold mb-6","children":"Cybersecurity"}],["$","p",null,{"className":"text-xl text-white/80 mb-8","children":"Comprehensive security solutions to protect your digital assets and ensure business continuity."}],["$","$L6",null,{"href":"#contact-us","className":"inline-block px-6 py-3 bg-white text-primary rounded-md font-semibold hover:bg-white/90 transition-all","children":"Get Started"}]]}]}]}],["$","section",null,{"className":"py-16 md:py-24","children":["$","div",null,{"className":"container mx-auto px-4","children":["$","div",null,{"className":"grid md:grid-cols-2 gap-12 items-center","children":[["$","div",null,{"children":[["$","h2",null,{"className":"text-3xl font-bold mb-6","children":"Protect Your Business with Advanced Security Solutions"}],["$","div",null,{"className":"w-20 h-1 bg-primary mb-6"}],["$","p",null,{"className":"text-gray-700 mb-6","children":"In today's interconnected digital world, robust cybersecurity is essential for protecting your business assets and maintaining customer trust. Our comprehensive security solutions help organizations identify vulnerabilities, prevent threats, and respond effectively to security incidents."}],["$","p",null,{"className":"text-gray-700 mb-8","children":"We work with your team to implement security measures that align with industry best practices and regulatory requirements, ensuring your business remains protected in an evolving threat landscape."}],["$","div",null,{"className":"space-y-4","children":[["$","div","0",{"className":"flex items-start","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big text-primary mr-3 flex-shrink-0 mt-1","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","span",null,{"children":"Comprehensive security assessments and audits"}]]}],["$","div","1",{"className":"flex items-start","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big text-primary mr-3 flex-shrink-0 mt-1","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","span",null,{"children":"Advanced threat detection and prevention"}]]}],["$","div","2",{"className":"flex items-start","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big text-primary mr-3 flex-shrink-0 mt-1","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","span",null,{"children":"Incident response and recovery planning"}]]}],["$","div","3",{"className":"flex items-start","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big text-primary mr-3 flex-shrink-0 mt-1","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","span",null,{"children":"Security awareness training and compliance"}]]}]]}]]}],["$","div",null,{"className":"relative","children":[["$","div",null,{"className":"relative h-[400px] rounded-lg overflow-hidden shadow-xl","children":["$","$L7",null,{"src":"/images/service-cybersecurity.jpg","alt":"Cybersecurity","fill":true,"className":"object-cover"}]}],["$","div",null,{"className":"absolute -bottom-6 -left-6 w-48 h-48 bg-primary/10 rounded-lg z-0"}],["$","div",null,{"className":"absolute -top-6 -right-6 w-48 h-48 bg-secondary/10 rounded-lg z-0"}]]}]]}]}]}],["$","section",null,{"className":"py-16 bg-gray-50","children":["$","div",null,{"className":"container mx-auto px-4","children":[["$","div",null,{"className":"text-center max-w-3xl mx-auto mb-16","children":[["$","h2",null,{"className":"text-3xl font-bold mb-4","children":"Our Approach"}],["$","div",null,{"className":"w-20 h-1 bg-primary mx-auto mb-6"}],["$","p",null,{"className":"text-gray-700","children":"We follow a comprehensive approach to cybersecurity that ensures your business remains protected against evolving threats."}]]}],["$","div",null,{"className":"grid md:grid-cols-2 lg:grid-cols-4 gap-8","children":[["$","div","0",{"className":"bg-white p-8 rounded-lg shadow-md","children":[["$","div",null,{"className":"mb-6","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield w-12 h-12 text-primary","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","h3",null,{"className":"text-xl font-bold mb-3","children":"Security Assessment"}],["$","p",null,{"className":"text-gray-600","children":"We begin by evaluating your current security posture and identifying potential vulnerabilities."}]]}],["$","div","1",{"className":"bg-white p-8 rounded-lg shadow-md","children":[["$","div",null,{"className":"mb-6","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-lock w-12 h-12 text-primary","children":[["$","rect","1w4ew1",{"width":"18","height":"11","x":"3","y":"11","rx":"2","ry":"2"}],["$","path","fwvmzm",{"d":"M7 11V7a5 5 0 0 1 10 0v4"}],"$undefined"]}]}],["$","h3",null,{"className":"text-xl font-bold mb-3","children":"Threat Prevention"}],["$","p",null,{"className":"text-gray-600","children":"We implement advanced security measures to prevent unauthorized access and data breaches."}]]}],["$","div","2",{"className":"bg-white p-8 rounded-lg shadow-md","children":[["$","div",null,{"className":"mb-6","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-triangle-alert w-12 h-12 text-primary","children":[["$","path","wmoenq",{"d":"m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3"}],["$","path","juzpu7",{"d":"M12 9v4"}],["$","path","p32p05",{"d":"M12 17h.01"}],"$undefined"]}]}],["$","h3",null,{"className":"text-xl font-bold mb-3","children":"Incident Response"}],["$","p",null,{"className":"text-gray-600","children":"We develop comprehensive incident response plans to minimize impact of security breaches."}]]}],["$","div","3",{"className":"bg-white p-8 rounded-lg shadow-md","children":[["$","div",null,{"className":"mb-6","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-zap w-12 h-12 text-primary","children":[["$","path","1xq2db",{"d":"M4 14a1 1 0 0 1-.78-1.63l9.9-10.2a.5.5 0 0 1 .86.46l-1.92 6.02A1 1 0 0 0 13 10h7a1 1 0 0 1 .78 1.63l-9.9 10.2a.5.5 0 0 1-.86-.46l1.92-6.02A1 1 0 0 0 11 14z"}],"$undefined"]}]}],["$","h3",null,{"className":"text-xl font-bold mb-3","children":"Continuous Monitoring"}],["$","p",null,{"className":"text-gray-600","children":"We provide 24/7 security monitoring and threat detection to protect your assets."}]]}]]}]]}]}],["$","section",null,{"className":"py-16 md:py-24","children":["$","div",null,{"className":"container mx-auto px-4","children":[["$","div",null,{"className":"text-center max-w-3xl mx-auto mb-16","children":[["$","h2",null,{"className":"text-3xl font-bold mb-4","children":"Our Cybersecurity Services"}],["$","div",null,{"className":"w-20 h-1 bg-primary mx-auto mb-6"}],["$","p",null,{"className":"text-gray-700","children":"We offer a comprehensive range of cybersecurity services to protect your business from evolving threats."}]]}],["$","div",null,{"className":"grid md:grid-cols-2 lg:grid-cols-3 gap-8","children":[["$","div","0",{"className":"bg-white p-8 rounded-lg shadow-md hover:shadow-lg transition-all group","children":[["$","div",null,{"className":"mb-6","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield w-10 h-10 text-primary","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","h3",null,{"className":"text-xl font-bold mb-3 group-hover:text-primary transition-colors","children":"Security Assessment"}],["$","p",null,{"className":"text-gray-600 mb-6","children":"Comprehensive evaluation of your security posture, identifying vulnerabilities and recommending improvements."}],["$","$L6",null,{"href":"/services/cybersecurity/security-assessment","className":"inline-flex items-center text-primary font-medium group-hover:translate-x-2 transition-all","children":["Learn More ",["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":16,"height":16,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right ml-2","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]]}],["$","div","1",{"className":"bg-white p-8 rounded-lg shadow-md hover:shadow-lg transition-all group","children":[["$","div",null,{"className":"mb-6","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-triangle-alert w-10 h-10 text-primary","children":[["$","path","wmoenq",{"d":"m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3"}],["$","path","juzpu7",{"d":"M12 9v4"}],["$","path","p32p05",{"d":"M12 17h.01"}],"$undefined"]}]}],["$","h3",null,{"className":"text-xl font-bold mb-3 group-hover:text-primary transition-colors","children":"Threat Detection"}],["$","p",null,{"className":"text-gray-600 mb-6","children":"Advanced monitoring and detection systems to identify and respond to security threats in real-time."}],["$","$L6",null,{"href":"/services/cybersecurity/threat-detection","className":"inline-flex items-center text-primary font-medium group-hover:translate-x-2 transition-all","children":["Learn More ",["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":16,"height":16,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right ml-2","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]]}],["$","div","2",{"className":"bg-white p-8 rounded-lg shadow-md hover:shadow-lg transition-all group","children":[["$","div",null,{"className":"mb-6","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-zap w-10 h-10 text-primary","children":[["$","path","1xq2db",{"d":"M4 14a1 1 0 0 1-.78-1.63l9.9-10.2a.5.5 0 0 1 .86.46l-1.92 6.02A1 1 0 0 0 13 10h7a1 1 0 0 1 .78 1.63l-9.9 10.2a.5.5 0 0 1-.86-.46l1.92-6.02A1 1 0 0 0 11 14z"}],"$undefined"]}]}],["$","h3",null,{"className":"text-xl font-bold mb-3 group-hover:text-primary transition-colors","children":"Incident Response"}],["$","p",null,{"className":"text-gray-600 mb-6","children":"Rapid response and recovery services to minimize the impact of security incidents."}],["$","$L6",null,{"href":"/services/cybersecurity/incident-response","className":"inline-flex items-center text-primary font-medium group-hover:translate-x-2 transition-all","children":["Learn More ",["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":16,"height":16,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right ml-2","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]]}],["$","div","3",{"className":"bg-white p-8 rounded-lg shadow-md hover:shadow-lg transition-all group","children":[["$","div",null,{"className":"mb-6","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-users w-10 h-10 text-primary","children":[["$","path","1yyitq",{"d":"M16 21v-2a4 4 0 0 0-4-4H6a4 4 0 0 0-4 4v2"}],["$","circle","nufk8",{"cx":"9","cy":"7","r":"4"}],["$","path","kshegd",{"d":"M22 21v-2a4 4 0 0 0-3-3.87"}],["$","path","1da9ce",{"d":"M16 3.13a4 4 0 0 1 0 7.75"}],"$undefined"]}]}],["$","h3",null,{"className":"text-xl font-bold mb-3 group-hover:text-primary transition-colors","children":"Security Training"}],["$","p",null,{"className":"text-gray-600 mb-6","children":"Employee training programs to build security awareness and prevent human error."}],["$","$L6",null,{"href":"/services/cybersecurity/security-training","className":"inline-flex items-center text-primary font-medium group-hover:translate-x-2 transition-all","children":["Learn More ",["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":16,"height":16,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right ml-2","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]]}],["$","div","4",{"className":"bg-white p-8 rounded-lg shadow-md hover:shadow-lg transition-all group","children":[["$","div",null,{"className":"mb-6","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big w-10 h-10 text-primary","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}]}],["$","h3",null,{"className":"text-xl font-bold mb-3 group-hover:text-primary transition-colors","children":"Compliance Management"}],["$","p",null,{"className":"text-gray-600 mb-6","children":"Guidance and support to meet industry regulations and security standards."}],["$","$L6",null,{"href":"/services/cybersecurity/compliance-management","className":"inline-flex items-center text-primary font-medium group-hover:translate-x-2 transition-all","children":["Learn More ",["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":16,"height":16,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right ml-2","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]]}],["$","div","5",{"className":"bg-white p-8 rounded-lg shadow-md hover:shadow-lg transition-all group","children":[["$","div",null,{"className":"mb-6","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-globe w-10 h-10 text-primary","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","13o1zl",{"d":"M12 2a14.5 14.5 0 0 0 0 20 14.5 14.5 0 0 0 0-20"}],["$","path","9i4pu4",{"d":"M2 12h20"}],"$undefined"]}]}],["$","h3",null,{"className":"text-xl font-bold mb-3 group-hover:text-primary transition-colors","children":"Cloud Security"}],["$","p",null,{"className":"text-gray-600 mb-6","children":"Specialized security solutions for cloud environments and hybrid infrastructure."}],["$","$L6",null,{"href":"/services/cybersecurity/cloud-security","className":"inline-flex items-center text-primary font-medium group-hover:translate-x-2 transition-all","children":["Learn More ",["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":16,"height":16,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right ml-2","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]]}]]}]]}]}],["$","section",null,{"className":"py-16 bg-gray-50","children":["$","div",null,{"className":"container mx-auto px-4","children":[["$","div",null,{"className":"text-center max-w-3xl mx-auto mb-16","children":[["$","h2",null,{"className":"text-3xl font-bold mb-4","children":"Success Stories"}],["$","div",null,{"className":"w-20 h-1 bg-primary mx-auto mb-6"}],["$","p",null,{"className":"text-gray-700","children":"Explore how our cybersecurity services have helped organizations protect their digital assets."}]]}],["$","div",null,{"className":"grid md:grid-cols-3 gap-8","children":[["$","div","0",{"className":"bg-white rounded-lg overflow-hidden shadow-md","children":[["$","div",null,{"className":"relative h-48","children":["$","$L7",null,{"src":"/images/case-finance.jpg","alt":"Financial Institution","fill":true,"className":"object-cover"}]}],["$","div",null,{"className":"p-6","children":[["$","h3",null,{"className":"text-xl font-bold mb-3","children":"Financial Institution"}],["$","p",null,{"className":"text-gray-600 mb-4","children":"Implemented comprehensive security measures for a leading financial institution, protecting sensitive customer data."}],["$","div",null,{"className":"mb-6","children":[["$","h4",null,{"className":"text-sm font-semibold mb-2 text-primary","children":"Key Results:"}],["$","ul",null,{"className":"space-y-1","children":[["$","li","0",{"className":"flex items-start text-sm text-gray-600","children":[["$","div",null,{"className":"bg-primary rounded-full p-0.5 mr-2 mt-1","children":["$","svg",null,{"className":"w-2 h-2 text-white","fill":"none","stroke":"currentColor","viewBox":"0 0 24 24","xmlns":"http://www.w3.org/2000/svg","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":"2","d":"M5 13l4 4L19 7"}]}]}],"99.9% threat detection rate"]}],["$","li","1",{"className":"flex items-start text-sm text-gray-600","children":[["$","div",null,{"className":"bg-primary rounded-full p-0.5 mr-2 mt-1","children":["$","svg",null,{"className":"w-2 h-2 text-white","fill":"none","stroke":"currentColor","viewBox":"0 0 24 24","xmlns":"http://www.w3.org/2000/svg","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":"2","d":"M5 13l4 4L19 7"}]}]}],"Zero data breaches"]}],["$","li","2",{"className":"flex items-start text-sm text-gray-600","children":[["$","div",null,{"className":"bg-primary rounded-full p-0.5 mr-2 mt-1","children":["$","svg",null,{"className":"w-2 h-2 text-white","fill":"none","stroke":"currentColor","viewBox":"0 0 24 24","xmlns":"http://www.w3.org/2000/svg","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":"2","d":"M5 13l4 4L19 7"}]}]}],"Full regulatory compliance"]}]]}]]}]]}]]}],["$","div","1",{"className":"bg-white rounded-lg overflow-hidden shadow-md","children":[["$","div",null,{"className":"relative h-48","children":["$","$L7",null,{"src":"/images/case-healthcare.jpg","alt":"Healthcare Provider","fill":true,"className":"object-cover"}]}],["$","div",null,{"className":"p-6","children":[["$","h3",null,{"className":"text-xl font-bold mb-3","children":"Healthcare Provider"}],["$","p",null,{"className":"text-gray-600 mb-4","children":"Developed and implemented security protocols for a healthcare network, ensuring HIPAA compliance."}],["$","div",null,{"className":"mb-6","children":[["$","h4",null,{"className":"text-sm font-semibold mb-2 text-primary","children":"Key Results:"}],["$","ul",null,{"className":"space-y-1","children":[["$","li","0",{"className":"flex items-start text-sm text-gray-600","children":[["$","div",null,{"className":"bg-primary rounded-full p-0.5 mr-2 mt-1","children":["$","svg",null,{"className":"w-2 h-2 text-white","fill":"none","stroke":"currentColor","viewBox":"0 0 24 24","xmlns":"http://www.w3.org/2000/svg","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":"2","d":"M5 13l4 4L19 7"}]}]}],"100% compliance rate"]}],["$","li","1",{"className":"flex items-start text-sm text-gray-600","children":[["$","div",null,{"className":"bg-primary rounded-full p-0.5 mr-2 mt-1","children":["$","svg",null,{"className":"w-2 h-2 text-white","fill":"none","stroke":"currentColor","viewBox":"0 0 24 24","xmlns":"http://www.w3.org/2000/svg","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":"2","d":"M5 13l4 4L19 7"}]}]}],"60% reduction in security incidents"]}],["$","li","2",{"className":"flex items-start text-sm text-gray-600","children":[["$","div",null,{"className":"bg-primary rounded-full p-0.5 mr-2 mt-1","children":["$","svg",null,{"className":"w-2 h-2 text-white","fill":"none","stroke":"currentColor","viewBox":"0 0 24 24","xmlns":"http://www.w3.org/2000/svg","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":"2","d":"M5 13l4 4L19 7"}]}]}],"Enhanced patient data protection"]}]]}]]}]]}]]}],["$","div","2",{"className":"bg-white rounded-lg overflow-hidden shadow-md","children":[["$","div",null,{"className":"relative h-48","children":["$","$L7",null,{"src":"/images/case-manufacturing.jpg","alt":"E-commerce Platform","fill":true,"className":"object-cover"}]}],["$","div",null,{"className":"p-6","children":[["$","h3",null,{"className":"text-xl font-bold mb-3","children":"E-commerce Platform"}],["$","p",null,{"className":"text-gray-600 mb-4","children":"Secured a major e-commerce platform against sophisticated cyber threats and attacks."}],["$","div",null,{"className":"mb-6","children":[["$","h4",null,{"className":"text-sm font-semibold mb-2 text-primary","children":"Key Results:"}],["$","ul",null,{"className":"space-y-1","children":[["$","li","0",{"className":"flex items-start text-sm text-gray-600","children":[["$","div",null,{"className":"bg-primary rounded-full p-0.5 mr-2 mt-1","children":["$","svg",null,{"className":"w-2 h-2 text-white","fill":"none","stroke":"currentColor","viewBox":"0 0 24 24","xmlns":"http://www.w3.org/2000/svg","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":"2","d":"M5 13l4 4L19 7"}]}]}],"95% reduction in fraud attempts"]}],["$","li","1",{"className":"flex items-start text-sm text-gray-600","children":[["$","div",null,{"className":"bg-primary rounded-full p-0.5 mr-2 mt-1","children":["$","svg",null,{"className":"w-2 h-2 text-white","fill":"none","stroke":"currentColor","viewBox":"0 0 24 24","xmlns":"http://www.w3.org/2000/svg","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":"2","d":"M5 13l4 4L19 7"}]}]}],"Zero downtime from attacks"]}],["$","li","2",{"className":"flex items-start text-sm text-gray-600","children":[["$","div",null,{"className":"bg-primary rounded-full p-0.5 mr-2 mt-1","children":["$","svg",null,{"className":"w-2 h-2 text-white","fill":"none","stroke":"currentColor","viewBox":"0 0 24 24","xmlns":"http://www.w3.org/2000/svg","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":"2","d":"M5 13l4 4L19 7"}]}]}],"Improved customer trust"]}]]}]]}]]}]]}]]}]]}]}]]}],"$undefined",null,["$","$L8",null,{"children":["$L9","$La",null]}]]}],{},null,false]},null,false]},null,false]},null,false],["$","$1","h",{"children":[null,["$","$1","Iyuq0uNHeWHPR3PYQS3ic",{"children":[["$","$Lb",null,{"children":"$Lc"}],null]}],["$","$Ld",null,{"children":"$Le"}]]}],false]],"m":"$undefined","G":["$f","$undefined"],"s":false,"S":true} c:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] 9:null a:null e:[["$","title","0",{"children":"Jijo Consultancy Group"}],["$","meta","1",{"name":"description","content":"Leading IT and business consultancy services"}],["$","meta","2",{"name":"generator","content":"v0.dev"}]]