1:"$Sreact.fragment" 2:I[4210,["8173","static/chunks/8173-87c7dcd56e38d620.js","7177","static/chunks/app/layout-ca3d91052a66f2bb.js"],"ThemeProvider"] 3:I[9164,["8173","static/chunks/8173-87c7dcd56e38d620.js","7177","static/chunks/app/layout-ca3d91052a66f2bb.js"],"MatrixBackground"] 4:I[8125,["8173","static/chunks/8173-87c7dcd56e38d620.js","7177","static/chunks/app/layout-ca3d91052a66f2bb.js"],"SiteHeader"] 5:I[5244,[],""] 6:I[3866,[],""] 7:I[8173,["8173","static/chunks/8173-87c7dcd56e38d620.js","1181","static/chunks/1181-6371330614dae539.js","9912","static/chunks/app/services/architecture-design/page-c28db4c5bcafa08a.js"],""] 8:I[1690,["8173","static/chunks/8173-87c7dcd56e38d620.js","1181","static/chunks/1181-6371330614dae539.js","9912","static/chunks/app/services/architecture-design/page-c28db4c5bcafa08a.js"],"ServicesNavigation"] 9:I[6213,[],"OutletBoundary"] b:I[6213,[],"MetadataBoundary"] d:I[6213,[],"ViewportBoundary"] f:I[4835,[],""] :HL["/_next/static/css/8e2e65fa2b681075.css","style"] 0:{"P":null,"b":"7l5MabaOUWdGNpAmG0bNt","p":"","c":["","services","architecture-design"],"i":false,"f":[[["",{"children":["services",{"children":["architecture-design",{"children":["__PAGE__",{}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/8e2e65fa2b681075.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"en","className":"dark","children":["$","body",null,{"className":"__className_d65c78 min-h-screen bg-black text-white antialiased","children":["$","$L2",null,{"attribute":"class","defaultTheme":"dark","enableSystem":true,"children":["$","div",null,{"className":"relative flex min-h-screen flex-col bg-[#050708]","children":[["$","div",null,{"className":"fixed inset-0 z-0 opacity-5","children":["$","$L3",null,{}]}],["$","$L4",null,{}],["$","main",null,{"className":"relative z-10 flex-1","children":["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[],["$","div",null,{"className":"relative flex min-h-screen flex-col bg-[#050708]","children":[["$","div",null,{"className":"fixed inset-0 z-0 opacity-5","children":["$","$L3",null,{}]}],["$","main",null,{"className":"relative z-10 flex-1 py-12 md:py-20","children":["$","div",null,{"className":"container mx-auto px-4 md:px-6","children":["$","div",null,{"className":"mx-auto max-w-3xl text-center","children":[["$","h1",null,{"className":"mb-6 text-4xl font-bold tracking-tight text-white","children":"Page Not Found"}],["$","p",null,{"className":"mb-8 text-lg text-gray-400","children":"The page you're looking for doesn't exist or has been moved."}],["$","$L7",null,{"href":"/","className":"inline-flex items-center text-[#149142] hover:text-[#107436]","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-left mr-2 h-4 w-4","children":[["$","path","1l729n",{"d":"m12 19-7-7 7-7"}],["$","path","x3x0zl",{"d":"M19 12H5"}],"$undefined"]}],"Back to Home"]}]]}]}]}]]}]],"forbidden":"$undefined","unauthorized":"$undefined"}]}],["$","footer",null,{"className":"relative z-10 border-t border-[#149142]/20 bg-[#050708]/95 py-6 backdrop-blur-md","children":[["$","div",null,{"className":"container max-w-lg mx-auto px-4 md:px-6 mb-14 ","children":[["$","div",null,{"className":"flex mx-auto items-center gap-2 w-full justify-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-mail-check","children":[["$","path","12jkf8",{"d":"M22 13V6a2 2 0 0 0-2-2H4a2 2 0 0 0-2 2v12c0 1.1.9 2 2 2h8"}],["$","path","1ocrg3",{"d":"m22 7-8.97 5.7a1.94 1.94 0 0 1-2.06 0L2 7"}],["$","path","1b14m6",{"d":"m16 19 2 2 4-4"}],"$undefined"]}],["$","h3",null,{"className":"text-center text-xl font-semibold","children":"Newsletter"}]]}],["$","p",null,{"className":"my-4","children":"Subscribe to our newsletter for updates and special offers."}],["$","div",null,{"className":"flex","children":[["$","input",null,{"type":"email","placeholder":"Your email","className":"w-full rounded-l-md border border-[#149142]/30 bg-[#050708]/80 px-3 py-2 text-sm text-white placeholder:text-gray-500 focus:border-[#149142] focus:outline-none"}],["$","button",null,{"className":"rounded-r-md bg-[#149142] px-3 py-2 text-sm font-medium text-white hover:bg-[#107436]","children":"Subscribe"}]]}]]}],["$","div",null,{"className":"container mx-auto px-4 md:px-6 border-t pt-4","children":[["$","div",null,{"className":"grid gap-8 md:grid-cols-2 lg:grid-cols-4","children":[["$","div",null,{"children":[["$","$L7",null,{"href":"/","className":"flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield h-8 w-8 text-[#149142]","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}],["$","span",null,{"className":"ml-2 text-xl font-bold text-white","children":[["$","span",null,{"className":"text-[#149142]","children":"IZY"}],"ITS"]}]]}],["$","p",null,{"className":"mt-4 text-sm text-gray-400","children":"We at IZYITS have vast experience with cyber security solution development services and has developed strong competencies for implementing security."}],["$","div",null,{"className":"mt-4 flex space-x-4","children":[["$","$L7","twitter",{"href":"https://twitter.com","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"twitter"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-twitter h-4","children":[["$","path","pff0z6",{"d":"M22 4s-.7 2.1-2 3.4c1.6 10-9.4 17.3-18 11.6 2.2.1 4.4-.6 6-2C3 15.5.5 9.6 3 5c2.2 2.6 5.6 4.1 9 4-.9-4.2 4-6.6 7-3.8 1.1 0 3-1.2 3-1.2z"}],"$undefined"]}],false,false]}]]}],["$","$L7","linkedin",{"href":"https://linkedin.com","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"linkedin"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":[false,["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-linkedin h-4","children":[["$","path","c2jq9f",{"d":"M16 8a6 6 0 0 1 6 6v7h-4v-7a2 2 0 0 0-2-2 2 2 0 0 0-2 2v7h-4v-7a6 6 0 0 1 6-6z"}],["$","rect","mk3on5",{"width":"4","height":"12","x":"2","y":"9"}],["$","circle","bt5ra8",{"cx":"4","cy":"4","r":"2"}],"$undefined"]}],false]}]]}],["$","$L7","facebook",{"href":"https://facebook.com","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"facebook"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":[false,false,["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-facebook h-4","children":[["$","path","1jg4f8",{"d":"M18 2h-3a5 5 0 0 0-5 5v3H7v4h3v8h4v-8h3l1-4h-4V7a1 1 0 0 1 1-1h3z"}],"$undefined"]}]]}]]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Services"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","Security Assessment",{"children":["$","$L7",null,{"href":"/services/threat-detection","className":"hover:text-[#149142]","children":"Security Assessment"}]}],["$","li","Security Consulting",{"children":["$","$L7",null,{"href":"/services/data-protection","className":"hover:text-[#149142]","children":"Security Consulting"}]}],["$","li","Security Architecture & Design",{"children":["$","$L7",null,{"href":"/services/network-security","className":"hover:text-[#149142]","children":"Security Architecture & Design"}]}],["$","li","Security Deployment",{"children":["$","$L7",null,{"href":"/services/cloud-security","className":"hover:text-[#149142]","children":"Security Deployment"}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Quick Links"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","About Us",{"children":["$","$L7",null,{"href":"/about","className":"text-gray-400 hover:text-white transition-colors","children":"About Us"}]}],["$","li","Careers",{"children":["$","$L7",null,{"href":"/careers","className":"text-gray-400 hover:text-white transition-colors","children":"Careers"}]}],["$","li","Partners",{"children":["$","$L7",null,{"href":"/partners","className":"text-gray-400 hover:text-white transition-colors","children":"Partners"}]}],["$","li","Contact Us",{"children":["$","$L7",null,{"href":"/contact","className":"text-gray-400 hover:text-white transition-colors","children":"Contact Us"}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Legal"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","Privacy Policy",{"children":["$","$L7",null,{"href":"/privacy-policy","className":"text-gray-400 hover:text-white transition-colors","children":"Privacy Policy"}]}],["$","li","Terms & Conditions",{"children":["$","$L7",null,{"href":"/terms-of-service","className":"text-gray-400 hover:text-white transition-colors","children":"Terms & Conditions"}]}],["$","li","Cookie Policy",{"children":["$","$L7",null,{"href":"/cookie-policy","className":"text-gray-400 hover:text-white transition-colors","children":"Cookie Policy"}]}],["$","li","Security Policy",{"children":["$","$L7",null,{"href":"/security-policy","className":"text-gray-400 hover:text-white transition-colors","children":"Security Policy"}]}],["$","li","Disclaimer",{"children":["$","$L7",null,{"href":"/security-policy","className":"text-gray-400 hover:text-white transition-colors","children":"Disclaimer"}]}]]}]]}]]}],["$","div",null,{"className":"mt-8 border-t border-[#149142]/20 pt-8 text-center text-sm text-gray-500","children":["$","p",null,{"children":["© ",2025," IZYITS. All rights reserved."]}]}]]}]]}]]}]}]}]}]]}],{"children":["services",["$","$1","c",{"children":[null,["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children","services","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["architecture-design",["$","$1","c",{"children":[null,["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children","services","children","architecture-design","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","div",null,{"className":"container mx-auto px-4 py-12 md:py-16","children":[["$","h1",null,{"className":"text-3xl md:text-4xl font-bold text-white mb-4","children":"Architecture & Design"}],["$","p",null,{"className":"text-gray-300 text-lg mb-8 max-w-3xl","children":"IZYITS provides expert security architecture and design services to help organizations build secure and resilient IT environments that protect their data and applications."}],["$","div",null,{"className":"flex flex-col lg:flex-row gap-8","children":[["$","$L8",null,{}],["$","div",null,{"className":"flex-1 bg-[#050708] border border-[#149142]/20 rounded-lg p-6","children":[["$","div",null,{"className":"mb-8","children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"Building Secure Foundations"}],["$","p",null,{"className":"text-gray-300 mb-4","children":"Our security architecture and design services help you build secure foundations for your IT environment. We work with you to understand your business requirements and security needs, and then design architectures that provide the right level of protection."}],["$","p",null,{"className":"text-gray-300 mb-4","children":"We follow industry best practices and frameworks such as NIST, ISO, and CIS to ensure your architecture meets recognized security standards. Our designs incorporate defense-in-depth strategies to provide multiple layers of protection against threats."}]]}],["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-2 gap-6","children":[["$","$L7","Architecture Review & Design",{"href":"/services/architecture-design/architecture-review-design","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-panels-top-left h-10 w-10 text-[#149142] mb-4","children":[["$","rect","afitv7",{"width":"18","height":"18","x":"3","y":"3","rx":"2"}],["$","path","1pudct",{"d":"M3 9h18"}],["$","path","1oto5p",{"d":"M9 21V9"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Architecture Review & Design"}],["$","p",null,{"className":"text-gray-300","children":"Comprehensive review and design of your security architecture to ensure it meets your business needs and security requirements."}]]}],["$","$L7","Network & Cloud Security Architecture",{"href":"/services/architecture-design/network-cloud-security-architecture","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-network h-10 w-10 text-[#149142] mb-4","children":[["$","rect","4q2zg0",{"x":"16","y":"16","width":"6","height":"6","rx":"1"}],["$","rect","8cvhb9",{"x":"2","y":"16","width":"6","height":"6","rx":"1"}],["$","rect","1egb70",{"x":"9","y":"2","width":"6","height":"6","rx":"1"}],["$","path","1jsf9p",{"d":"M5 16v-3a1 1 0 0 1 1-1h12a1 1 0 0 1 1 1v3"}],["$","path","2874zd",{"d":"M12 12V8"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Network & Cloud Security Architecture"}],["$","p",null,{"className":"text-gray-300","children":"Design and implement secure network and cloud architectures that protect your data and applications."}]]}],["$","$L7","Zero Trust & IAM Design",{"href":"/services/architecture-design/zero-trust-iam-design","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-lock h-10 w-10 text-[#149142] mb-4","children":[["$","rect","1w4ew1",{"width":"18","height":"11","x":"3","y":"11","rx":"2","ry":"2"}],["$","path","fwvmzm",{"d":"M7 11V7a5 5 0 0 1 10 0v4"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Zero Trust & IAM Design"}],["$","p",null,{"className":"text-gray-300","children":"Design and implement Zero Trust security models and Identity and Access Management solutions."}]]}],["$","$L7","Microsoft 365 Security Design",{"href":"/services/architecture-design/microsoft-365-security-design","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-cloud h-10 w-10 text-[#149142] mb-4","children":[["$","path","p7xjir",{"d":"M17.5 19H9a7 7 0 1 1 6.71-9h1.79a4.5 4.5 0 1 1 0 9Z"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Microsoft 365 Security Design"}],["$","p",null,{"className":"text-gray-300","children":"Design and implement security controls for Microsoft 365 environments to protect your data and users."}]]}],["$","$L7","Secure Remote Work Solutions",{"href":"/services/architecture-design/secure-remote-work-solutions","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-monitor h-10 w-10 text-[#149142] mb-4","children":[["$","rect","48i651",{"width":"20","height":"14","x":"2","y":"3","rx":"2"}],["$","line","1svkeh",{"x1":"8","x2":"16","y1":"21","y2":"21"}],["$","line","vw1qmm",{"x1":"12","x2":"12","y1":"17","y2":"21"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Secure Remote Work Solutions"}],["$","p",null,{"className":"text-gray-300","children":"Design and implement secure remote work solutions that enable productivity while maintaining security."}]]}],["$","$L7","Endpoint Protection Solutions",{"href":"/services/architecture-design/endpoint-protection-solutions","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield h-10 w-10 text-[#149142] mb-4","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Endpoint Protection Solutions"}],["$","p",null,{"className":"text-gray-300","children":"Design and implement endpoint protection solutions to secure your devices against threats."}]]}],["$","$L7","Azure Security",{"href":"/services/architecture-design/azure-security","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-database h-10 w-10 text-[#149142] mb-4","children":[["$","ellipse","msslwz",{"cx":"12","cy":"5","rx":"9","ry":"3"}],["$","path","1wlel7",{"d":"M3 5V19A9 3 0 0 0 21 19V5"}],["$","path","mv7ke4",{"d":"M3 12A9 3 0 0 0 21 12"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Azure Security"}],["$","p",null,{"className":"text-gray-300","children":"Design and implement security controls for Azure environments to protect your cloud resources."}]]}]]}]]}]]}]]}],null,["$","$L9",null,{"children":"$La"}]]}],{},null,false]},null,false]},[null,[],[]],false]},[["$","div","l",{"className":"flex h-screen w-full items-center justify-center","children":["$","div",null,{"className":"flex flex-col items-center","children":[["$","div",null,{"className":"h-12 w-12 animate-spin rounded-full border-4 border-[#149142] border-t-transparent"}],["$","p",null,{"className":"mt-4 text-[#149142]","children":"Loading..."}]]}]}],[],[]],false],["$","$1","h",{"children":[null,["$","$1","M7tn96bpX2HvHnlWWzbxP",{"children":[["$","$Lb",null,{"children":"$Lc"}],["$","$Ld",null,{"children":"$Le"}],null]}]]}],false]],"m":"$undefined","G":["$f","$undefined"],"s":false,"S":true} e:[["$","meta","0",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] c:[["$","meta","0",{"charSet":"utf-8"}],["$","title","1",{"children":"IZYITS - Advanced Cybersecurity Solutions"}],["$","meta","2",{"name":"description","content":"Protecting your digital assets with cutting-edge security solutions. IZYITS delivers enterprise-grade cybersecurity services tailored to your business needs."}],["$","meta","3",{"name":"generator","content":"v0.dev"}]] a:null