1:"$Sreact.fragment" 2:I[9304,["874","static/chunks/874-15a3df30cc819263.js","63","static/chunks/63-9793768097f3136b.js","598","static/chunks/598-fbec8651084d7a7e.js","113","static/chunks/113-0acff916c53695f8.js","275","static/chunks/275-fb57a2932c9f4252.js","177","static/chunks/app/layout-20c82510956964c1.js"],"ThemeProvider"] 3:I[2048,["874","static/chunks/874-15a3df30cc819263.js","63","static/chunks/63-9793768097f3136b.js","598","static/chunks/598-fbec8651084d7a7e.js","113","static/chunks/113-0acff916c53695f8.js","275","static/chunks/275-fb57a2932c9f4252.js","177","static/chunks/app/layout-20c82510956964c1.js"],"MainNav"] 4:I[7555,[],""] 5:I[1295,[],""] 6:I[6874,["874","static/chunks/874-15a3df30cc819263.js","63","static/chunks/63-9793768097f3136b.js","328","static/chunks/app/solutions/cyber-security/page-234a7ce4c6ef567d.js"],""] 7:I[3063,["874","static/chunks/874-15a3df30cc819263.js","63","static/chunks/63-9793768097f3136b.js","328","static/chunks/app/solutions/cyber-security/page-234a7ce4c6ef567d.js"],"Image"] 8:I[6471,["874","static/chunks/874-15a3df30cc819263.js","63","static/chunks/63-9793768097f3136b.js","598","static/chunks/598-fbec8651084d7a7e.js","113","static/chunks/113-0acff916c53695f8.js","275","static/chunks/275-fb57a2932c9f4252.js","177","static/chunks/app/layout-20c82510956964c1.js"],"Toaster"] 9:I[9286,["874","static/chunks/874-15a3df30cc819263.js","63","static/chunks/63-9793768097f3136b.js","328","static/chunks/app/solutions/cyber-security/page-234a7ce4c6ef567d.js"],"ScrollAnimation"] a:I[9665,[],"OutletBoundary"] d:I[9665,[],"ViewportBoundary"] f:I[9665,[],"MetadataBoundary"] 11:I[6614,[],""] :HL["/_next/static/css/16f26e3c376f6bbb.css","style"] 0:{"P":null,"b":"WJQfZPkk1y0nFEgwyInXU","p":"","c":["","solutions","cyber-security"],"i":false,"f":[[["",{"children":["solutions",{"children":["cyber-security",{"children":["__PAGE__",{}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/16f26e3c376f6bbb.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"en","suppressHydrationWarning":true,"children":["$","body",null,{"className":"__className_e8ce0c","children":["$","$L2",null,{"attribute":"class","defaultTheme":"light","enableSystem":true,"disableTransitionOnChange":true,"children":[["$","div",null,{"className":"flex flex-col min-h-screen","children":[["$","$L3",null,{}],["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}],["$","footer",null,{"className":"bg-true-black text-white py-12","children":["$","div",null,{"className":"container mx-auto max-w-7xl px-4 sm:px-6 lg:px-8","children":[["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-4 gap-8","children":[["$","div",null,{"className":"space-y-4","children":[["$","$L6",null,{"href":"/","children":["$","$L7",null,{"src":"/images/footer.jpg","alt":"Imagyn Technologies Logo","width":150,"height":50,"className":"h-auto"}]}],["$","p",null,{"className":"text-gray-400","children":"Technology that moves you forward."}],["$","div",null,{"className":"flex space-x-4","children":[["$","$L6",null,{"href":"https://www.facebook.com/share/1CGoAxE3Ux/","target":"_blank","rel":"noopener noreferrer","className":"text-gray-400 hover:text-golden-grass","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":"24","target":"blank","height":"24","viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":"2","strokeLinecap":"round","strokeLinejoin":"round","className":"h-5 w-5","children":["$","path",null,{"d":"M18 2h-3a5 5 0 0 0-5 5v3H7v4h3v8h4v-8h3l1-4h-4V7a1 1 0 0 1 1-1h3z"}]}]}],["$","$L6",null,{"href":"https://www.linkedin.com/company/imagyn-technologies-infocam/posts/?feedView=all","target":"_blank","rel":"noopener noreferrer","className":"text-gray-400 hover:text-golden-grass","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":"24","height":"24","viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":"2","strokeLinecap":"round","strokeLinejoin":"round","className":"h-5 w-5","children":[["$","path",null,{"d":"M16 8a6 6 0 0 1 6 6v7h-4v-7a2 2 0 0 0-2-2 2 2 0 0 0-2 2v7h-4v-7a6 6 0 0 1 6-6z"}],["$","rect",null,{"x":"2","y":"9","width":"4","height":"12"}],["$","circle",null,{"cx":"4","cy":"4","r":"2"}]]}]}],["$","a",null,{"href":"https://www.instagram.com/imagyntechnologies?igsh=dHd4cXRsOTB5ZGZm","target":"_blank","rel":"noopener noreferrer","className":"text-gray-400 hover:text-golden-grass","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":"24","height":"24","viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":"2","strokeLinecap":"round","strokeLinejoin":"round","className":"h-5 w-5","children":[["$","rect",null,{"x":"2","y":"2","width":"20","height":"20","rx":"5","ry":"5"}],["$","path",null,{"d":"M16 11.37A4 4 0 1 1 12.63 8 4 4 0 0 1 16 11.37z"}],["$","line",null,{"x1":"17.5","y1":"6.5","x2":"17.5","y2":"6.5"}]]}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-lg font-bold mb-4","children":"Solutions"}],["$","ul",null,{"className":"space-y-2","children":[["$","li",null,{"children":["$","$L6",null,{"href":"/solutions/info-cam","className":"text-gray-400 hover:text-golden-grass","children":"Info Cam"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/solutions/ai-surveillance","className":"text-gray-400 hover:text-golden-grass","children":"AI-Powered Surveillance"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/solutions/anti-counterfeit","className":"text-gray-400 hover:text-golden-grass","children":"Anti-Counterfeit Solutions"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/solutions/cyber-security","className":"text-gray-400 hover:text-golden-grass","children":"Cyber Security"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/solutions/financial-applications","className":"text-gray-400 hover:text-golden-grass","children":"Financial Applications"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/solutions/fintech-applications","className":"text-gray-400 hover:text-golden-grass","children":"Fintech-Based Applications"}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-lg font-bold mb-4","children":"Company"}],["$","ul",null,{"className":"space-y-2","children":[["$","li",null,{"children":["$","$L6",null,{"href":"/about-us","className":"text-gray-400 hover:text-golden-grass","children":"About Us"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/why-us","className":"text-gray-400 hover:text-golden-grass","children":"Why Us"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/testimonials","className":"text-gray-400 hover:text-golden-grass","children":"Testimonials"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/mission","className":"text-gray-400 hover:text-golden-grass","children":"Our Mission"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/directors","className":"text-gray-400 hover:text-golden-grass","children":"Our Directors"}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-lg font-bold mb-4","children":"Contact Us"}],["$","ul",null,{"className":"space-y-2","children":[["$","li",null,{"className":"flex items-start gap-2","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":"24","height":"24","viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":"2","strokeLinecap":"round","strokeLinejoin":"round","className":"h-5 w-5 text-golden-grass mt-0.5","children":["$","path",null,{"d":"M22 16.92v3a2 2 0 0 1-2.18 2 19.79 19.79 0 0 1-8.63-3.07 19.5 19.5 0 0 1-6-6 19.79 19.79 0 0 1-3.07-8.67A2 2 0 0 1 4.11 2h3a2 2 0 0 1 2 1.72 12.84 12.84 0 0 0 .7 2.81 2 2 0 0 1-.45 2.11L8.09 9.91a16 16 0 0 0 6 6l1.27-1.27a2 2 0 0 1 2.11-.45 12.84 12.84 0 0 0 2.81.7A2 2 0 0 1 22 16.92z"}]}],["$","$L6",null,{"href":"/contact-us","className":"text-gray-400 hover:text-golden-grass","children":"+922134632222"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":"24","height":"24","viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":"2","strokeLinecap":"round","strokeLinejoin":"round","className":"h-5 w-5 text-golden-grass mt-0.5","children":[["$","path",null,{"d":"M4 4h16c1.1 0 2 .9 2 2v12c0 1.1-.9 2-2 2H4c-1.1 0-2-.9-2-2V6c0-1.1.9-2 2-2z"}],["$","polyline",null,{"points":"22,6 12,13 2,6"}]]}],["$","a",null,{"href":"https://mail.google.com/mail/?view=cm&fs=1&to=info@imagyntechnologies.com&su=Website%20Inquiry&body=Hello%20Imagyn,","target":"_blank","rel":"noopener noreferrer","className":"text-gray-400 hover:text-golden-grass","children":"info@imagyntechnologies.com"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":"24","height":"24","viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":"2","strokeLinecap":"round","strokeLinejoin":"round","className":"h-5 w-5 text-golden-grass mt-0.5","children":[["$","path",null,{"d":"M21 10c0 7-9 13-9 13s-9-6-9-13a9 9 0 0 1 18 0z"}],["$","circle",null,{"cx":"12","cy":"10","r":"3"}]]}],["$","$L6",null,{"href":"/contact-us","className":"text-gray-400 hover:text-golden-grass","children":"Bunglow # C-145, Block-14, Gulistan-e-jauhar, karachi."}]]}]]}]]}]]}],["$","div",null,{"className":"border-t border-gray-800 mt-8 pt-8 flex justify-center items-center","children":["$","p",null,{"className":"text-gray-400 text-sm text-center","children":["© ",2025," Imagyn Technologies. All rights reserved."]}]}]]}]}]]}],["$","$L8",null,{}]]}]}]}]]}],{"children":["solutions",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["cyber-security",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","div",null,{"className":"flex flex-col min-h-screen bg-black-100","children":["$","main",null,{"className":"flex-1","children":[["$","section",null,{"className":"relative bg-black-100 py-20 h-[520px]","children":[["$","div",null,{"className":"absolute inset-0 -z-10","children":[["$","$L7",null,{"src":"/images/cyber.png","alt":"Background","fill":true,"className":"object-cover"}],["$","div",null,{"className":"absolute inset-0 bg-black/40"}]]}],["$","div",null,{"className":"container px-4 md:px-6","children":["$","$L9",null,{"children":["$","div",null,{"className":"max-w-4xl mx-auto text-center space-y-6","children":[["$","div",null,{"className":"inline-block bg-golden-grass/20 text-golden-grass px-4 py-1.5 rounded-full text-sm font-medium mb-4","children":"Enterprise Security"}],["$","h1",null,{"className":"text-4xl md:text-5xl font-bold text-white","children":"Cyber Security"}],["$","p",null,{"className":"text-xl text-white","children":"Comprehensive protection for your business in an increasingly complex digital landscape."}],["$","div",null,{"className":"flex flex-col sm:flex-row gap-4 justify-center pt-4","children":["$","$L6",null,{"href":"/contact-us","children":"Request a Security Assessment","className":"inline-flex items-center justify-center gap-2 whitespace-nowrap rounded-md text-sm font-medium ring-offset-background transition-colors focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 disabled:pointer-events-none disabled:opacity-50 [&_svg]:pointer-events-none [&_svg]:size-4 [&_svg]:shrink-0 h-10 px-4 py-2 bg-golden-grass hover:bg-mandalay text-white","ref":null}]}]]}]}]}]]}],["$","section",null,{"className":"py-16 md:py-24 bg-white","children":["$","div",null,{"className":"container px-4 md:px-6","children":[["$","$L9",null,{"children":["$","div",null,{"className":"flex flex-col items-center text-center mb-12","children":[["$","h2",null,{"className":"text-3xl md:text-4xl font-bold text-true-black mb-4","children":"Protecting Your Digital Assets"}],["$","p",null,{"className":"text-gray-600 max-w-3xl md:text-lg","children":"Cyber threats are constantly evolving. Our security solutions help businesses of all sizes safeguard their critical data, systems, and reputation."}],["$","div",null,{"className":"w-20 h-1.5 bg-golden-grass rounded-full mt-6"}]]}]}],["$","div",null,{"className":"grid md:grid-cols-3 gap-8 mt-12","children":[["$","$L9",null,{"delay":100,"children":["$","div",null,{"className":"bg-gray-50 p-6 rounded-lg shadow-md hover:shadow-lg transition-all duration-300","children":[["$","div",null,{"className":"w-14 h-14 bg-golden-grass/20 rounded-lg flex items-center justify-center mb-4","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield h-7 w-7 text-golden-grass","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","h3",null,{"className":"text-xl font-bold text-true-black mb-2","children":"Threat Protection"}],["$","p",null,{"className":"text-gray-600","children":"Intelligent detection and prevention tools that stop security risks before they disrupt your business."}]]}]}],["$","$L9",null,{"delay":200,"children":["$","div",null,{"className":"bg-gray-50 p-6 rounded-lg shadow-md hover:shadow-lg transition-all duration-300","children":[["$","div",null,{"className":"w-14 h-14 bg-golden-grass/20 rounded-lg flex items-center justify-center mb-4","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-lock h-7 w-7 text-golden-grass","children":[["$","rect","1w4ew1",{"width":"18","height":"11","x":"3","y":"11","rx":"2","ry":"2"}],["$","path","fwvmzm",{"d":"M7 11V7a5 5 0 0 1 10 0v4"}],"$undefined"]}]}],["$","h3",null,{"className":"text-xl font-bold text-true-black mb-2","children":"Data Security"}],["$","p",null,{"className":"text-gray-600","children":"Robust strategies including encryption, access controls, and secure storage to keep sensitive information safe"}]]}]}],["$","$L9",null,{"delay":300,"children":["$","div",null,{"className":"bg-gray-50 p-6 rounded-lg shadow-md hover:shadow-lg transition-all duration-300","children":[["$","div",null,{"className":"w-14 h-14 bg-golden-grass/20 rounded-lg flex items-center justify-center mb-4","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-triangle-alert h-7 w-7 text-golden-grass","children":[["$","path","wmoenq",{"d":"m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3"}],["$","path","juzpu7",{"d":"M12 9v4"}],["$","path","p32p05",{"d":"M12 17h.01"}],"$undefined"]}]}],["$","h3",null,{"className":"text-xl font-bold text-true-black mb-2","children":"Incident Response"}],["$","p",null,{"className":"text-gray-600","children":"Swift response and recovery protocols that minimize damage and restore operations with speed and confidence."}]]}]}]]}]]}]}],["$","section",null,{"id":"features","className":"py-16 md:py-24 bg-gray-50","children":["$","div",null,{"className":"container px-4 md:px-6","children":[["$","$L9",null,{"children":["$","div",null,{"className":"flex flex-col items-center text-center mb-12","children":[["$","div",null,{"className":"inline-block bg-golden-grass/20 text-golden-grass px-4 py-1.5 rounded-full text-sm font-medium mb-4","children":"Key Features"}],["$","h2",null,{"className":"text-3xl md:text-4xl font-bold text-true-black mb-4","children":"Comprehensive Security Solutions"}],["$","p",null,{"className":"text-gray-600 max-w-3xl","children":"Our multi-layered approach to cyber security provides complete protection for your business."}],["$","div",null,{"className":"w-20 h-1.5 bg-golden-grass rounded-full mt-6"}]]}]}],["$","div",null,{"className":"max-w-4xl mx-auto mt-12","children":["$","div",null,{"className":"space-y-8","children":[["$","$L9",null,{"delay":100,"children":["$","div",null,{"className":"flex gap-4 bg-white p-6 rounded-lg shadow-md","children":[["$","div",null,{"className":"w-12 h-12 bg-golden-grass/20 rounded-full flex items-center justify-center flex-shrink-0","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield h-6 w-6 text-golden-grass","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold text-true-black mb-2","children":"Network Security"}],["$","p",null,{"className":"text-gray-600","children":"Advanced firewalls, intrusion detection systems, and network monitoring to protect against unauthorized access and malicious traffic."}]]}]]}]}],["$","$L9",null,{"delay":200,"children":["$","div",null,{"className":"flex gap-4 bg-white p-6 rounded-lg shadow-md","children":[["$","div",null,{"className":"w-12 h-12 bg-golden-grass/20 rounded-full flex items-center justify-center flex-shrink-0","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-lock h-6 w-6 text-golden-grass","children":[["$","rect","1w4ew1",{"width":"18","height":"11","x":"3","y":"11","rx":"2","ry":"2"}],["$","path","fwvmzm",{"d":"M7 11V7a5 5 0 0 1 10 0v4"}],"$undefined"]}]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold text-true-black mb-2","children":"Endpoint Protection"}],["$","p",null,{"className":"text-gray-600","children":"Secure all devices connecting to your network with advanced anti-malware, device control, and behavioral analysis."}]]}]]}]}],["$","$L9",null,{"delay":300,"children":["$","div",null,{"className":"flex gap-4 bg-white p-6 rounded-lg shadow-md","children":[["$","div",null,{"className":"w-12 h-12 bg-golden-grass/20 rounded-full flex items-center justify-center flex-shrink-0","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-server h-6 w-6 text-golden-grass","children":[["$","rect","ngkwjq",{"width":"20","height":"8","x":"2","y":"2","rx":"2","ry":"2"}],["$","rect","iecqi9",{"width":"20","height":"8","x":"2","y":"14","rx":"2","ry":"2"}],["$","line","16zg32",{"x1":"6","x2":"6.01","y1":"6","y2":"6"}],["$","line","nzw8ys",{"x1":"6","x2":"6.01","y1":"18","y2":"18"}],"$undefined"]}]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold text-true-black mb-2","children":"Cloud Security"}],["$","p",null,{"className":"text-gray-600","children":"Protect your cloud infrastructure and applications with specialized security controls designed for distributed environments."}]]}]]}]}],["$","$L9",null,{"delay":400,"children":["$","div",null,{"className":"flex gap-4 bg-white p-6 rounded-lg shadow-md","children":[["$","div",null,{"className":"w-12 h-12 bg-golden-grass/20 rounded-full flex items-center justify-center flex-shrink-0","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-database h-6 w-6 text-golden-grass","children":[["$","ellipse","msslwz",{"cx":"12","cy":"5","rx":"9","ry":"3"}],["$","path","1wlel7",{"d":"M3 5V19A9 3 0 0 0 21 19V5"}],["$","path","mv7ke4",{"d":"M3 12A9 3 0 0 0 21 12"}],"$undefined"]}]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold text-true-black mb-2","children":"Data Protection"}],["$","p",null,{"className":"text-gray-600","children":"Comprehensive data security including encryption, data loss prevention, and secure backup solutions to protect your critical information."}]]}]]}]}]]}]}]]}]}],["$","section",null,{"className":"py-16 md:py-24 bg-white","children":["$","div",null,{"className":"container px-4 md:px-6","children":[["$","$L9",null,{"children":["$","div",null,{"className":"flex flex-col items-center text-center mb-12","children":[["$","div",null,{"className":"inline-block bg-golden-grass/20 text-golden-grass px-4 py-1.5 rounded-full text-sm font-medium mb-4","children":"Applications"}],["$","h2",null,{"className":"text-3xl md:text-4xl font-bold text-true-black mb-4","children":"How Organizations Benefit from Our Security Solutions"}],["$","p",null,{"className":"text-gray-600 max-w-3xl","children":"Our security solutions help businesses of all types protect their assets, maintain compliance, and build trust with customers."}],["$","div",null,{"className":"w-20 h-1.5 bg-golden-grass rounded-full mt-6"}]]}]}],["$","div",null,{"className":"grid sm:grid-cols-2 lg:grid-cols-3 gap-8 mt-12","children":[["$","$L9",null,{"delay":100,"children":["$","div",null,{"ref":"$undefined","className":"rounded-lg border bg-card text-card-foreground border-none shadow-lg hover:shadow-xl transition-shadow duration-300","children":["$","div",null,{"ref":"$undefined","className":"p-6","children":[["$","h3",null,{"className":"text-xl font-bold text-true-black mb-4","children":"Small & Medium Businesses"}],["$","ul",null,{"className":"space-y-3","children":[["$","li",null,{"className":"flex items-start","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check h-5 w-5 text-golden-grass mr-2 mt-0.5","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-gray-600","children":"Protect sensitive customer and business data"}]]}],["$","li",null,{"className":"flex items-start","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check h-5 w-5 text-golden-grass mr-2 mt-0.5","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-gray-600","children":"Implement enterprise-grade security on a smaller budget"}]]}],["$","li",null,{"className":"flex items-start","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check h-5 w-5 text-golden-grass mr-2 mt-0.5","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-gray-600","children":"Prevent costly downtime from cyber attacks"}]]}]]}]]}]}]}],["$","$L9",null,{"delay":200,"children":["$","div",null,{"ref":"$undefined","className":"rounded-lg border bg-card text-card-foreground border-none shadow-lg hover:shadow-xl transition-shadow duration-300","children":["$","div",null,{"ref":"$undefined","className":"p-6","children":[["$","h3",null,{"className":"text-xl font-bold text-true-black mb-4","children":"Enterprise Organizations"}],["$","ul",null,{"className":"space-y-3","children":[["$","li",null,{"className":"flex items-start","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check h-5 w-5 text-golden-grass mr-2 mt-0.5","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-gray-600","children":"Secure complex networks spanning multiple locations"}]]}],["$","li",null,{"className":"flex items-start","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check h-5 w-5 text-golden-grass mr-2 mt-0.5","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-gray-600","children":"Protect intellectual property and trade secrets"}]]}],["$","li",null,{"className":"flex items-start","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check h-5 w-5 text-golden-grass mr-2 mt-0.5","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-gray-600","children":"Maintain regulatory compliance across global operations"}]]}]]}]]}]}]}],["$","$L9",null,{"delay":300,"children":["$","div",null,{"ref":"$undefined","className":"rounded-lg border bg-card text-card-foreground border-none shadow-lg hover:shadow-xl transition-shadow duration-300","children":["$","div",null,{"ref":"$undefined","className":"p-6","children":[["$","h3",null,{"className":"text-xl font-bold text-true-black mb-4","children":"Critical Infrastructure"}],["$","ul",null,{"className":"space-y-3","children":[["$","li",null,{"className":"flex items-start","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check h-5 w-5 text-golden-grass mr-2 mt-0.5","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-gray-600","children":"Defend against sophisticated nation-state attacks"}]]}],["$","li",null,{"className":"flex items-start","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check h-5 w-5 text-golden-grass mr-2 mt-0.5","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-gray-600","children":"Implement advanced threat intelligence and monitoring"}]]}],["$","li",null,{"className":"flex items-start","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check h-5 w-5 text-golden-grass mr-2 mt-0.5","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-gray-600","children":"Ensure operational continuity during security events"}]]}]]}]]}]}]}]]}]]}]}],["$","section",null,{"className":"py-16 md:py-24 bg-white","children":["$","div",null,{"className":"container px-4 md:px-6","children":["$","$L9",null,{"children":["$","div",null,{"className":"max-w-3xl mx-auto text-center","children":[["$","h2",null,{"className":"text-3xl md:text-4xl font-bold text-true-black mb-4","children":"Ready to Strengthen Your Security Posture?"}],["$","p",null,{"className":"text-gray-600 mb-8","children":"Discover how our cyber security solutions can protect your business from evolving threats with a personalized security assessment."}],["$","div",null,{"className":"flex flex-col sm:flex-row gap-4 justify-center","children":[["$","$L6",null,{"href":"/contact-us","children":"Request a Security Assessment","className":"inline-flex items-center justify-center gap-2 whitespace-nowrap rounded-md text-sm font-medium ring-offset-background transition-colors focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 disabled:pointer-events-none disabled:opacity-50 [&_svg]:pointer-events-none [&_svg]:size-4 [&_svg]:shrink-0 h-10 px-4 py-2 bg-golden-grass hover:bg-mandalay text-white","ref":null}],["$","$L6",null,{"href":"/solutions","children":"Explore Other Solutions","className":"inline-flex items-center justify-center gap-2 whitespace-nowrap rounded-md text-sm font-medium ring-offset-background transition-colors focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 disabled:pointer-events-none disabled:opacity-50 [&_svg]:pointer-events-none [&_svg]:size-4 [&_svg]:shrink-0 border bg-background hover:text-accent-foreground h-10 px-4 py-2 border-golden-grass text-golden-grass hover:bg-golden-grass/10","ref":null}]]}]]}]}]}]}]]}]}],"$undefined",null,["$","$La",null,{"children":["$Lb","$Lc",null]}]]}],{},null,false]},null,false]},null,false]},null,false],["$","$1","h",{"children":[null,["$","$1","yLqP-mJhYt0dGDifs465-",{"children":[["$","$Ld",null,{"children":"$Le"}],null]}],["$","$Lf",null,{"children":"$L10"}]]}],false]],"m":"$undefined","G":["$11","$undefined"],"s":false,"S":true} e:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] b:null c:null 10:[["$","title","0",{"children":"Imagyn Technologies"}],["$","meta","1",{"name":"description","content":"Technology that moves you forward."}],["$","meta","2",{"name":"generator","content":"v0.dev"}],["$","link","3",{"rel":"shortcut icon","href":"images/footer.jpg"}],["$","link","4",{"rel":"icon","href":"images/imglogo.jpg"}]]