1:"$Sreact.fragment" 2:I[84210,["8173","static/chunks/8173-297bb60690d4c74b.js","7177","static/chunks/app/layout-dc148b6df43bafd4.js"],"ThemeProvider"] 3:I[49164,["8173","static/chunks/8173-297bb60690d4c74b.js","7177","static/chunks/app/layout-dc148b6df43bafd4.js"],"MatrixBackground"] 4:I[89633,["8173","static/chunks/8173-297bb60690d4c74b.js","7177","static/chunks/app/layout-dc148b6df43bafd4.js"],"SiteHeader"] 5:I[15244,[],""] 6:I[43866,[],""] 7:I[48173,["8173","static/chunks/8173-297bb60690d4c74b.js","1181","static/chunks/1181-f6ec003211356e7e.js","4300","static/chunks/app/services/consulting/page-1ccd66f9de321f50.js"],""] 8:I[75661,["8173","static/chunks/8173-297bb60690d4c74b.js","1181","static/chunks/1181-f6ec003211356e7e.js","4300","static/chunks/app/services/consulting/page-1ccd66f9de321f50.js"],"ServicesNavigation"] 9:I[86213,[],"OutletBoundary"] b:I[86213,[],"MetadataBoundary"] d:I[86213,[],"ViewportBoundary"] f:I[34835,[],""] :HL["/_next/static/css/cbfa85a11a978c07.css","style"] :HL["/_next/static/css/b3cbcd051438d1d5.css","style"] 0:{"P":null,"b":"Blq_NJmLNVfGKfqu3CaEH","p":"","c":["","services","consulting"],"i":false,"f":[[["",{"children":["services",{"children":["consulting",{"children":["__PAGE__",{}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/cbfa85a11a978c07.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","link","1",{"rel":"stylesheet","href":"/_next/static/css/b3cbcd051438d1d5.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"en","className":"dark","children":[["$","link",null,{"rel":"icon","href":"/images/favicon.ico","sizes":"any"}],["$","script",null,{"src":"//code.tidio.co/fgg2egowffagzrj5dj6r8y6ryrtwy70o.js","async":true}],["$","body",null,{"className":"__className_d65c78 min-h-screen bg-black text-white antialiased","children":["$","$L2",null,{"attribute":"class","defaultTheme":"dark","enableSystem":true,"children":["$","div",null,{"className":"relative flex min-h-screen flex-col bg-[#050708]","children":[["$","div",null,{"className":"fixed inset-0 z-0 opacity-5","children":["$","$L3",null,{}]}],["$","$L4",null,{}],["$","main",null,{"className":"relative z-10 flex-1","children":["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[],["$","div",null,{"className":"relative flex min-h-screen flex-col bg-[#050708]","children":[["$","div",null,{"className":"fixed inset-0 z-0 opacity-5","children":["$","$L3",null,{}]}],["$","main",null,{"className":"relative z-10 flex-1 py-12 md:py-20","children":["$","div",null,{"className":"container mx-auto px-4 md:px-6","children":["$","div",null,{"className":"mx-auto max-w-3xl text-center","children":[["$","h1",null,{"className":"mb-6 text-4xl font-bold tracking-tight text-white","children":"Page Not Found"}],["$","p",null,{"className":"mb-8 text-lg text-gray-400","children":"The page you're looking for doesn't exist or has been moved."}],["$","$L7",null,{"href":"/","className":"inline-flex items-center text-[#149142] hover:text-[#107436]","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-left mr-2 h-4 w-4","children":[["$","path","1l729n",{"d":"m12 19-7-7 7-7"}],["$","path","x3x0zl",{"d":"M19 12H5"}],"$undefined"]}],"Back to Home"]}]]}]}]}]]}]],"forbidden":"$undefined","unauthorized":"$undefined"}]}],["$","footer",null,{"className":"relative border-t border-[#149142]/20 bg-[#050708]/95 py-6 backdrop-blur-md","children":["$","div",null,{"className":"container mx-auto px-4 md:px-6 pt-4","children":[["$","div",null,{"className":"grid gap-8 md:grid-cols-2 lg:grid-cols-4","children":[["$","div",null,{"children":[["$","$L7",null,{"href":"/","className":"flex items-center","children":[["$","img",null,{"src":"/images/logo.png","className":"h-10","alt":""}],["$","span",null,{"className":"ml-2 text-xl font-bold text-white","children":[["$","span",null,{"className":"text-[#149142]","children":"IZY"}],"ITS"]}]]}],["$","p",null,{"className":"mt-4 text-sm text-gray-400","children":"We at IZYITS have vast experience with cyber security solution development services and has developed strong competencies for implementing security."}],["$","div",null,{"className":"mt-4 flex space-x-4","children":[["$","$L7","twitter",{"href":"https://x.com/IZYITSS","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"twitter"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-twitter h-4","children":[["$","path","pff0z6",{"d":"M22 4s-.7 2.1-2 3.4c1.6 10-9.4 17.3-18 11.6 2.2.1 4.4-.6 6-2C3 15.5.5 9.6 3 5c2.2 2.6 5.6 4.1 9 4-.9-4.2 4-6.6 7-3.8 1.1 0 3-1.2 3-1.2z"}],"$undefined"]}]}]]}],["$","$L7","linkedin",{"href":"https://linkedin.com/company/izyits","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"linkedin"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-linkedin h-4","children":[["$","path","c2jq9f",{"d":"M16 8a6 6 0 0 1 6 6v7h-4v-7a2 2 0 0 0-2-2 2 2 0 0 0-2 2v7h-4v-7a6 6 0 0 1 6-6z"}],["$","rect","mk3on5",{"width":"4","height":"12","x":"2","y":"9"}],["$","circle","bt5ra8",{"cx":"4","cy":"4","r":"2"}],"$undefined"]}]}]]}],["$","$L7","youtube",{"href":"https://youtube.com/@izyits","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"youtube"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-youtube h-4","children":[["$","path","1q2vi4",{"d":"M2.5 17a24.12 24.12 0 0 1 0-10 2 2 0 0 1 1.4-1.4 49.56 49.56 0 0 1 16.2 0A2 2 0 0 1 21.5 7a24.12 24.12 0 0 1 0 10 2 2 0 0 1-1.4 1.4 49.55 49.55 0 0 1-16.2 0A2 2 0 0 1 2.5 17"}],["$","path","1jp15x",{"d":"m10 15 5-3-5-3z"}],"$undefined"]}]}]]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Services"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","Consulting",{"children":["$","$L7",null,{"href":"/services/consulting.html","className":"hover:text-[#149142]","children":"Consulting"}]}],["$","li","Assessment & Penetration Testing",{"children":["$","$L7",null,{"href":"/services/assessment-penetration-testing.html","className":"hover:text-[#149142]","children":"Assessment & Penetration Testing"}]}],["$","li","Security Architecture & Design",{"children":["$","$L7",null,{"href":"/services/security-architecture-design.html","className":"hover:text-[#149142]","children":"Security Architecture & Design"}]}],["$","li","Security Deployment",{"children":["$","$L7",null,{"href":"/services/security-deployment.html","className":"hover:text-[#149142]","children":"Security Deployment"}]}],["$","li","Managed Services",{"children":["$","$L7",null,{"href":"/services/security-managed-services.html","className":"hover:text-[#149142]","children":"Managed Services"}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Quick Links"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","About Us",{"children":["$","$L7",null,{"href":"/about.html","className":"text-gray-400 hover:text-white transition-colors","children":"About Us"}]}],["$","li","Blog",{"children":["$","$L7",null,{"href":"/blog.html","className":"text-gray-400 hover:text-white transition-colors","children":"Blog"}]}],["$","li","Contact Us",{"children":["$","$L7",null,{"href":"/contact.html","className":"text-gray-400 hover:text-white transition-colors","children":"Contact Us"}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Legal"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","Privacy Policy",{"children":["$","$L7",null,{"href":"/privacy-policy.html","className":"text-gray-400 hover:text-white transition-colors","children":"Privacy Policy"}]}],["$","li","Terms & Conditions",{"children":["$","$L7",null,{"href":"/terms-of-service.html","className":"text-gray-400 hover:text-white transition-colors","children":"Terms & Conditions"}]}],["$","li","Cookie Policy",{"children":["$","$L7",null,{"href":"/cookie-policy.html","className":"text-gray-400 hover:text-white transition-colors","children":"Cookie Policy"}]}],["$","li","Disclaimer",{"children":["$","$L7",null,{"href":"/disclaimer.html","className":"text-gray-400 hover:text-white transition-colors","children":"Disclaimer"}]}]]}]]}]]}],["$","div",null,{"className":"mt-8 border-t border-[#149142]/20 pt-8 text-center text-sm text-gray-500","children":["$","p",null,{"children":["© ",2025," IZYITS. All rights reserved."]}]}]]}]}]]}]}]}]]}]]}],{"children":["services",["$","$1","c",{"children":[null,["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children","services","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["consulting",["$","$1","c",{"children":[null,["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children","services","children","consulting","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","div",null,{"className":"container mx-auto px-4 py-12 md:py-16","children":[["$","h1",null,{"className":"text-3xl md:text-4xl font-bold text-white mb-4","children":"Cybersecurity Consulting Services"}],["$","p",null,{"className":"text-gray-300 text-lg mb-8 max-w-3xl","children":"IZYITS provides expert cybersecurity consulting services to help organizations develop and implement effective security strategies, manage risks, and ensure compliance with industry regulations."}],["$","div",null,{"className":"flex flex-col lg:flex-row gap-8","children":[["$","$L8",null,{}],["$","div",null,{"className":"flex-1 bg-[#050708] border border-[#149142]/20 rounded-lg p-6","children":[["$","div",null,{"className":"mb-8","children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"How We Help"}],["$","p",null,{"className":"text-gray-300 mb-4","children":"Our cybersecurity consulting services provide strategic guidance and practical solutions to help your organization build a robust security posture. Our team of experienced consultants works closely with you to understand your unique business needs and security challenges."}],["$","p",null,{"className":"text-gray-300 mb-4","children":"We take a holistic approach to cybersecurity, considering not just technology but also people, processes, and governance. Our goal is to help you develop a security program that is effective, sustainable, and aligned with your business objectives."}]]}],["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-2 gap-6","children":[["$","$L7","Security Strategy & Roadmap",{"href":"/services/consulting/security-strategy-roadmap.html","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-trending-up h-10 w-10 text-[#149142] mb-4","children":[["$","polyline","126l90",{"points":"22 7 13.5 15.5 8.5 10.5 2 17"}],["$","polyline","kwv8wd",{"points":"16 7 22 7 22 13"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Security Strategy & Roadmap"}],["$","p",null,{"className":"text-gray-300","children":"Develop a comprehensive security strategy aligned with your business objectives and a clear roadmap for implementation."}]]}],["$","$L7","Risk Management & Compliance",{"href":"/services/consulting/risk-management-compliance.html","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-scale h-10 w-10 text-[#149142] mb-4","children":[["$","path","7g6ntu",{"d":"m16 16 3-8 3 8c-.87.65-1.92 1-3 1s-2.13-.35-3-1Z"}],["$","path","ijws7r",{"d":"m2 16 3-8 3 8c-.87.65-1.92 1-3 1s-2.13-.35-3-1Z"}],["$","path","1b0cd5",{"d":"M7 21h10"}],["$","path","108xh3",{"d":"M12 3v18"}],["$","path","3gwbw2",{"d":"M3 7h2c2 0 5-1 7-2 2 1 5 2 7 2h2"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Risk Management & Compliance"}],["$","p",null,{"className":"text-gray-300","children":"Identify, assess, and mitigate security risks while ensuring compliance with relevant regulations and standards."}]]}],["$","$L7","Incident Response Planning",{"href":"/services/consulting/incident-response-planning.html","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield h-10 w-10 text-[#149142] mb-4","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Incident Response Planning"}],["$","p",null,{"className":"text-gray-300","children":"Develop and test incident response plans to minimize the impact of security breaches and ensure business continuity."}]]}],["$","$L7","Internal Security Assessment",{"href":"/services/consulting/internal-security-assessment.html","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big h-10 w-10 text-[#149142] mb-4","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Internal Security Assessment"}],["$","p",null,{"className":"text-gray-300","children":"Evaluate your organization's internal security posture to identify vulnerabilities and areas for improvement."}]]}],["$","$L7","Maturity Assessment",{"href":"/services/consulting/maturity-assessment.html","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-trending-up h-10 w-10 text-[#149142] mb-4","children":[["$","polyline","126l90",{"points":"22 7 13.5 15.5 8.5 10.5 2 17"}],["$","polyline","kwv8wd",{"points":"16 7 22 7 22 13"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Maturity Assessment"}],["$","p",null,{"className":"text-gray-300","children":"Assess your security program's maturity level and develop a roadmap for advancement."}]]}],["$","$L7","Regulatory Compliance Assessment",{"href":"/services/consulting/regulatory-compliance-assessment.html","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-file-text h-10 w-10 text-[#149142] mb-4","children":[["$","path","1rqfz7",{"d":"M15 2H6a2 2 0 0 0-2 2v16a2 2 0 0 0 2 2h12a2 2 0 0 0 2-2V7Z"}],["$","path","tnqrlb",{"d":"M14 2v4a2 2 0 0 0 2 2h4"}],["$","path","b1mrlr",{"d":"M10 9H8"}],["$","path","t4e002",{"d":"M16 13H8"}],["$","path","z1uh3a",{"d":"M16 17H8"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Regulatory Compliance Assessment"}],["$","p",null,{"className":"text-gray-300","children":"Ensure your organization meets industry-specific regulatory requirements and standards."}]]}],["$","$L7","Gap Assessment",{"href":"/services/consulting/gap-assessment.html","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-search h-10 w-10 text-[#149142] mb-4","children":[["$","circle","4ej97u",{"cx":"11","cy":"11","r":"8"}],["$","path","1qie3q",{"d":"m21 21-4.3-4.3"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Gap Assessment"}],["$","p",null,{"className":"text-gray-300","children":"Identify gaps between your current security posture and industry best practices or compliance requirements."}]]}]]}]]}]]}]]}],null,["$","$L9",null,{"children":"$La"}]]}],{},null,false]},[null,[],[]],false]},[null,[],[]],false]},[["$","div","l",{"className":"flex h-screen w-full items-center justify-center","children":["$","div",null,{"className":"flex flex-col items-center","children":[["$","div",null,{"className":"h-12 w-12 animate-spin rounded-full border-4 border-[#149142] border-t-transparent"}],["$","p",null,{"className":"mt-4 text-[#149142]","children":"Loading..."}]]}]}],[],[]],false],["$","$1","h",{"children":[null,["$","$1","ShRhyTJzqzlphxnCSRfI6",{"children":[["$","$Lb",null,{"children":"$Lc"}],["$","$Ld",null,{"children":"$Le"}],null]}]]}],false]],"m":"$undefined","G":["$f","$undefined"],"s":false,"S":true} e:[["$","meta","0",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] c:[["$","meta","0",{"charSet":"utf-8"}],["$","title","1",{"children":"IZYITS - Advanced Cybersecurity Solutions"}],["$","meta","2",{"name":"description","content":"Protecting your digital assets with cutting-edge security solutions. IZYITS delivers enterprise-grade cybersecurity services tailored to your business needs."}],["$","meta","3",{"name":"generator","content":"v0.dev"}]] a:null