1:"$Sreact.fragment" 2:I[4210,["8173","static/chunks/8173-87c7dcd56e38d620.js","7177","static/chunks/app/layout-ca3d91052a66f2bb.js"],"ThemeProvider"] 3:I[9164,["8173","static/chunks/8173-87c7dcd56e38d620.js","7177","static/chunks/app/layout-ca3d91052a66f2bb.js"],"MatrixBackground"] 4:I[8125,["8173","static/chunks/8173-87c7dcd56e38d620.js","7177","static/chunks/app/layout-ca3d91052a66f2bb.js"],"SiteHeader"] 5:I[5244,[],""] 6:I[3866,[],""] 7:I[8173,["8173","static/chunks/8173-87c7dcd56e38d620.js","1181","static/chunks/1181-6371330614dae539.js","4932","static/chunks/app/services/managed-services/page-98783fb48c54e920.js"],""] 8:I[1690,["8173","static/chunks/8173-87c7dcd56e38d620.js","1181","static/chunks/1181-6371330614dae539.js","5587","static/chunks/app/services/managed-services/soc-services/page-1526d3bec978715f.js"],"ServicesNavigation"] 9:I[6213,[],"OutletBoundary"] b:I[6213,[],"MetadataBoundary"] d:I[6213,[],"ViewportBoundary"] f:I[4835,[],""] :HL["/_next/static/css/8e2e65fa2b681075.css","style"] 0:{"P":null,"b":"7l5MabaOUWdGNpAmG0bNt","p":"","c":["","services","managed-services","soc-services"],"i":false,"f":[[["",{"children":["services",{"children":["managed-services",{"children":["soc-services",{"children":["__PAGE__",{}]}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/8e2e65fa2b681075.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"en","className":"dark","children":["$","body",null,{"className":"__className_d65c78 min-h-screen bg-black text-white antialiased","children":["$","$L2",null,{"attribute":"class","defaultTheme":"dark","enableSystem":true,"children":["$","div",null,{"className":"relative flex min-h-screen flex-col bg-[#050708]","children":[["$","div",null,{"className":"fixed inset-0 z-0 opacity-5","children":["$","$L3",null,{}]}],["$","$L4",null,{}],["$","main",null,{"className":"relative z-10 flex-1","children":["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[],["$","div",null,{"className":"relative flex min-h-screen flex-col bg-[#050708]","children":[["$","div",null,{"className":"fixed inset-0 z-0 opacity-5","children":["$","$L3",null,{}]}],["$","main",null,{"className":"relative z-10 flex-1 py-12 md:py-20","children":["$","div",null,{"className":"container mx-auto px-4 md:px-6","children":["$","div",null,{"className":"mx-auto max-w-3xl text-center","children":[["$","h1",null,{"className":"mb-6 text-4xl font-bold tracking-tight text-white","children":"Page Not Found"}],["$","p",null,{"className":"mb-8 text-lg text-gray-400","children":"The page you're looking for doesn't exist or has been moved."}],["$","$L7",null,{"href":"/","className":"inline-flex items-center text-[#149142] hover:text-[#107436]","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-left mr-2 h-4 w-4","children":[["$","path","1l729n",{"d":"m12 19-7-7 7-7"}],["$","path","x3x0zl",{"d":"M19 12H5"}],"$undefined"]}],"Back to Home"]}]]}]}]}]]}]],"forbidden":"$undefined","unauthorized":"$undefined"}]}],["$","footer",null,{"className":"relative z-10 border-t border-[#149142]/20 bg-[#050708]/95 py-6 backdrop-blur-md","children":[["$","div",null,{"className":"container max-w-lg mx-auto px-4 md:px-6 mb-14 ","children":[["$","div",null,{"className":"flex mx-auto items-center gap-2 w-full justify-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-mail-check","children":[["$","path","12jkf8",{"d":"M22 13V6a2 2 0 0 0-2-2H4a2 2 0 0 0-2 2v12c0 1.1.9 2 2 2h8"}],["$","path","1ocrg3",{"d":"m22 7-8.97 5.7a1.94 1.94 0 0 1-2.06 0L2 7"}],["$","path","1b14m6",{"d":"m16 19 2 2 4-4"}],"$undefined"]}],["$","h3",null,{"className":"text-center text-xl font-semibold","children":"Newsletter"}]]}],["$","p",null,{"className":"my-4","children":"Subscribe to our newsletter for updates and special offers."}],["$","div",null,{"className":"flex","children":[["$","input",null,{"type":"email","placeholder":"Your email","className":"w-full rounded-l-md border border-[#149142]/30 bg-[#050708]/80 px-3 py-2 text-sm text-white placeholder:text-gray-500 focus:border-[#149142] focus:outline-none"}],["$","button",null,{"className":"rounded-r-md bg-[#149142] px-3 py-2 text-sm font-medium text-white hover:bg-[#107436]","children":"Subscribe"}]]}]]}],["$","div",null,{"className":"container mx-auto px-4 md:px-6 border-t pt-4","children":[["$","div",null,{"className":"grid gap-8 md:grid-cols-2 lg:grid-cols-4","children":[["$","div",null,{"children":[["$","$L7",null,{"href":"/","className":"flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield h-8 w-8 text-[#149142]","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}],["$","span",null,{"className":"ml-2 text-xl font-bold text-white","children":[["$","span",null,{"className":"text-[#149142]","children":"IZY"}],"ITS"]}]]}],["$","p",null,{"className":"mt-4 text-sm text-gray-400","children":"We at IZYITS have vast experience with cyber security solution development services and has developed strong competencies for implementing security."}],["$","div",null,{"className":"mt-4 flex space-x-4","children":[["$","$L7","twitter",{"href":"https://twitter.com","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"twitter"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-twitter h-4","children":[["$","path","pff0z6",{"d":"M22 4s-.7 2.1-2 3.4c1.6 10-9.4 17.3-18 11.6 2.2.1 4.4-.6 6-2C3 15.5.5 9.6 3 5c2.2 2.6 5.6 4.1 9 4-.9-4.2 4-6.6 7-3.8 1.1 0 3-1.2 3-1.2z"}],"$undefined"]}],false,false]}]]}],["$","$L7","linkedin",{"href":"https://linkedin.com","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"linkedin"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":[false,["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-linkedin h-4","children":[["$","path","c2jq9f",{"d":"M16 8a6 6 0 0 1 6 6v7h-4v-7a2 2 0 0 0-2-2 2 2 0 0 0-2 2v7h-4v-7a6 6 0 0 1 6-6z"}],["$","rect","mk3on5",{"width":"4","height":"12","x":"2","y":"9"}],["$","circle","bt5ra8",{"cx":"4","cy":"4","r":"2"}],"$undefined"]}],false]}]]}],["$","$L7","facebook",{"href":"https://facebook.com","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"facebook"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":[false,false,["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-facebook h-4","children":[["$","path","1jg4f8",{"d":"M18 2h-3a5 5 0 0 0-5 5v3H7v4h3v8h4v-8h3l1-4h-4V7a1 1 0 0 1 1-1h3z"}],"$undefined"]}]]}]]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Services"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","Security Assessment",{"children":["$","$L7",null,{"href":"/services/threat-detection","className":"hover:text-[#149142]","children":"Security Assessment"}]}],["$","li","Security Consulting",{"children":["$","$L7",null,{"href":"/services/data-protection","className":"hover:text-[#149142]","children":"Security Consulting"}]}],["$","li","Security Architecture & Design",{"children":["$","$L7",null,{"href":"/services/network-security","className":"hover:text-[#149142]","children":"Security Architecture & Design"}]}],["$","li","Security Deployment",{"children":["$","$L7",null,{"href":"/services/cloud-security","className":"hover:text-[#149142]","children":"Security Deployment"}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Quick Links"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","About Us",{"children":["$","$L7",null,{"href":"/about","className":"text-gray-400 hover:text-white transition-colors","children":"About Us"}]}],["$","li","Careers",{"children":["$","$L7",null,{"href":"/careers","className":"text-gray-400 hover:text-white transition-colors","children":"Careers"}]}],["$","li","Partners",{"children":["$","$L7",null,{"href":"/partners","className":"text-gray-400 hover:text-white transition-colors","children":"Partners"}]}],["$","li","Contact Us",{"children":["$","$L7",null,{"href":"/contact","className":"text-gray-400 hover:text-white transition-colors","children":"Contact Us"}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Legal"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","Privacy Policy",{"children":["$","$L7",null,{"href":"/privacy-policy","className":"text-gray-400 hover:text-white transition-colors","children":"Privacy Policy"}]}],["$","li","Terms & Conditions",{"children":["$","$L7",null,{"href":"/terms-of-service","className":"text-gray-400 hover:text-white transition-colors","children":"Terms & Conditions"}]}],["$","li","Cookie Policy",{"children":["$","$L7",null,{"href":"/cookie-policy","className":"text-gray-400 hover:text-white transition-colors","children":"Cookie Policy"}]}],["$","li","Security Policy",{"children":["$","$L7",null,{"href":"/security-policy","className":"text-gray-400 hover:text-white transition-colors","children":"Security Policy"}]}],["$","li","Disclaimer",{"children":["$","$L7",null,{"href":"/security-policy","className":"text-gray-400 hover:text-white transition-colors","children":"Disclaimer"}]}]]}]]}]]}],["$","div",null,{"className":"mt-8 border-t border-[#149142]/20 pt-8 text-center text-sm text-gray-500","children":["$","p",null,{"children":["© ",2025," IZYITS. All rights reserved."]}]}]]}]]}]]}]}]}]}]]}],{"children":["services",["$","$1","c",{"children":[null,["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children","services","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["managed-services",["$","$1","c",{"children":[null,["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children","services","children","managed-services","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["soc-services",["$","$1","c",{"children":[null,["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children","services","children","managed-services","children","soc-services","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","div",null,{"className":"container mx-auto px-4 py-12 md:py-16","children":[["$","h1",null,{"className":"text-3xl md:text-4xl font-bold text-white mb-4","children":"SOC Services"}],["$","p",null,{"className":"text-gray-300 text-lg mb-8 max-w-3xl","children":"24/7 security monitoring and incident response services to detect and respond to security threats in real-time."}],["$","div",null,{"className":"flex flex-col lg:flex-row gap-8","children":[["$","$L8",null,{}],["$","div",null,{"className":"flex-1 bg-[#050708] border border-[#149142]/20 rounded-lg p-6","children":["$","div",null,{"className":"space-y-8","children":[["$","section",null,{"children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"Overview"}],["$","p",null,{"className":"text-gray-300 mb-4","children":"IZYITS's Security Operations Center (SOC) services provide continuous monitoring, detection, and response to security threats across your environment. Our team of security experts leverages advanced technologies and proven processes to identify and respond to security incidents quickly and effectively, minimizing the impact on your business."}],["$","p",null,{"className":"text-gray-300","children":"We offer flexible SOC service models, from fully managed to co-managed options, allowing you to choose the level of support that best meets your organization's needs and resources."}]]}],["$","section",null,{"children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"Key Benefits"}],["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-2 gap-6","children":[["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big h-8 w-8 text-[#149142] mb-3","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"24/7 Monitoring"}],["$","p",null,{"className":"text-gray-300","children":"Continuous monitoring of your environment to detect security threats at any time, day or night."}]]}],["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big h-8 w-8 text-[#149142] mb-3","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Rapid Incident Response"}],["$","p",null,{"className":"text-gray-300","children":"Quick identification and response to security incidents, minimizing damage and reducing recovery time."}]]}],["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big h-8 w-8 text-[#149142] mb-3","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Threat Intelligence"}],["$","p",null,{"className":"text-gray-300","children":"Access to the latest threat intelligence to stay ahead of emerging threats and vulnerabilities."}]]}],["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big h-8 w-8 text-[#149142] mb-3","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Compliance Support"}],["$","p",null,{"className":"text-gray-300","children":"Help meeting regulatory requirements for security monitoring, incident response, and reporting."}]]}]]}]]}],["$","section",null,{"children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"Our SOC Services"}],["$","div",null,{"className":"space-y-6","children":[["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","div",null,{"className":"flex items-center gap-4 mb-4","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-search h-10 w-10 text-[#149142]","children":[["$","circle","4ej97u",{"cx":"11","cy":"11","r":"8"}],["$","path","1qie3q",{"d":"m21 21-4.3-4.3"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white","children":"Security Monitoring"}]]}],["$","p",null,{"className":"text-gray-300 mb-4","children":"Continuous monitoring of your environment for security threats and anomalies, including:"}],["$","ul",null,{"className":"space-y-2 text-gray-300","children":[["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Log collection and analysis from network devices, servers, applications, and cloud services"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Network traffic analysis to detect suspicious activities"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Endpoint monitoring for malware and suspicious behavior"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Cloud security monitoring for misconfigurations and unauthorized access"}]]}]]}]]}],["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","div",null,{"className":"flex items-center gap-4 mb-4","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-triangle-alert h-10 w-10 text-[#149142]","children":[["$","path","wmoenq",{"d":"m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3"}],["$","path","juzpu7",{"d":"M12 9v4"}],["$","path","p32p05",{"d":"M12 17h.01"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white","children":"Incident Response"}]]}],["$","p",null,{"className":"text-gray-300 mb-4","children":"Rapid response to security incidents to minimize damage and restore normal operations, including:"}],["$","ul",null,{"className":"space-y-2 text-gray-300","children":[["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Incident triage and prioritization"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Containment of security incidents to prevent further damage"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Forensic analysis to determine the root cause and scope of incidents"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Remediation guidance to address vulnerabilities and prevent future incidents"}]]}]]}]]}],["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","div",null,{"className":"flex items-center gap-4 mb-4","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield h-10 w-10 text-[#149142]","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white","children":"Threat Hunting"}]]}],["$","p",null,{"className":"text-gray-300 mb-4","children":"Proactive search for threats that may have evaded existing security controls, including:"}],["$","ul",null,{"className":"space-y-2 text-gray-300","children":[["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Hypothesis-driven investigations based on threat intelligence"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Advanced analytics to identify patterns of suspicious behavior"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Identification of indicators of compromise (IOCs) across your environment"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Development of new detection rules based on hunting findings"}]]}]]}]]}],["$","div",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","div",null,{"className":"flex items-center gap-4 mb-4","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-clock h-10 w-10 text-[#149142]","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","polyline","68esgv",{"points":"12 6 12 12 16 14"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white","children":"Vulnerability Management"}]]}],["$","p",null,{"className":"text-gray-300 mb-4","children":"Ongoing identification and remediation of vulnerabilities in your environment, including:"}],["$","ul",null,{"className":"space-y-2 text-gray-300","children":[["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Regular vulnerability scanning of networks, systems, and applications"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Prioritization of vulnerabilities based on risk and exploitability"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Remediation guidance and tracking"}]]}],["$","li",null,{"className":"flex items-start gap-2","children":[["$","span",null,{"className":"text-[#149142] font-bold","children":"✓"}],["$","span",null,{"children":"Reporting on vulnerability status and trends"}]]}]]}]]}]]}]]}],["$","section",null,{"className":"bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6","children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"Ready to Enhance Your Security Operations?"}],["$","p",null,{"className":"text-gray-300 mb-6","children":"Contact us today to learn how IZYITS's SOC services can help you detect and respond to security threats more effectively."}],["$","div",null,{"className":"flex flex-col sm:flex-row gap-4","children":[["$","a",null,{"href":"/contact","className":"inline-flex items-center justify-center px-6 py-3 rounded-md bg-[#149142] text-white font-medium hover:bg-[#107436] transition-colors","children":"Contact Us"}],["$","a",null,{"href":"/book-consultation","className":"inline-flex items-center justify-center px-6 py-3 rounded-md border border-[#149142] text-[#149142] font-medium hover:bg-[#149142]/10 transition-colors","children":"Book a Consultation"}]]}]]}]]}]}]]}]]}],null,["$","$L9",null,{"children":"$La"}]]}],{},null,false]},[null,[],[]],false]},null,false]},[null,[],[]],false]},[["$","div","l",{"className":"flex h-screen w-full items-center justify-center","children":["$","div",null,{"className":"flex flex-col items-center","children":[["$","div",null,{"className":"h-12 w-12 animate-spin rounded-full border-4 border-[#149142] border-t-transparent"}],["$","p",null,{"className":"mt-4 text-[#149142]","children":"Loading..."}]]}]}],[],[]],false],["$","$1","h",{"children":[null,["$","$1","mBKC_4YrUHnR3X4b7m415",{"children":[["$","$Lb",null,{"children":"$Lc"}],["$","$Ld",null,{"children":"$Le"}],null]}]]}],false]],"m":"$undefined","G":["$f","$undefined"],"s":false,"S":true} e:[["$","meta","0",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] c:[["$","meta","0",{"charSet":"utf-8"}],["$","title","1",{"children":"IZYITS - Advanced Cybersecurity Solutions"}],["$","meta","2",{"name":"description","content":"Protecting your digital assets with cutting-edge security solutions. IZYITS delivers enterprise-grade cybersecurity services tailored to your business needs."}],["$","meta","3",{"name":"generator","content":"v0.dev"}]] a:null