1:"$Sreact.fragment" 2:I[4210,["8173","static/chunks/8173-87c7dcd56e38d620.js","7177","static/chunks/app/layout-ca3d91052a66f2bb.js"],"ThemeProvider"] 3:I[9164,["8173","static/chunks/8173-87c7dcd56e38d620.js","7177","static/chunks/app/layout-ca3d91052a66f2bb.js"],"MatrixBackground"] 4:I[8125,["8173","static/chunks/8173-87c7dcd56e38d620.js","7177","static/chunks/app/layout-ca3d91052a66f2bb.js"],"SiteHeader"] 5:I[5244,[],""] 6:I[3866,[],""] 7:I[8173,["8173","static/chunks/8173-87c7dcd56e38d620.js","1181","static/chunks/1181-6371330614dae539.js","399","static/chunks/app/services/assessment-penetration-testing/page-a21015770699bd0f.js"],""] 8:I[1690,["8173","static/chunks/8173-87c7dcd56e38d620.js","1181","static/chunks/1181-6371330614dae539.js","679","static/chunks/app/services/assessment-penetration-testing/microsoft-365-security-assessment/page-b4e99ad4b0e38c3b.js"],"ServicesNavigation"] 9:I[6213,[],"OutletBoundary"] b:I[6213,[],"MetadataBoundary"] d:I[6213,[],"ViewportBoundary"] f:I[4835,[],""] :HL["/_next/static/css/8e2e65fa2b681075.css","style"] 0:{"P":null,"b":"7l5MabaOUWdGNpAmG0bNt","p":"","c":["","services","assessment-penetration-testing","microsoft-365-security-assessment"],"i":false,"f":[[["",{"children":["services",{"children":["assessment-penetration-testing",{"children":["microsoft-365-security-assessment",{"children":["__PAGE__",{}]}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/8e2e65fa2b681075.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"en","className":"dark","children":["$","body",null,{"className":"__className_d65c78 min-h-screen bg-black text-white antialiased","children":["$","$L2",null,{"attribute":"class","defaultTheme":"dark","enableSystem":true,"children":["$","div",null,{"className":"relative flex min-h-screen flex-col bg-[#050708]","children":[["$","div",null,{"className":"fixed inset-0 z-0 opacity-5","children":["$","$L3",null,{}]}],["$","$L4",null,{}],["$","main",null,{"className":"relative z-10 flex-1","children":["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[],["$","div",null,{"className":"relative flex min-h-screen flex-col bg-[#050708]","children":[["$","div",null,{"className":"fixed inset-0 z-0 opacity-5","children":["$","$L3",null,{}]}],["$","main",null,{"className":"relative z-10 flex-1 py-12 md:py-20","children":["$","div",null,{"className":"container mx-auto px-4 md:px-6","children":["$","div",null,{"className":"mx-auto max-w-3xl text-center","children":[["$","h1",null,{"className":"mb-6 text-4xl font-bold tracking-tight text-white","children":"Page Not Found"}],["$","p",null,{"className":"mb-8 text-lg text-gray-400","children":"The page you're looking for doesn't exist or has been moved."}],["$","$L7",null,{"href":"/","className":"inline-flex items-center text-[#149142] hover:text-[#107436]","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-left mr-2 h-4 w-4","children":[["$","path","1l729n",{"d":"m12 19-7-7 7-7"}],["$","path","x3x0zl",{"d":"M19 12H5"}],"$undefined"]}],"Back to Home"]}]]}]}]}]]}]],"forbidden":"$undefined","unauthorized":"$undefined"}]}],["$","footer",null,{"className":"relative z-10 border-t border-[#149142]/20 bg-[#050708]/95 py-6 backdrop-blur-md","children":[["$","div",null,{"className":"container max-w-lg mx-auto px-4 md:px-6 mb-14 ","children":[["$","div",null,{"className":"flex mx-auto items-center gap-2 w-full justify-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-mail-check","children":[["$","path","12jkf8",{"d":"M22 13V6a2 2 0 0 0-2-2H4a2 2 0 0 0-2 2v12c0 1.1.9 2 2 2h8"}],["$","path","1ocrg3",{"d":"m22 7-8.97 5.7a1.94 1.94 0 0 1-2.06 0L2 7"}],["$","path","1b14m6",{"d":"m16 19 2 2 4-4"}],"$undefined"]}],["$","h3",null,{"className":"text-center text-xl font-semibold","children":"Newsletter"}]]}],["$","p",null,{"className":"my-4","children":"Subscribe to our newsletter for updates and special offers."}],["$","div",null,{"className":"flex","children":[["$","input",null,{"type":"email","placeholder":"Your email","className":"w-full rounded-l-md border border-[#149142]/30 bg-[#050708]/80 px-3 py-2 text-sm text-white placeholder:text-gray-500 focus:border-[#149142] focus:outline-none"}],["$","button",null,{"className":"rounded-r-md bg-[#149142] px-3 py-2 text-sm font-medium text-white hover:bg-[#107436]","children":"Subscribe"}]]}]]}],["$","div",null,{"className":"container mx-auto px-4 md:px-6 border-t pt-4","children":[["$","div",null,{"className":"grid gap-8 md:grid-cols-2 lg:grid-cols-4","children":[["$","div",null,{"children":[["$","$L7",null,{"href":"/","className":"flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield h-8 w-8 text-[#149142]","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}],["$","span",null,{"className":"ml-2 text-xl font-bold text-white","children":[["$","span",null,{"className":"text-[#149142]","children":"IZY"}],"ITS"]}]]}],["$","p",null,{"className":"mt-4 text-sm text-gray-400","children":"We at IZYITS have vast experience with cyber security solution development services and has developed strong competencies for implementing security."}],["$","div",null,{"className":"mt-4 flex space-x-4","children":[["$","$L7","twitter",{"href":"https://twitter.com","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"twitter"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-twitter h-4","children":[["$","path","pff0z6",{"d":"M22 4s-.7 2.1-2 3.4c1.6 10-9.4 17.3-18 11.6 2.2.1 4.4-.6 6-2C3 15.5.5 9.6 3 5c2.2 2.6 5.6 4.1 9 4-.9-4.2 4-6.6 7-3.8 1.1 0 3-1.2 3-1.2z"}],"$undefined"]}],false,false]}]]}],["$","$L7","linkedin",{"href":"https://linkedin.com","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"linkedin"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":[false,["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-linkedin h-4","children":[["$","path","c2jq9f",{"d":"M16 8a6 6 0 0 1 6 6v7h-4v-7a2 2 0 0 0-2-2 2 2 0 0 0-2 2v7h-4v-7a6 6 0 0 1 6-6z"}],["$","rect","mk3on5",{"width":"4","height":"12","x":"2","y":"9"}],["$","circle","bt5ra8",{"cx":"4","cy":"4","r":"2"}],"$undefined"]}],false]}]]}],["$","$L7","facebook",{"href":"https://facebook.com","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"facebook"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":[false,false,["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-facebook h-4","children":[["$","path","1jg4f8",{"d":"M18 2h-3a5 5 0 0 0-5 5v3H7v4h3v8h4v-8h3l1-4h-4V7a1 1 0 0 1 1-1h3z"}],"$undefined"]}]]}]]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Services"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","Security Assessment",{"children":["$","$L7",null,{"href":"/services/threat-detection","className":"hover:text-[#149142]","children":"Security Assessment"}]}],["$","li","Security Consulting",{"children":["$","$L7",null,{"href":"/services/data-protection","className":"hover:text-[#149142]","children":"Security Consulting"}]}],["$","li","Security Architecture & Design",{"children":["$","$L7",null,{"href":"/services/network-security","className":"hover:text-[#149142]","children":"Security Architecture & Design"}]}],["$","li","Security Deployment",{"children":["$","$L7",null,{"href":"/services/cloud-security","className":"hover:text-[#149142]","children":"Security Deployment"}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Quick Links"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","About Us",{"children":["$","$L7",null,{"href":"/about","className":"text-gray-400 hover:text-white transition-colors","children":"About Us"}]}],["$","li","Careers",{"children":["$","$L7",null,{"href":"/careers","className":"text-gray-400 hover:text-white transition-colors","children":"Careers"}]}],["$","li","Partners",{"children":["$","$L7",null,{"href":"/partners","className":"text-gray-400 hover:text-white transition-colors","children":"Partners"}]}],["$","li","Contact Us",{"children":["$","$L7",null,{"href":"/contact","className":"text-gray-400 hover:text-white transition-colors","children":"Contact Us"}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Legal"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","Privacy Policy",{"children":["$","$L7",null,{"href":"/privacy-policy","className":"text-gray-400 hover:text-white transition-colors","children":"Privacy Policy"}]}],["$","li","Terms & Conditions",{"children":["$","$L7",null,{"href":"/terms-of-service","className":"text-gray-400 hover:text-white transition-colors","children":"Terms & Conditions"}]}],["$","li","Cookie Policy",{"children":["$","$L7",null,{"href":"/cookie-policy","className":"text-gray-400 hover:text-white transition-colors","children":"Cookie Policy"}]}],["$","li","Security Policy",{"children":["$","$L7",null,{"href":"/security-policy","className":"text-gray-400 hover:text-white transition-colors","children":"Security Policy"}]}],["$","li","Disclaimer",{"children":["$","$L7",null,{"href":"/security-policy","className":"text-gray-400 hover:text-white transition-colors","children":"Disclaimer"}]}]]}]]}]]}],["$","div",null,{"className":"mt-8 border-t border-[#149142]/20 pt-8 text-center text-sm text-gray-500","children":["$","p",null,{"children":["© ",2025," IZYITS. All rights reserved."]}]}]]}]]}]]}]}]}]}]]}],{"children":["services",["$","$1","c",{"children":[null,["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children","services","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["assessment-penetration-testing",["$","$1","c",{"children":[null,["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children","services","children","assessment-penetration-testing","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["microsoft-365-security-assessment",["$","$1","c",{"children":[null,["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children","services","children","assessment-penetration-testing","children","microsoft-365-security-assessment","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","div",null,{"className":"container mx-auto px-4 py-12 md:py-16","children":[["$","h1",null,{"className":"text-3xl md:text-4xl font-bold text-white mb-4","children":"Microsoft 365 Security Assessment"}],["$","p",null,{"className":"text-gray-300 text-lg mb-8 max-w-3xl","children":"Comprehensive evaluation of your Microsoft 365 environment to identify security gaps and recommend improvements."}],["$","div",null,{"className":"flex flex-col lg:flex-row gap-8","children":[["$","$L8",null,{}],["$","div",null,{"className":"flex-1 bg-[#050708] border border-[#149142]/20 rounded-lg p-6","children":["$","div",null,{"className":"space-y-8","children":[["$","section",null,{"children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"Overview"}],["$","p",null,{"className":"text-gray-300 mb-4","children":"IZYITS's Microsoft 365 Security Assessment provides a comprehensive evaluation of your Microsoft 365 environment to identify security gaps, misconfigurations, and areas for improvement. Our assessment covers all aspects of Microsoft 365 security, including identity and access management, data protection, threat protection, and security management."}],["$","p",null,{"className":"text-gray-300","children":"Our team of Microsoft-certified security experts uses a combination of automated tools and manual techniques to thoroughly assess your Microsoft 365 environment against industry best practices and Microsoft's security recommendations. We provide detailed findings and actionable recommendations to help you strengthen your Microsoft 365 security posture."}]]}],["$","section",null,{"children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"Key Benefits"}],["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-2 gap-6","children":[["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big h-8 w-8 text-[#149142] mb-3","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Comprehensive Security Visibility"}],["$","p",null,{"className":"text-gray-300","children":"Gain a complete understanding of your Microsoft 365 security posture and potential vulnerabilities."}]]}],["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big h-8 w-8 text-[#149142] mb-3","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Risk Reduction"}],["$","p",null,{"className":"text-gray-300","children":"Identify and address security gaps before they can be exploited by attackers, reducing your organization's risk."}]]}],["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big h-8 w-8 text-[#149142] mb-3","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Compliance Support"}],["$","p",null,{"className":"text-gray-300","children":"Ensure your Microsoft 365 environment meets regulatory requirements and industry standards."}]]}],["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big h-8 w-8 text-[#149142] mb-3","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Optimization of Security Controls"}],["$","p",null,{"className":"text-gray-300","children":"Maximize the effectiveness of your Microsoft 365 security controls and features."}]]}]]}]]}],["$","section",null,{"children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"Assessment Areas"}],["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-2 gap-6","children":[["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-lock h-10 w-10 text-[#149142] mb-4","children":[["$","rect","1w4ew1",{"width":"18","height":"11","x":"3","y":"11","rx":"2","ry":"2"}],["$","path","fwvmzm",{"d":"M7 11V7a5 5 0 0 1 10 0v4"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Identity & Access Management"}],["$","ul",null,{"className":"space-y-2 text-gray-300","children":[["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Microsoft Entra ID (Azure AD) configuration and security settings"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Multi-factor authentication implementation"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Conditional Access policies"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Privileged access management"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Password policies and authentication methods"}]]}]]}]]}],["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield h-10 w-10 text-[#149142] mb-4","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Threat Protection"}],["$","ul",null,{"className":"space-y-2 text-gray-300","children":[["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Microsoft Defender for Office 365 configuration"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Anti-phishing, anti-malware, and anti-spam settings"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Safe Links and Safe Attachments policies"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Attack simulation training"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Threat intelligence and investigation capabilities"}]]}]]}]]}],["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-cloud h-10 w-10 text-[#149142] mb-4","children":[["$","path","p7xjir",{"d":"M17.5 19H9a7 7 0 1 1 6.71-9h1.79a4.5 4.5 0 1 1 0 9Z"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Data Protection"}],["$","ul",null,{"className":"space-y-2 text-gray-300","children":[["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Information protection and data loss prevention policies"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Sensitivity labels and retention policies"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"SharePoint and OneDrive security settings"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Teams security and compliance settings"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Email encryption and rights management"}]]}]]}]]}],["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-file-text h-10 w-10 text-[#149142] mb-4","children":[["$","path","1rqfz7",{"d":"M15 2H6a2 2 0 0 0-2 2v16a2 2 0 0 0 2 2h12a2 2 0 0 0 2-2V7Z"}],["$","path","tnqrlb",{"d":"M14 2v4a2 2 0 0 0 2 2h4"}],["$","path","b1mrlr",{"d":"M10 9H8"}],["$","path","t4e002",{"d":"M16 13H8"}],["$","path","z1uh3a",{"d":"M16 17H8"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Security Management"}],["$","ul",null,{"className":"space-y-2 text-gray-300","children":[["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Microsoft Secure Score and improvement actions"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Security and compliance center configuration"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Audit logging and alert policies"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"eDiscovery and legal hold capabilities"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Security and compliance roles and permissions"}]]}]]}]]}]]}]]}],["$","section",null,{"children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"Our Assessment Methodology"}],["$","div",null,{"className":"space-y-6","children":[["$","div",null,{"className":"flex items-start gap-4","children":[["$","div",null,{"className":"flex-shrink-0 w-10 h-10 rounded-full bg-[#149142]/20 flex items-center justify-center","children":["$","span",null,{"className":"text-[#149142] font-bold","children":"1"}]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Discovery & Planning"}],["$","p",null,{"className":"text-gray-300","children":"We work with you to understand your Microsoft 365 environment, business requirements, and security objectives. We also gather information about your current security controls and configurations."}]]}]]}],["$","div",null,{"className":"flex items-start gap-4","children":[["$","div",null,{"className":"flex-shrink-0 w-10 h-10 rounded-full bg-[#149142]/20 flex items-center justify-center","children":["$","span",null,{"className":"text-[#149142] font-bold","children":"2"}]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Automated Assessment"}],["$","p",null,{"className":"text-gray-300","children":"We use specialized tools to automatically assess your Microsoft 365 environment against hundreds of security best practices and configuration checks."}]]}]]}],["$","div",null,{"className":"flex items-start gap-4","children":[["$","div",null,{"className":"flex-shrink-0 w-10 h-10 rounded-full bg-[#149142]/20 flex items-center justify-center","children":["$","span",null,{"className":"text-[#149142] font-bold","children":"3"}]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Manual Verification & Analysis"}],["$","p",null,{"className":"text-gray-300","children":"Our security experts manually verify the automated findings and perform additional checks to ensure comprehensive coverage and eliminate false positives."}]]}]]}],["$","div",null,{"className":"flex items-start gap-4","children":[["$","div",null,{"className":"flex-shrink-0 w-10 h-10 rounded-full bg-[#149142]/20 flex items-center justify-center","children":["$","span",null,{"className":"text-[#149142] font-bold","children":"4"}]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Risk Assessment"}],["$","p",null,{"className":"text-gray-300","children":"We analyze the findings to determine the risk level of each security gap based on factors such as potential impact, likelihood of exploitation, and existing mitigating controls."}]]}]]}],["$","div",null,{"className":"flex items-start gap-4","children":[["$","div",null,{"className":"flex-shrink-0 w-10 h-10 rounded-full bg-[#149142]/20 flex items-center justify-center","children":["$","span",null,{"className":"text-[#149142] font-bold","children":"5"}]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Reporting & Recommendations"}],["$","p",null,{"className":"text-gray-300","children":"We provide a comprehensive report detailing our findings, including security gaps, risk ratings, and detailed remediation recommendations prioritized by risk level."}]]}]]}],["$","div",null,{"className":"flex items-start gap-4","children":[["$","div",null,{"className":"flex-shrink-0 w-10 h-10 rounded-full bg-[#149142]/20 flex items-center justify-center","children":["$","span",null,{"className":"text-[#149142] font-bold","children":"6"}]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Remediation Support"}],["$","p",null,{"className":"text-gray-300","children":"We provide guidance and support to help you implement our recommendations and improve your Microsoft 365 security posture."}]]}]]}]]}]]}],["$","section",null,{"children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"Deliverables"}],["$","div",null,{"className":"space-y-4","children":[["$","div",null,{"className":"flex items-start gap-4","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-file-text h-6 w-6 text-[#149142] flex-shrink-0 mt-1","children":[["$","path","1rqfz7",{"d":"M15 2H6a2 2 0 0 0-2 2v16a2 2 0 0 0 2 2h12a2 2 0 0 0 2-2V7Z"}],["$","path","tnqrlb",{"d":"M14 2v4a2 2 0 0 0 2 2h4"}],["$","path","b1mrlr",{"d":"M10 9H8"}],["$","path","t4e002",{"d":"M16 13H8"}],["$","path","z1uh3a",{"d":"M16 17H8"}],"$undefined"]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-lg font-bold text-white mb-1","children":"Executive Summary"}],["$","p",null,{"className":"text-gray-300","children":"High-level overview of the assessment, key findings, and strategic recommendations for executive stakeholders."}]]}]]}],["$","div",null,{"className":"flex items-start gap-4","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-file-text h-6 w-6 text-[#149142] flex-shrink-0 mt-1","children":[["$","path","1rqfz7",{"d":"M15 2H6a2 2 0 0 0-2 2v16a2 2 0 0 0 2 2h12a2 2 0 0 0 2-2V7Z"}],["$","path","tnqrlb",{"d":"M14 2v4a2 2 0 0 0 2 2h4"}],["$","path","b1mrlr",{"d":"M10 9H8"}],["$","path","t4e002",{"d":"M16 13H8"}],["$","path","z1uh3a",{"d":"M16 17H8"}],"$undefined"]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-lg font-bold text-white mb-1","children":"Detailed Technical Report"}],["$","p",null,{"className":"text-gray-300","children":"Comprehensive documentation of all identified security gaps, including technical details and configuration recommendations."}]]}]]}],["$","div",null,{"className":"flex items-start gap-4","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-file-text h-6 w-6 text-[#149142] flex-shrink-0 mt-1","children":[["$","path","1rqfz7",{"d":"M15 2H6a2 2 0 0 0-2 2v16a2 2 0 0 0 2 2h12a2 2 0 0 0 2-2V7Z"}],["$","path","tnqrlb",{"d":"M14 2v4a2 2 0 0 0 2 2h4"}],["$","path","b1mrlr",{"d":"M10 9H8"}],["$","path","t4e002",{"d":"M16 13H8"}],["$","path","z1uh3a",{"d":"M16 17H8"}],"$undefined"]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-lg font-bold text-white mb-1","children":"Microsoft Secure Score Analysis"}],["$","p",null,{"className":"text-gray-300","children":"Detailed analysis of your Microsoft Secure Score with recommendations for improvement."}]]}]]}],["$","div",null,{"className":"flex items-start gap-4","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-file-text h-6 w-6 text-[#149142] flex-shrink-0 mt-1","children":[["$","path","1rqfz7",{"d":"M15 2H6a2 2 0 0 0-2 2v16a2 2 0 0 0 2 2h12a2 2 0 0 0 2-2V7Z"}],["$","path","tnqrlb",{"d":"M14 2v4a2 2 0 0 0 2 2h4"}],["$","path","b1mrlr",{"d":"M10 9H8"}],["$","path","t4e002",{"d":"M16 13H8"}],["$","path","z1uh3a",{"d":"M16 17H8"}],"$undefined"]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-lg font-bold text-white mb-1","children":"Remediation Roadmap"}],["$","p",null,{"className":"text-gray-300","children":"Prioritized recommendations for addressing identified security gaps, including specific remediation steps and best practices."}]]}]]}],["$","div",null,{"className":"flex items-start gap-4","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-file-text h-6 w-6 text-[#149142] flex-shrink-0 mt-1","children":[["$","path","1rqfz7",{"d":"M15 2H6a2 2 0 0 0-2 2v16a2 2 0 0 0 2 2h12a2 2 0 0 0 2-2V7Z"}],["$","path","tnqrlb",{"d":"M14 2v4a2 2 0 0 0 2 2h4"}],["$","path","b1mrlr",{"d":"M10 9H8"}],["$","path","t4e002",{"d":"M16 13H8"}],["$","path","z1uh3a",{"d":"M16 17H8"}],"$undefined"]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-lg font-bold text-white mb-1","children":"Security Configuration Guide"}],["$","p",null,{"className":"text-gray-300","children":"Step-by-step instructions for implementing recommended security configurations and controls."}]]}]]}]]}]]}],["$","section",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"Ready to Secure Your Microsoft 365 Environment?"}],["$","p",null,{"className":"text-gray-300 mb-6","children":"Contact us today to learn how IZYITS's Microsoft 365 Security Assessment can help you identify and address security gaps in your Microsoft 365 environment."}],["$","div",null,{"className":"flex flex-col sm:flex-row gap-4","children":[["$","a",null,{"href":"/contact","className":"inline-flex items-center justify-center px-6 py-3 rounded-md bg-[#149142] text-white font-medium hover:bg-[#107436] transition-colors","children":"Contact Us"}],["$","a",null,{"href":"/book-consultation","className":"inline-flex items-center justify-center px-6 py-3 rounded-md border border-[#149142] text-[#149142] font-medium hover:bg-[#149142]/10 transition-colors","children":"Book a Consultation"}]]}]]}]]}]}]]}]]}],null,["$","$L9",null,{"children":"$La"}]]}],{},null,false]},null,false]},null,false]},[null,[],[]],false]},[["$","div","l",{"className":"flex h-screen w-full items-center justify-center","children":["$","div",null,{"className":"flex flex-col items-center","children":[["$","div",null,{"className":"h-12 w-12 animate-spin rounded-full border-4 border-[#149142] border-t-transparent"}],["$","p",null,{"className":"mt-4 text-[#149142]","children":"Loading..."}]]}]}],[],[]],false],["$","$1","h",{"children":[null,["$","$1","pNCmcLgowDduiY5p1v76Q",{"children":[["$","$Lb",null,{"children":"$Lc"}],["$","$Ld",null,{"children":"$Le"}],null]}]]}],false]],"m":"$undefined","G":["$f","$undefined"],"s":false,"S":true} e:[["$","meta","0",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] c:[["$","meta","0",{"charSet":"utf-8"}],["$","title","1",{"children":"IZYITS - Advanced Cybersecurity Solutions"}],["$","meta","2",{"name":"description","content":"Protecting your digital assets with cutting-edge security solutions. IZYITS delivers enterprise-grade cybersecurity services tailored to your business needs."}],["$","meta","3",{"name":"generator","content":"v0.dev"}]] a:null