1:"$Sreact.fragment" 2:I[4210,["8173","static/chunks/8173-87c7dcd56e38d620.js","7177","static/chunks/app/layout-ca3d91052a66f2bb.js"],"ThemeProvider"] 3:I[9164,["8173","static/chunks/8173-87c7dcd56e38d620.js","7177","static/chunks/app/layout-ca3d91052a66f2bb.js"],"MatrixBackground"] 4:I[8125,["8173","static/chunks/8173-87c7dcd56e38d620.js","7177","static/chunks/app/layout-ca3d91052a66f2bb.js"],"SiteHeader"] 5:I[5244,[],""] 6:I[3866,[],""] 7:I[8173,["8173","static/chunks/8173-87c7dcd56e38d620.js","1181","static/chunks/1181-6371330614dae539.js","9912","static/chunks/app/services/architecture-design/page-c28db4c5bcafa08a.js"],""] 8:I[1690,["8173","static/chunks/8173-87c7dcd56e38d620.js","1181","static/chunks/1181-6371330614dae539.js","717","static/chunks/app/services/architecture-design/zero-trust-iam-design/page-41e3f09140454eff.js"],"ServicesNavigation"] 9:I[6213,[],"OutletBoundary"] b:I[6213,[],"MetadataBoundary"] d:I[6213,[],"ViewportBoundary"] f:I[4835,[],""] :HL["/_next/static/css/8e2e65fa2b681075.css","style"] 0:{"P":null,"b":"7l5MabaOUWdGNpAmG0bNt","p":"","c":["","services","architecture-design","zero-trust-iam-design"],"i":false,"f":[[["",{"children":["services",{"children":["architecture-design",{"children":["zero-trust-iam-design",{"children":["__PAGE__",{}]}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/8e2e65fa2b681075.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"en","className":"dark","children":["$","body",null,{"className":"__className_d65c78 min-h-screen bg-black text-white antialiased","children":["$","$L2",null,{"attribute":"class","defaultTheme":"dark","enableSystem":true,"children":["$","div",null,{"className":"relative flex min-h-screen flex-col bg-[#050708]","children":[["$","div",null,{"className":"fixed inset-0 z-0 opacity-5","children":["$","$L3",null,{}]}],["$","$L4",null,{}],["$","main",null,{"className":"relative z-10 flex-1","children":["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[],["$","div",null,{"className":"relative flex min-h-screen flex-col bg-[#050708]","children":[["$","div",null,{"className":"fixed inset-0 z-0 opacity-5","children":["$","$L3",null,{}]}],["$","main",null,{"className":"relative z-10 flex-1 py-12 md:py-20","children":["$","div",null,{"className":"container mx-auto px-4 md:px-6","children":["$","div",null,{"className":"mx-auto max-w-3xl text-center","children":[["$","h1",null,{"className":"mb-6 text-4xl font-bold tracking-tight text-white","children":"Page Not Found"}],["$","p",null,{"className":"mb-8 text-lg text-gray-400","children":"The page you're looking for doesn't exist or has been moved."}],["$","$L7",null,{"href":"/","className":"inline-flex items-center text-[#149142] hover:text-[#107436]","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-left mr-2 h-4 w-4","children":[["$","path","1l729n",{"d":"m12 19-7-7 7-7"}],["$","path","x3x0zl",{"d":"M19 12H5"}],"$undefined"]}],"Back to Home"]}]]}]}]}]]}]],"forbidden":"$undefined","unauthorized":"$undefined"}]}],["$","footer",null,{"className":"relative z-10 border-t border-[#149142]/20 bg-[#050708]/95 py-6 backdrop-blur-md","children":[["$","div",null,{"className":"container max-w-lg mx-auto px-4 md:px-6 mb-14 ","children":[["$","div",null,{"className":"flex mx-auto items-center gap-2 w-full justify-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-mail-check","children":[["$","path","12jkf8",{"d":"M22 13V6a2 2 0 0 0-2-2H4a2 2 0 0 0-2 2v12c0 1.1.9 2 2 2h8"}],["$","path","1ocrg3",{"d":"m22 7-8.97 5.7a1.94 1.94 0 0 1-2.06 0L2 7"}],["$","path","1b14m6",{"d":"m16 19 2 2 4-4"}],"$undefined"]}],["$","h3",null,{"className":"text-center text-xl font-semibold","children":"Newsletter"}]]}],["$","p",null,{"className":"my-4","children":"Subscribe to our newsletter for updates and special offers."}],["$","div",null,{"className":"flex","children":[["$","input",null,{"type":"email","placeholder":"Your email","className":"w-full rounded-l-md border border-[#149142]/30 bg-[#050708]/80 px-3 py-2 text-sm text-white placeholder:text-gray-500 focus:border-[#149142] focus:outline-none"}],["$","button",null,{"className":"rounded-r-md bg-[#149142] px-3 py-2 text-sm font-medium text-white hover:bg-[#107436]","children":"Subscribe"}]]}]]}],["$","div",null,{"className":"container mx-auto px-4 md:px-6 border-t pt-4","children":[["$","div",null,{"className":"grid gap-8 md:grid-cols-2 lg:grid-cols-4","children":[["$","div",null,{"children":[["$","$L7",null,{"href":"/","className":"flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield h-8 w-8 text-[#149142]","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}],["$","span",null,{"className":"ml-2 text-xl font-bold text-white","children":[["$","span",null,{"className":"text-[#149142]","children":"IZY"}],"ITS"]}]]}],["$","p",null,{"className":"mt-4 text-sm text-gray-400","children":"We at IZYITS have vast experience with cyber security solution development services and has developed strong competencies for implementing security."}],["$","div",null,{"className":"mt-4 flex space-x-4","children":[["$","$L7","twitter",{"href":"https://twitter.com","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"twitter"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-twitter h-4","children":[["$","path","pff0z6",{"d":"M22 4s-.7 2.1-2 3.4c1.6 10-9.4 17.3-18 11.6 2.2.1 4.4-.6 6-2C3 15.5.5 9.6 3 5c2.2 2.6 5.6 4.1 9 4-.9-4.2 4-6.6 7-3.8 1.1 0 3-1.2 3-1.2z"}],"$undefined"]}],false,false]}]]}],["$","$L7","linkedin",{"href":"https://linkedin.com","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"linkedin"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":[false,["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-linkedin h-4","children":[["$","path","c2jq9f",{"d":"M16 8a6 6 0 0 1 6 6v7h-4v-7a2 2 0 0 0-2-2 2 2 0 0 0-2 2v7h-4v-7a6 6 0 0 1 6-6z"}],["$","rect","mk3on5",{"width":"4","height":"12","x":"2","y":"9"}],["$","circle","bt5ra8",{"cx":"4","cy":"4","r":"2"}],"$undefined"]}],false]}]]}],["$","$L7","facebook",{"href":"https://facebook.com","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"facebook"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":[false,false,["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-facebook h-4","children":[["$","path","1jg4f8",{"d":"M18 2h-3a5 5 0 0 0-5 5v3H7v4h3v8h4v-8h3l1-4h-4V7a1 1 0 0 1 1-1h3z"}],"$undefined"]}]]}]]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Services"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","Security Assessment",{"children":["$","$L7",null,{"href":"/services/threat-detection","className":"hover:text-[#149142]","children":"Security Assessment"}]}],["$","li","Security Consulting",{"children":["$","$L7",null,{"href":"/services/data-protection","className":"hover:text-[#149142]","children":"Security Consulting"}]}],["$","li","Security Architecture & Design",{"children":["$","$L7",null,{"href":"/services/network-security","className":"hover:text-[#149142]","children":"Security Architecture & Design"}]}],["$","li","Security Deployment",{"children":["$","$L7",null,{"href":"/services/cloud-security","className":"hover:text-[#149142]","children":"Security Deployment"}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Quick Links"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","About Us",{"children":["$","$L7",null,{"href":"/about","className":"text-gray-400 hover:text-white transition-colors","children":"About Us"}]}],["$","li","Careers",{"children":["$","$L7",null,{"href":"/careers","className":"text-gray-400 hover:text-white transition-colors","children":"Careers"}]}],["$","li","Partners",{"children":["$","$L7",null,{"href":"/partners","className":"text-gray-400 hover:text-white transition-colors","children":"Partners"}]}],["$","li","Contact Us",{"children":["$","$L7",null,{"href":"/contact","className":"text-gray-400 hover:text-white transition-colors","children":"Contact Us"}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Legal"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","Privacy Policy",{"children":["$","$L7",null,{"href":"/privacy-policy","className":"text-gray-400 hover:text-white transition-colors","children":"Privacy Policy"}]}],["$","li","Terms & Conditions",{"children":["$","$L7",null,{"href":"/terms-of-service","className":"text-gray-400 hover:text-white transition-colors","children":"Terms & Conditions"}]}],["$","li","Cookie Policy",{"children":["$","$L7",null,{"href":"/cookie-policy","className":"text-gray-400 hover:text-white transition-colors","children":"Cookie Policy"}]}],["$","li","Security Policy",{"children":["$","$L7",null,{"href":"/security-policy","className":"text-gray-400 hover:text-white transition-colors","children":"Security Policy"}]}],["$","li","Disclaimer",{"children":["$","$L7",null,{"href":"/security-policy","className":"text-gray-400 hover:text-white transition-colors","children":"Disclaimer"}]}]]}]]}]]}],["$","div",null,{"className":"mt-8 border-t border-[#149142]/20 pt-8 text-center text-sm text-gray-500","children":["$","p",null,{"children":["© ",2025," IZYITS. All rights reserved."]}]}]]}]]}]]}]}]}]}]]}],{"children":["services",["$","$1","c",{"children":[null,["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children","services","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["architecture-design",["$","$1","c",{"children":[null,["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children","services","children","architecture-design","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["zero-trust-iam-design",["$","$1","c",{"children":[null,["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children","services","children","architecture-design","children","zero-trust-iam-design","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","div",null,{"className":"container mx-auto px-4 py-12 md:py-16","children":[["$","h1",null,{"className":"text-3xl md:text-4xl font-bold text-white mb-4","children":"Zero Trust & IAM Design"}],["$","p",null,{"className":"text-gray-300 text-lg mb-8 max-w-3xl","children":"Design and implement Zero Trust security models and Identity and Access Management solutions to protect your organization's resources."}],["$","div",null,{"className":"flex flex-col lg:flex-row gap-8","children":[["$","$L8",null,{}],["$","div",null,{"className":"flex-1 bg-[#050708] border border-[#149142]/20 rounded-lg p-6","children":["$","div",null,{"className":"space-y-8","children":[["$","section",null,{"children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"Overview"}],["$","p",null,{"className":"text-gray-300 mb-4","children":"IZYITS's Zero Trust & IAM Design service helps organizations implement modern security architectures based on the principle of \"never trust, always verify.\" We design and implement comprehensive Identity and Access Management (IAM) solutions that ensure only authorized users have access to your resources, regardless of their location or network."}],["$","p",null,{"className":"text-gray-300","children":"Our approach combines industry best practices, cutting-edge technologies, and a deep understanding of your business requirements to create a Zero Trust architecture that enhances security without impeding productivity."}]]}],["$","section",null,{"children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"Key Benefits"}],["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-2 gap-6","children":[["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big h-8 w-8 text-[#149142] mb-3","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Enhanced Security Posture"}],["$","p",null,{"className":"text-gray-300","children":"Implement a security model that assumes no user or device is trusted by default, reducing the risk of unauthorized access."}]]}],["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big h-8 w-8 text-[#149142] mb-3","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Improved User Experience"}],["$","p",null,{"className":"text-gray-300","children":"Provide seamless access to resources for authorized users while maintaining strong security controls."}]]}],["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big h-8 w-8 text-[#149142] mb-3","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Reduced Attack Surface"}],["$","p",null,{"className":"text-gray-300","children":"Limit the potential impact of security breaches by implementing least privilege access and micro-segmentation."}]]}],["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big h-8 w-8 text-[#149142] mb-3","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Regulatory Compliance"}],["$","p",null,{"className":"text-gray-300","children":"Meet regulatory requirements for access control, authentication, and data protection."}]]}]]}]]}],["$","section",null,{"children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"Our Zero Trust Approach"}],["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-3 gap-6","children":[["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-lock h-10 w-10 text-[#149142] mb-4","children":[["$","rect","1w4ew1",{"width":"18","height":"11","x":"3","y":"11","rx":"2","ry":"2"}],["$","path","fwvmzm",{"d":"M7 11V7a5 5 0 0 1 10 0v4"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Verify Explicitly"}],["$","p",null,{"className":"text-gray-300","children":"Always authenticate and authorize based on all available data points, including user identity, location, device health, service or workload, data classification, and anomalies."}]]}],["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield h-10 w-10 text-[#149142] mb-4","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Least Privilege Access"}],["$","p",null,{"className":"text-gray-300","children":"Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection to help secure both data and productivity."}]]}],["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-users h-10 w-10 text-[#149142] mb-4","children":[["$","path","1yyitq",{"d":"M16 21v-2a4 4 0 0 0-4-4H6a4 4 0 0 0-4 4v2"}],["$","circle","nufk8",{"cx":"9","cy":"7","r":"4"}],["$","path","kshegd",{"d":"M22 21v-2a4 4 0 0 0-3-3.87"}],["$","path","1da9ce",{"d":"M16 3.13a4 4 0 0 1 0 7.75"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Assume Breach"}],["$","p",null,{"className":"text-gray-300","children":"Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses."}]]}]]}]]}],["$","section",null,{"children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"IAM Design Components"}],["$","div",null,{"className":"space-y-6","children":[["$","div",null,{"className":"flex items-start gap-4","children":[["$","div",null,{"className":"flex-shrink-0 w-10 h-10 rounded-full bg-[#149142]/20 flex items-center justify-center","children":["$","span",null,{"className":"text-[#149142] font-bold","children":"1"}]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Identity Management"}],["$","p",null,{"className":"text-gray-300","children":"Design and implement solutions for managing user identities, including provisioning, de-provisioning, and lifecycle management."}]]}]]}],["$","div",null,{"className":"flex items-start gap-4","children":[["$","div",null,{"className":"flex-shrink-0 w-10 h-10 rounded-full bg-[#149142]/20 flex items-center justify-center","children":["$","span",null,{"className":"text-[#149142] font-bold","children":"2"}]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Authentication"}],["$","p",null,{"className":"text-gray-300","children":"Implement multi-factor authentication (MFA) and adaptive authentication to ensure only authorized users can access your resources."}]]}]]}],["$","div",null,{"className":"flex items-start gap-4","children":[["$","div",null,{"className":"flex-shrink-0 w-10 h-10 rounded-full bg-[#149142]/20 flex items-center justify-center","children":["$","span",null,{"className":"text-[#149142] font-bold","children":"3"}]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Access Management"}],["$","p",null,{"className":"text-gray-300","children":"Design and implement role-based and attribute-based access control to ensure users have appropriate access to resources."}]]}]]}],["$","div",null,{"className":"flex items-start gap-4","children":[["$","div",null,{"className":"flex-shrink-0 w-10 h-10 rounded-full bg-[#149142]/20 flex items-center justify-center","children":["$","span",null,{"className":"text-[#149142] font-bold","children":"4"}]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Governance"}],["$","p",null,{"className":"text-gray-300","children":"Implement processes and tools for access certification, segregation of duties, and compliance reporting."}]]}]]}],["$","div",null,{"className":"flex items-start gap-4","children":[["$","div",null,{"className":"flex-shrink-0 w-10 h-10 rounded-full bg-[#149142]/20 flex items-center justify-center","children":["$","span",null,{"className":"text-[#149142] font-bold","children":"5"}]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Privileged Access Management"}],["$","p",null,{"className":"text-gray-300","children":"Secure and manage privileged accounts and access to critical systems and data."}]]}]]}]]}]]}],["$","section",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"Ready to Implement Zero Trust?"}],["$","p",null,{"className":"text-gray-300 mb-6","children":"Contact us today to learn how IZYITS can help you design and implement a Zero Trust architecture and IAM solution that enhances your security posture while enabling productivity."}],["$","div",null,{"className":"flex flex-col sm:flex-row gap-4","children":[["$","a",null,{"href":"/contact","className":"inline-flex items-center justify-center px-6 py-3 rounded-md bg-[#149142] text-white font-medium hover:bg-[#107436] transition-colors","children":"Contact Us"}],["$","a",null,{"href":"/book-consultation","className":"inline-flex items-center justify-center px-6 py-3 rounded-md border border-[#149142] text-[#149142] font-medium hover:bg-[#149142]/10 transition-colors","children":"Book a Consultation"}]]}]]}]]}]}]]}]]}],null,["$","$L9",null,{"children":"$La"}]]}],{},null,false]},null,false]},null,false]},[null,[],[]],false]},[["$","div","l",{"className":"flex h-screen w-full items-center justify-center","children":["$","div",null,{"className":"flex flex-col items-center","children":[["$","div",null,{"className":"h-12 w-12 animate-spin rounded-full border-4 border-[#149142] border-t-transparent"}],["$","p",null,{"className":"mt-4 text-[#149142]","children":"Loading..."}]]}]}],[],[]],false],["$","$1","h",{"children":[null,["$","$1","KiM-9U6nbbm_WKv1q9Ida",{"children":[["$","$Lb",null,{"children":"$Lc"}],["$","$Ld",null,{"children":"$Le"}],null]}]]}],false]],"m":"$undefined","G":["$f","$undefined"],"s":false,"S":true} e:[["$","meta","0",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] c:[["$","meta","0",{"charSet":"utf-8"}],["$","title","1",{"children":"IZYITS - Advanced Cybersecurity Solutions"}],["$","meta","2",{"name":"description","content":"Protecting your digital assets with cutting-edge security solutions. IZYITS delivers enterprise-grade cybersecurity services tailored to your business needs."}],["$","meta","3",{"name":"generator","content":"v0.dev"}]] a:null