1:"$Sreact.fragment" 2:I[84210,["8173","static/chunks/8173-297bb60690d4c74b.js","7177","static/chunks/app/layout-dc148b6df43bafd4.js"],"ThemeProvider"] 3:I[49164,["8173","static/chunks/8173-297bb60690d4c74b.js","7177","static/chunks/app/layout-dc148b6df43bafd4.js"],"MatrixBackground"] 4:I[89633,["8173","static/chunks/8173-297bb60690d4c74b.js","7177","static/chunks/app/layout-dc148b6df43bafd4.js"],"SiteHeader"] 5:I[15244,[],""] 6:I[43866,[],""] 7:I[48173,["8173","static/chunks/8173-297bb60690d4c74b.js","1181","static/chunks/1181-f6ec003211356e7e.js","8822","static/chunks/app/services/security-deployment/page-aa097a5e055b6879.js"],""] 8:I[75661,["8173","static/chunks/8173-297bb60690d4c74b.js","1181","static/chunks/1181-f6ec003211356e7e.js","8822","static/chunks/app/services/security-deployment/page-aa097a5e055b6879.js"],"ServicesNavigation"] 9:I[86213,[],"OutletBoundary"] b:I[86213,[],"MetadataBoundary"] d:I[86213,[],"ViewportBoundary"] f:I[34835,[],""] :HL["/_next/static/css/cbfa85a11a978c07.css","style"] :HL["/_next/static/css/b3cbcd051438d1d5.css","style"] 0:{"P":null,"b":"Blq_NJmLNVfGKfqu3CaEH","p":"","c":["","services","security-deployment"],"i":false,"f":[[["",{"children":["services",{"children":["security-deployment",{"children":["__PAGE__",{}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/cbfa85a11a978c07.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","link","1",{"rel":"stylesheet","href":"/_next/static/css/b3cbcd051438d1d5.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"en","className":"dark","children":[["$","link",null,{"rel":"icon","href":"/images/favicon.ico","sizes":"any"}],["$","script",null,{"src":"//code.tidio.co/fgg2egowffagzrj5dj6r8y6ryrtwy70o.js","async":true}],["$","body",null,{"className":"__className_d65c78 min-h-screen bg-black text-white antialiased","children":["$","$L2",null,{"attribute":"class","defaultTheme":"dark","enableSystem":true,"children":["$","div",null,{"className":"relative flex min-h-screen flex-col bg-[#050708]","children":[["$","div",null,{"className":"fixed inset-0 z-0 opacity-5","children":["$","$L3",null,{}]}],["$","$L4",null,{}],["$","main",null,{"className":"relative z-10 flex-1","children":["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[],["$","div",null,{"className":"relative flex min-h-screen flex-col bg-[#050708]","children":[["$","div",null,{"className":"fixed inset-0 z-0 opacity-5","children":["$","$L3",null,{}]}],["$","main",null,{"className":"relative z-10 flex-1 py-12 md:py-20","children":["$","div",null,{"className":"container mx-auto px-4 md:px-6","children":["$","div",null,{"className":"mx-auto max-w-3xl text-center","children":[["$","h1",null,{"className":"mb-6 text-4xl font-bold tracking-tight text-white","children":"Page Not Found"}],["$","p",null,{"className":"mb-8 text-lg text-gray-400","children":"The page you're looking for doesn't exist or has been moved."}],["$","$L7",null,{"href":"/","className":"inline-flex items-center text-[#149142] hover:text-[#107436]","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-left mr-2 h-4 w-4","children":[["$","path","1l729n",{"d":"m12 19-7-7 7-7"}],["$","path","x3x0zl",{"d":"M19 12H5"}],"$undefined"]}],"Back to Home"]}]]}]}]}]]}]],"forbidden":"$undefined","unauthorized":"$undefined"}]}],["$","footer",null,{"className":"relative border-t border-[#149142]/20 bg-[#050708]/95 py-6 backdrop-blur-md","children":["$","div",null,{"className":"container mx-auto px-4 md:px-6 pt-4","children":[["$","div",null,{"className":"grid gap-8 md:grid-cols-2 lg:grid-cols-4","children":[["$","div",null,{"children":[["$","$L7",null,{"href":"/","className":"flex items-center","children":[["$","img",null,{"src":"/images/logo.png","className":"h-10","alt":""}],["$","span",null,{"className":"ml-2 text-xl font-bold text-white","children":[["$","span",null,{"className":"text-[#149142]","children":"IZY"}],"ITS"]}]]}],["$","p",null,{"className":"mt-4 text-sm text-gray-400","children":"We at IZYITS have vast experience with cyber security solution development services and has developed strong competencies for implementing security."}],["$","div",null,{"className":"mt-4 flex space-x-4","children":[["$","$L7","twitter",{"href":"https://x.com/IZYITSS","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"twitter"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-twitter h-4","children":[["$","path","pff0z6",{"d":"M22 4s-.7 2.1-2 3.4c1.6 10-9.4 17.3-18 11.6 2.2.1 4.4-.6 6-2C3 15.5.5 9.6 3 5c2.2 2.6 5.6 4.1 9 4-.9-4.2 4-6.6 7-3.8 1.1 0 3-1.2 3-1.2z"}],"$undefined"]}]}]]}],["$","$L7","linkedin",{"href":"https://linkedin.com/company/izyits","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"linkedin"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-linkedin h-4","children":[["$","path","c2jq9f",{"d":"M16 8a6 6 0 0 1 6 6v7h-4v-7a2 2 0 0 0-2-2 2 2 0 0 0-2 2v7h-4v-7a6 6 0 0 1 6-6z"}],["$","rect","mk3on5",{"width":"4","height":"12","x":"2","y":"9"}],["$","circle","bt5ra8",{"cx":"4","cy":"4","r":"2"}],"$undefined"]}]}]]}],["$","$L7","youtube",{"href":"https://youtube.com/@izyits","className":"text-gray-400 hover:text-[#149142]","children":[["$","span",null,{"className":"sr-only","children":"youtube"}],["$","div",null,{"className":"p-1 py-2 rounded-full bg-gray-800","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-youtube h-4","children":[["$","path","1q2vi4",{"d":"M2.5 17a24.12 24.12 0 0 1 0-10 2 2 0 0 1 1.4-1.4 49.56 49.56 0 0 1 16.2 0A2 2 0 0 1 21.5 7a24.12 24.12 0 0 1 0 10 2 2 0 0 1-1.4 1.4 49.55 49.55 0 0 1-16.2 0A2 2 0 0 1 2.5 17"}],["$","path","1jp15x",{"d":"m10 15 5-3-5-3z"}],"$undefined"]}]}]]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Services"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","Consulting",{"children":["$","$L7",null,{"href":"/services/consulting.html","className":"hover:text-[#149142]","children":"Consulting"}]}],["$","li","Assessment & Penetration Testing",{"children":["$","$L7",null,{"href":"/services/assessment-penetration-testing.html","className":"hover:text-[#149142]","children":"Assessment & Penetration Testing"}]}],["$","li","Security Architecture & Design",{"children":["$","$L7",null,{"href":"/services/security-architecture-design.html","className":"hover:text-[#149142]","children":"Security Architecture & Design"}]}],["$","li","Security Deployment",{"children":["$","$L7",null,{"href":"/services/security-deployment.html","className":"hover:text-[#149142]","children":"Security Deployment"}]}],["$","li","Managed Services",{"children":["$","$L7",null,{"href":"/services/security-managed-services.html","className":"hover:text-[#149142]","children":"Managed Services"}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Quick Links"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","About Us",{"children":["$","$L7",null,{"href":"/about.html","className":"text-gray-400 hover:text-white transition-colors","children":"About Us"}]}],["$","li","Blog",{"children":["$","$L7",null,{"href":"/blog.html","className":"text-gray-400 hover:text-white transition-colors","children":"Blog"}]}],["$","li","Contact Us",{"children":["$","$L7",null,{"href":"/contact.html","className":"text-gray-400 hover:text-white transition-colors","children":"Contact Us"}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"mb-4 text-lg font-bold text-white","children":"Legal"}],["$","ul",null,{"className":"space-y-2 text-sm text-gray-400","children":[["$","li","Privacy Policy",{"children":["$","$L7",null,{"href":"/privacy-policy.html","className":"text-gray-400 hover:text-white transition-colors","children":"Privacy Policy"}]}],["$","li","Terms & Conditions",{"children":["$","$L7",null,{"href":"/terms-of-service.html","className":"text-gray-400 hover:text-white transition-colors","children":"Terms & Conditions"}]}],["$","li","Cookie Policy",{"children":["$","$L7",null,{"href":"/cookie-policy.html","className":"text-gray-400 hover:text-white transition-colors","children":"Cookie Policy"}]}],["$","li","Disclaimer",{"children":["$","$L7",null,{"href":"/disclaimer.html","className":"text-gray-400 hover:text-white transition-colors","children":"Disclaimer"}]}]]}]]}]]}],["$","div",null,{"className":"mt-8 border-t border-[#149142]/20 pt-8 text-center text-sm text-gray-500","children":["$","p",null,{"children":["© ",2025," IZYITS. All rights reserved."]}]}]]}]}]]}]}]}]]}]]}],{"children":["services",["$","$1","c",{"children":[null,["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children","services","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["security-deployment",["$","$1","c",{"children":[null,["$","$L5",null,{"parallelRouterKey":"children","segmentPath":["children","services","children","security-deployment","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","div",null,{"className":"container mx-auto px-4 py-12 md:py-16","children":[["$","h1",null,{"className":"text-3xl md:text-4xl font-bold text-white mb-4","children":"Security Deployment"}],["$","p",null,{"className":"text-gray-300 text-lg mb-8 max-w-3xl","children":"IZYITS provides expert security deployment services to help organizations implement and configure security solutions that protect their data, applications, and users."}],["$","div",null,{"className":"flex flex-col lg:flex-row gap-8","children":[["$","$L8",null,{}],["$","div",null,{"className":"flex-1 bg-[#050708] border border-[#149142]/20 rounded-lg p-6","children":[["$","div",null,{"className":"mb-8","children":[["$","h2",null,{"className":"text-2xl font-bold text-white mb-4","children":"Implementing Security Solutions"}],["$","p",null,{"className":"text-gray-300 mb-4","children":"Our security deployment services help you implement and configure security solutions that protect your organization from threats. We have expertise in deploying a wide range of security technologies, from email security to identity and access management."}],["$","p",null,{"className":"text-gray-300 mb-4","children":"We follow a structured approach to deployment, including planning, testing, implementation, and validation, to ensure your security solutions are deployed correctly and effectively. Our team works closely with you to minimize disruption to your business operations during deployment."}]]}],["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-2 gap-6","children":[["$","$L7","Email Security",{"href":"/services/security-deployment/email-security.html","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-mail h-10 w-10 text-[#149142] mb-4","children":[["$","rect","18n3k1",{"width":"20","height":"16","x":"2","y":"4","rx":"2"}],["$","path","1ocrg3",{"d":"m22 7-8.97 5.7a1.94 1.94 0 0 1-2.06 0L2 7"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Email Security"}],["$","p",null,{"className":"text-gray-300","children":"Implement advanced email security solutions to protect against phishing, malware, and other email-based threats."}]]}],["$","$L7","Point Solution",{"href":"/services/security-deployment/point-solution.html","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-target h-10 w-10 text-[#149142] mb-4","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","circle","1vlfrh",{"cx":"12","cy":"12","r":"6"}],["$","circle","1c9p78",{"cx":"12","cy":"12","r":"2"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Point Solution"}],["$","p",null,{"className":"text-gray-300","children":"Deploy targeted security solutions to address specific security challenges in your environment."}]]}],["$","$L7","Single Sign-On (SSO) & Federation",{"href":"/services/security-deployment/sso-federation.html","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-key h-10 w-10 text-[#149142] mb-4","children":[["$","path","g0fldk",{"d":"m15.5 7.5 2.3 2.3a1 1 0 0 0 1.4 0l2.1-2.1a1 1 0 0 0 0-1.4L19 4"}],["$","path","1j0ho8",{"d":"m21 2-9.6 9.6"}],["$","circle","yqb3hr",{"cx":"7.5","cy":"15.5","r":"5.5"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Single Sign-On (SSO) & Federation"}],["$","p",null,{"className":"text-gray-300","children":"Implement SSO and federation solutions to improve user experience and security."}]]}],["$","$L7","Microsoft Entra ID (Azure AD)",{"href":"/services/security-deployment/microsoft-entra-id.html","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-user-check h-10 w-10 text-[#149142] mb-4","children":[["$","path","1yyitq",{"d":"M16 21v-2a4 4 0 0 0-4-4H6a4 4 0 0 0-4 4v2"}],["$","circle","nufk8",{"cx":"9","cy":"7","r":"4"}],["$","polyline","1pwet4",{"points":"16 11 18 13 22 9"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"Microsoft Entra ID (Azure AD)"}],["$","p",null,{"className":"text-gray-300","children":"Deploy and configure Microsoft Entra ID (formerly Azure AD) to secure your identity infrastructure."}]]}],["$","$L7","MFA & Conditional Access",{"href":"/services/security-deployment/mfa-conditional-access.html","className":"block bg-[#0a0c0d] border border-[#149142]/20 rounded-lg p-6 hover:border-[#149142]/50 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield h-10 w-10 text-[#149142] mb-4","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}],["$","h3",null,{"className":"text-xl font-bold text-white mb-2","children":"MFA & Conditional Access"}],["$","p",null,{"className":"text-gray-300","children":"Implement Multi-Factor Authentication and Conditional Access policies to strengthen your security posture."}]]}]]}]]}]]}]]}],null,["$","$L9",null,{"children":"$La"}]]}],{},null,false]},null,false]},[null,[],[]],false]},[["$","div","l",{"className":"flex h-screen w-full items-center justify-center","children":["$","div",null,{"className":"flex flex-col items-center","children":[["$","div",null,{"className":"h-12 w-12 animate-spin rounded-full border-4 border-[#149142] border-t-transparent"}],["$","p",null,{"className":"mt-4 text-[#149142]","children":"Loading..."}]]}]}],[],[]],false],["$","$1","h",{"children":[null,["$","$1","NZwK0HD2eQtWIaZgioCWh",{"children":[["$","$Lb",null,{"children":"$Lc"}],["$","$Ld",null,{"children":"$Le"}],null]}]]}],false]],"m":"$undefined","G":["$f","$undefined"],"s":false,"S":true} e:[["$","meta","0",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] c:[["$","meta","0",{"charSet":"utf-8"}],["$","title","1",{"children":"IZYITS - Advanced Cybersecurity Solutions"}],["$","meta","2",{"name":"description","content":"Protecting your digital assets with cutting-edge security solutions. IZYITS delivers enterprise-grade cybersecurity services tailored to your business needs."}],["$","meta","3",{"name":"generator","content":"v0.dev"}]] a:null