2:I[1749,["574","static/chunks/370b0802-de2777ae184b25c9.js","749","static/chunks/749-43c2b7855fa56816.js","250","static/chunks/250-5d1eee2786853070.js","689","static/chunks/689-c24719034234702a.js","735","static/chunks/app/(pages)/services/network-security/page-d112c5f894659031.js"],"Image"] 3:I[5940,["574","static/chunks/370b0802-de2777ae184b25c9.js","749","static/chunks/749-43c2b7855fa56816.js","250","static/chunks/250-5d1eee2786853070.js","689","static/chunks/689-c24719034234702a.js","735","static/chunks/app/(pages)/services/network-security/page-d112c5f894659031.js"],""] 6:I[5250,["574","static/chunks/370b0802-de2777ae184b25c9.js","749","static/chunks/749-43c2b7855fa56816.js","250","static/chunks/250-5d1eee2786853070.js","689","static/chunks/689-c24719034234702a.js","735","static/chunks/app/(pages)/services/network-security/page-d112c5f894659031.js"],""] 7:I[5613,[],""] 8:I[1778,[],""] 4:{"src":"/_next/static/media/lins-carv.7b28c2b7.svg","height":1375,"width":1914,"blurWidth":0,"blurHeight":0} 5:{"src":"/_next/static/media/shield_protect.f24120e4.svg","height":76,"width":76,"blurWidth":0,"blurHeight":0} 0:["3T1-riK7N9l7M2WzmiGjm",[[["",{"children":["(pages)",{"children":["services",{"children":["network-security",{"children":["__PAGE__",{}]}]}]}]},"$undefined","$undefined",true],["",{"children":["(pages)",{"children":["services",{"children":["network-security",{"children":["__PAGE__",{},["$L1",["$","div",null,{"children":[["$","section",null,{"className":"py-10 relative","children":[["$","$L2",null,{"src":{"src":"/_next/static/media/lins-carv.7b28c2b7.svg","height":1375,"width":1914,"blurWidth":0,"blurHeight":0},"alt":"map","className":"opacity-40 md:hidden flex absolute lg:top-0 -z-10 w-full "}],["$","div",null,{"className":" mx-auto -mt-[20px] ","children":["$","$L2",null,{"className":"lg:flex hidden absolute opacity-40 -mt-36 -z-10 w-full lg:h-auto ","src":{"src":"/_next/static/media/services_banner.3cd20417.svg","height":872,"width":1920,"blurWidth":0,"blurHeight":0},"alt":"services banner","quality":70}]}],["$","div",null,{"className":"max-w-[1280px] mx-auto p-5 md:10","children":["$","div",null,{"className":"lg:px-10 grid grid-cols-1 lg:grid-cols-2 gap-10 lg:gap-1 items-center ","children":[["$","div",null,{"className":"space-y-8 mx-auto","children":[["$","h1",null,{"className":" text-2xl lg:text-[40px] font-semibold ","children":["Top Notch ",["$","span",null,{"className":" bg-gradient-to-tr from-secondary to-primary p-2 py-4 rounded-full","children":"Network "}],["$","br",null,{}],["$","br",null,{}]," Pentest With Professionals."]}],["$","p",null,{"className":"leading-6 lg:leading-8 ","children":"Navigate the complex cybersecurity landscape with confidence, backed by our proactive measures and deep expertise in protecting your digital interests."}],["$","div",null,{"children":["$","$L3",null,{"buttonSize":"medium"}]}]]}],["$","div",null,{"className":"mx-auto bg-light","children":["$","$L2",null,{"className":"lg:h-[400px]","src":{"src":"/_next/static/media/network_service.e71b7123.svg","height":381,"width":579,"blurWidth":0,"blurHeight":0},"alt":"mobile app banner part"}]}]]}]}]]}],["$","section",null,{"children":[["$","div",null,{"className":"relative","children":[["$","$L2",null,{"src":"$4","alt":"map","className":"opacity-40 absolute lg:top-0 -z-10 w-full "}],["$","div",null,{"className":"max-w-[1280px] mx-auto p-5 md:10","children":["$","div",null,{"className":"lg:py-16 py-10 md:px-8 lg:px-10","children":[["$","div",null,{"children":["$","h1",null,{"className":" text-center text-2xl font-semibold md:text-3xl lg:text-4xl","children":[["$","span",null,{"className":"text-secondary ","children":["Importance of ","Network"]}],["$","br",null,{}]," Penetration Testing and Vulnerability Assessment"]}]}],["$","div",null,{"className":"flex lg:flex-row flex-col items-center ","children":[["$","div",null,{"className":"grid grid-cols-1 gap-4 py-10","children":[["$","div","0",{"className":"lg:h-32 py-6 px-6 bg-secondary bg-opacity-30 backdrop-blur-xl border-secondary border-2 rounded-lg","children":[["$","h1",null,{"className":"font-semibold text-secondary","children":" Unmask Network Weaknesses"}],["$","p",null,{"className":"text-[14px] ","children":" Identify exploitable vulnerabilities in devices, configurations, and security controls.\n "}]]}],["$","div","1",{"className":"lg:h-32 py-6 px-6 bg-secondary bg-opacity-30 backdrop-blur-xl border-secondary border-2 rounded-lg","children":[["$","h1",null,{"className":"font-semibold text-secondary","children":"Proactive Breach Prevention"}],["$","p",null,{"className":"text-[14px] ","children":" Find vulnerabilities before attackers, preventing data breaches and minimizing damage.\n "}]]}],["$","div","2",{"className":"lg:h-32 py-6 px-6 bg-secondary bg-opacity-30 backdrop-blur-xl border-secondary border-2 rounded-lg","children":[["$","h1",null,{"className":"font-semibold text-secondary","children":"Stronger Security Posture"}],["$","p",null,{"className":"text-[14px] ","children":" Gain insights to make targeted improvements and fortify your overall network security.\n "}]]}]]}],["$","div",null,{"className":"-z-10 lg:flex hidden relative","children":["$","$L2",null,{"src":{"src":"/_next/static/media/importanceLogo1.e94e21af.svg","height":422,"width":204,"blurWidth":0,"blurHeight":0},"alt":"logo"}]}],["$","div",null,{"className":"-z-10 flex lg:hidden relative","children":["$","$L2",null,{"src":{"src":"/_next/static/media/importanceLogo.4ee0c19d.svg","height":114,"width":109,"blurWidth":0,"blurHeight":0},"alt":"logo"}]}],["$","div",null,{"className":"grid grid-cols-1 gap-4 py-10","children":[["$","div","0",{"className":"lg:h-32 py-6 px-6 bg-secondary bg-opacity-30 backdrop-blur-xl border-secondary border-2 rounded-lg","children":[["$","h1",null,{"className":"font-semibold text-secondary","children":" Insider Threat Detection"}],["$","p",null,{"className":"text-[14px] ","children":" Utilize methods to detect and mitigate threats from within the organization.\n\n\n "}]]}],["$","div","1",{"className":"lg:h-32 py-6 px-6 bg-secondary bg-opacity-30 backdrop-blur-xl border-secondary border-2 rounded-lg","children":[["$","h1",null,{"className":"font-semibold text-secondary","children":" Sharpened Threat Response\n "}],["$","p",null,{"className":"text-[14px] ","children":" Enhance response strategies for more effective cyberattack mitigation.\n\n\n\n "}]]}],["$","div","2",{"className":"lg:h-32 py-6 px-6 bg-secondary bg-opacity-30 backdrop-blur-xl border-secondary border-2 rounded-lg","children":[["$","h1",null,{"className":"font-semibold text-secondary","children":" Optimized Network Design\n "}],["$","p",null,{"className":"text-[14px] ","children":" Identify and correct network design flaws to improve security and efficiency.\n "}]]}]]}]]}]]}]}]]}],["$","div",null,{"className":"max-w-[1280px] mx-auto p-5 md:10","children":[["$","div",null,{"className":"text-center py-10 lg:py-14","children":["$","h1",null,{"className":"text-3xl lg:text-4xl font-semibold","children":[["$","span",null,{"className":"text-secondary","children":"How we Protect "}]," ",["$","br",null,{}],"Understand our Services."]}]}],["$","div",null,{"className":"relative flex justify-center items-center flex-col bg-center bg-contain bg-no-repeat ","style":{"backgroundImage":"url(/_next/static/media/protect_banner.02640dab.svg)"},"children":[["$","div",null,{"className":"bg-primary bg-opacity-30 absolute rounded-full w-[100px] h-[100px] lg:w-[600px] lg:h-[600px] animate-ping"}],["$","div",null,{"className":"flex flex-row lg:translate-y-24 gap-2","children":[["$","div",null,{}],[["$","div",null,{"style":{"backgroundImage":"url(/_next/static/media/Polygon.edaf156e.svg)"},"className":" bg-contain bg-no-repeat bg-center mx-auto w-44 md:w-80 h-64 md:h-96 p-6 relative flex items-center justify-center flex-col text-center gap-5","children":["$","div",null,{"className":" flex flex-col justify-center items-center md:px-8","children":[["$","$L2",null,{"className":"md:h-auto h-10","src":{"src":"/_next/static/media/shield_protect.f24120e4.svg","height":76,"width":76,"blurWidth":0,"blurHeight":0},"alt":"protect shield"}],["$","h1",null,{"className":"font-bold text-secondary text-[14px] md:text-[18px]","children":" Quotation "}],["$","p",null,{"className":" text-[9px] md:text-[14px]","children":[" ","Get a customized security service quote tailored to your business needs."]}]]}]}],["$","div",null,{"style":{"backgroundImage":"url(/_next/static/media/Polygon.edaf156e.svg)"},"className":" bg-contain bg-no-repeat bg-center mx-auto w-44 md:w-80 h-64 md:h-96 p-6 relative flex items-center justify-center flex-col text-center gap-5","children":["$","div",null,{"className":" flex flex-col justify-center items-center md:px-8","children":[["$","$L2",null,{"className":"md:h-auto h-10","src":"$5","alt":"protect shield"}],["$","h1",null,{"className":"font-bold text-secondary text-[14px] md:text-[18px]","children":" Scope Definition"}],["$","p",null,{"className":" text-[9px] md:text-[14px]","children":[" ","Outline assessment boundaries and goals for targeted security analysis."]}]]}]}]],["$","div",null,{}]]}],["$","div",null,{"className":"grid grid-cols-1 lg:grid-cols-3 lg:gap-0 gap-10 md:gap-14 ","children":[["$","div",null,{"className":"-mt-24 lg:mt-0","children":[["$","div",null,{"style":{"backgroundImage":"url(/_next/static/media/Polygon.edaf156e.svg)"},"className":" bg-contain bg-no-repeat bg-center mx-auto w-44 md:w-80 h-64 md:h-96 p-6 relative flex items-center justify-center flex-col text-center gap-5","children":["$","div",null,{"className":" flex flex-col justify-center items-center md:px-8","children":[["$","$L2",null,{"className":"md:h-auto h-10","src":"$5","alt":"protect shield"}],["$","h1",null,{"className":"font-bold text-secondary text-[14px] md:text-[18px]","children":" Assessment"}],["$","p",null,{"className":" text-[9px] md:text-[14px]","children":[" ","Identify vulnerabilities using advanced assessment techniques."]}]]}]}]]}],["$","div",null,{}],["$","div",null,{"className":"-mb-24 lg:mb-0","children":[["$","div",null,{"style":{"backgroundImage":"url(/_next/static/media/Polygon.edaf156e.svg)"},"className":" bg-contain bg-no-repeat bg-center mx-auto w-44 md:w-80 h-64 md:h-96 p-6 relative flex items-center justify-center flex-col text-center gap-5","children":["$","div",null,{"className":" flex flex-col justify-center items-center md:px-8","children":[["$","$L2",null,{"className":"md:h-auto h-10","src":"$5","alt":"protect shield"}],["$","h1",null,{"className":"font-bold text-secondary text-[14px] md:text-[18px]","children":"Exploitation"}],["$","p",null,{"className":" text-[9px] md:text-[14px]","children":[" ","Simulate attacks to evaluate real-world exposure and risks."]}]]}]}]]}]]}],["$","div",null,{"className":"flex flex-row lg:-translate-y-24 gap-2","children":[["$","div",null,{}],[["$","div",null,{"style":{"backgroundImage":"url(/_next/static/media/Polygon.edaf156e.svg)"},"className":" bg-contain bg-no-repeat bg-center mx-auto w-44 md:w-80 h-64 md:h-96 p-6 relative flex items-center justify-center flex-col text-center gap-5","children":["$","div",null,{"className":" flex flex-col justify-center items-center md:px-8","children":[["$","$L2",null,{"className":"md:h-auto h-10","src":"$5","alt":"protect shield"}],["$","h1",null,{"className":"font-bold text-secondary text-[14px] md:text-[18px]","children":"Reporting"}],["$","p",null,{"className":" text-[9px] md:text-[14px]","children":[" ","Receive concise reports with clear vulnerability insights and fixes."]}]]}]}],["$","div",null,{"style":{"backgroundImage":"url(/_next/static/media/Polygon.edaf156e.svg)"},"className":" bg-contain bg-no-repeat bg-center mx-auto w-44 md:w-80 h-64 md:h-96 p-6 relative flex items-center justify-center flex-col text-center gap-5","children":["$","div",null,{"className":" flex flex-col justify-center items-center md:px-8","children":[["$","$L2",null,{"className":"md:h-auto h-10","src":"$5","alt":"protect shield"}],["$","h1",null,{"className":"font-bold text-secondary text-[14px] md:text-[18px]","children":" Follow-up"}],["$","p",null,{"className":" text-[9px] md:text-[14px]","children":[" ","Ensure lasting security with follow-up checks and updates."]}]]}]}]],["$","div",null,{}]]}]]}]]}],["$","section",null,{"className":"relative","children":[["$","$L2",null,{"src":"$4","alt":"map","className":"opacity-30 absolute lg:top-0 -z-10 w-full "}],["$","div",null,{"className":"max-w-[1280px] mx-auto p-5 md:10","children":["$","div",null,{"className":"space-y-8","children":[["$","div",null,{"className":"text-center","children":["$","h1",null,{"className":"text-3xl md:text-4xl lg:text-5xl font-semibold","children":[["$","span",null,{"className":"text-secondary","children":"How We Submit Your "}]," ",["$","br",null,{}]," Penetration Testing Report"]}]}],["$","div",null,{"className":"flex lg:w-[70%] mx-auto","children":[["$","$L2",null,{"className":"lg:flex hidden -mt-44","src":{"src":"/_next/static/media/left_engel.40ae9685.svg","height":303,"width":90,"blurWidth":0,"blurHeight":0},"alt":"svg left"}],["$","div",null,{"className":"grid grid-cols-1 gap-6 mx-auto","children":[["$","div","0",{"className":"border-2 border-secondary p-9 flex flex-col gap-5 lg:flex-row items-center rounded-lg hover:shadow-lg md:hover:scale-105 transition-all ease-in-out duration-500 bg-secondary bg-opacity-30 backdrop-blur-xl","children":[["$","div",null,{"children":["$","$L2",null,{"src":{"src":"/_next/static/media/submit_report1.226c6c8a.svg","height":91,"width":90,"blurWidth":0,"blurHeight":0},"alt":"penetration submit report"}]}],["$","div",null,{"className":"space-y-2","children":[["$","h1",null,{"className":"text-2xl lg:text-3xl text-secondary font-semibold","children":"Revise and Revamp"}],["$","p",null,{"children":"This step involves refining the collected data. The team categorizes vulnerabilities by severity, fine-tunes remediation advice, and ensures the report is clear and understandable."}]]}]]}],["$","div","1",{"className":"border-2 border-secondary p-9 flex flex-col gap-5 lg:flex-row items-center rounded-lg hover:shadow-lg md:hover:scale-105 transition-all ease-in-out duration-500 bg-secondary bg-opacity-30 backdrop-blur-xl","children":[["$","div",null,{"children":["$","$L2",null,{"src":{"src":"/_next/static/media/submit_report2.3775f618.svg","height":91,"width":90,"blurWidth":0,"blurHeight":0},"alt":"penetration submit report"}]}],["$","div",null,{"className":"space-y-2","children":[["$","h1",null,{"className":"text-2xl lg:text-3xl text-secondary font-semibold","children":"Evaluate and Review"}],["$","p",null,{"children":"Here, the findings and recommendations are critically evaluated. The team assesses the potential impact of each vulnerability and reviews the suggested actions for feasibility and effectiveness."}]]}]]}],["$","div","2",{"className":"border-2 border-secondary p-9 flex flex-col gap-5 lg:flex-row items-center rounded-lg hover:shadow-lg md:hover:scale-105 transition-all ease-in-out duration-500 bg-secondary bg-opacity-30 backdrop-blur-xl","children":[["$","div",null,{"children":["$","$L2",null,{"src":{"src":"/_next/static/media/submit_report3.1f28e66f.svg","height":91,"width":90,"blurWidth":0,"blurHeight":0},"alt":"penetration submit report"}]}],["$","div",null,{"className":"space-y-2","children":[["$","h1",null,{"className":"text-2xl lg:text-3xl text-secondary font-semibold","children":"Initial Prototype"}],["$","p",null,{"children":"The final stage is presenting a preliminary version of the report for internal review. This prototype includes all findings, analyses, and recommendations, allowing for any necessary adjustments before delivering the final report to the client."}]]}]]}]]}],["$","$L2",null,{"className":"lg:flex hidden mt-44","src":{"src":"/_next/static/media/right_engel.183ac07c.svg","height":303,"width":90,"blurWidth":0,"blurHeight":0},"alt":"svg right"}]]}]]}]}]]}],["$","section",null,{"className":"relative","children":[["$","$L2",null,{"src":{"src":"/_next/static/media/lins-carv3.adde3907.svg","height":1000,"width":1000,"blurWidth":0,"blurHeight":0},"alt":"map","className":"opacity-20 absolute lg:-top-20 -z-[100000] w-full "}],["$","div",null,{"className":"max-w-[1280px] mx-auto p-5 md:10","children":["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-2 justify-between gap-10 lg:gap-6 lg:px-10 py-14 md:py-16 lg:py-20","children":[["$","div",null,{"children":["$","$L2",null,{"src":{"src":"/_next/static/media/reports.900b5095.svg","height":631,"width":496,"blurWidth":0,"blurHeight":0},"alt":"penetration testing report"}]}],["$","div",null,{"className":"space-y-5","children":[["$","h1",null,{"className":"text-4xl lg:text-5xl font-semibold","children":["Want to see our ",["$","span",null,{"className":"text-secondary","children":"Reports?"}]]}],["$","p",null,{"children":"We provide top notch digital services with professional hands. We not only think about present security."}],["$","div",null,{"children":["$","div",null,{"children":["$","$L6",null,{"href":"/contact","className":"\n \n bg-gradient-to-r from-cyan-500 to-blue-500\n \n \n \n \n btn-lg text-[16px] md:text-md lg:text-lg \n \n text-button-color transition-all duration-300 ease-in-out flex flex-col justify-center items-center rounded-md font-semibold transition-all duration-300 hover:scale-105","children":"Request a Demo"}]}]}]]}]]}]}]]}],["$","div",null,{"className":"max-w-[1280px] mx-auto p-5 md:10","children":["$","div",null,{"className":" grid grid-cols-1 lg:grid-cols-2 gap-12 items-center justify-between lg:px-10 px-0 py-12 lg:py-16","children":[["$","div",null,{"className":"space-y-5 lg:space-y-6","children":[["$","h1",null,{"className":"font-semibold text-3xl lg:text-4xl leading-10","children":[["$","span",null,{"className":"text-secondary leading-8 ","children":"If you want a Penetration Test "}],["$","br",null,{}]," We want to talk with you."]}],["$","p",null,{"children":"We provide to notch digital services with professional hands. We not only think about present security but also it’s future."}],["$","div",null,{"children":["$","$L3",null,{"buttonSize":"medium"}]}]]}],["$","div",null,{"children":["$","$L2",null,{"src":{"src":"/_next/static/media/talk_mail.8549fa5e.svg","height":359,"width":442,"blurWidth":0,"blurHeight":0},"alt":"Penetration Mail","className":"w-8/12 mx-auto bg-light"}]}]]}]}]]}]]}],null]]},["$","$L7",null,{"parallelRouterKey":"children","segmentPath":["children","(pages)","children","services","children","network-security","children"],"loading":"$undefined","loadingStyles":"$undefined","loadingScripts":"$undefined","hasLoading":false,"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L8",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","notFoundStyles":"$undefined","styles":null}]]},["$","$L7",null,{"parallelRouterKey":"children","segmentPath":["children","(pages)","children","services","children"],"loading":"$undefined","loadingStyles":"$undefined","loadingScripts":"$undefined","hasLoading":false,"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L8",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","notFoundStyles":"$undefined","styles":null}]]},["$","$L7",null,{"parallelRouterKey":"children","segmentPath":["children","(pages)","children"],"loading":"$undefined","loadingStyles":"$undefined","loadingScripts":"$undefined","hasLoading":false,"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L8",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","notFoundStyles":"$undefined","styles":null}]]},[null,"$L9",null]],[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/082ad26250f47c4f.css","precedence":"next","crossOrigin":""}]],"$La"]]]] b:I[7259,["522","static/chunks/94730671-497e2dfe32483119.js","950","static/chunks/f8025e75-8575e23f53d4a0a1.js","51","static/chunks/795d4814-8e3958f9a45a46a5.js","749","static/chunks/749-43c2b7855fa56816.js","250","static/chunks/250-5d1eee2786853070.js","185","static/chunks/app/layout-d436b36e426cd33a.js"],""] c:I[9748,["522","static/chunks/94730671-497e2dfe32483119.js","950","static/chunks/f8025e75-8575e23f53d4a0a1.js","51","static/chunks/795d4814-8e3958f9a45a46a5.js","749","static/chunks/749-43c2b7855fa56816.js","250","static/chunks/250-5d1eee2786853070.js","185","static/chunks/app/layout-d436b36e426cd33a.js"],""] 9:["$","html",null,{"lang":"en","data-theme":"dark","children":[null,["$","body",null,{"className":"__className_dd2ae8","children":[["$","$Lb",null,{}],["$","$L7",null,{"parallelRouterKey":"children","segmentPath":["children"],"loading":["$","div",null,{"children":["$","div",null,{"className":"h-[100vh] flex items-center justify-center","children":["$","div",null,{"className":"flex items-center gap-6","children":[["$","div",null,{"className":"bg-white animate-ping h-24 md:h-32","children":"."}],["$","div",null,{"className":"bg-white animate-ping h-16 md:h-24","children":"."}],["$","div",null,{"className":"bg-white animate-ping h-32 md:h-40","children":"."}],["$","div",null,{"className":"bg-white animate-ping h-16 md:h-24","children":"."}],["$","div",null,{"className":"bg-white animate-ping h-24 md:h-32","children":"."}]]}]}]}],"loadingStyles":[],"loadingScripts":[],"hasLoading":true,"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L8",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":["$","div",null,{"className":"py-20 flex text-center flex-col justify-center items-center gap-5 text-lg","children":[["$","$L2",null,{"src":{"src":"/_next/static/media/error.fea07956.svg","height":500,"width":500,"blurWidth":0,"blurHeight":0},"alt":"error w-full"}],["$","$L6",null,{"href":"/","className":"\n \n \n bg-gradient-to-r transition-all duration-300 ease-in-out from-transparent to-blue-500 border border-primary border-opacity-100 hover:bg-gradient-to-r hover:from-blue-500 hover:to-transparent\n \n \n \n \n btn-md\n text-button-color transition-all duration-300 ease-in-out flex flex-col justify-center items-center rounded-md font-semibold transition-all duration-300 hover:scale-105","children":"Back to Home"}]]}],"notFoundStyles":[],"styles":null}],["$","footer",null,{"className":"lg:pt-20 lg:py-0 md:py-20 bg-[#09112D]","children":["$","div",null,{"className":"max-w-[1280px] mx-auto p-5 md:10","children":[["$","div",null,{"className":"footer md:gap-20 gap-10 flex-col","children":[["$","nav",null,{"children":[["$","$L6",null,{"href":"/","children":[" ",["$","$L6",null,{"href":"/","children":["$","$L2",null,{"className":"h-12 md:h-auto w-full","src":{"src":"/_next/static/media/logo-light.f53c1fb3.svg","height":64,"width":224,"blurWidth":0,"blurHeight":0},"alt":"logo"}]}]]}],["$","p",null,{"children":"Partner with us to ensure that your digital assets are not just protected for today, but are also prepared for the threats of tomorrow."}]]}],["$","nav",null,{"children":[["$","h6",null,{"className":"footer-title","children":"Company"}],[["$","$L6","API Security",{"href":"/services/api-security","className":"link link-hover","children":"API Security"}],["$","$L6","Cloud Security",{"href":"/services/cloud-security","className":"link link-hover","children":"Cloud Security"}],["$","$L6","Network Security",{"href":"/services/network-security","className":"link link-hover","children":"Network Security"}],["$","$L6","Web Application Security",{"href":"/services/web-app-security","className":"link link-hover","children":"Web Application Security"}],["$","$L6","Desktop Application Security",{"href":"/services/desktop-app-security","className":"link link-hover","children":"Desktop Application Security"}],["$","$L6","Mobile Application Security",{"href":"/services/mobile-app-security","className":"link link-hover","children":"Mobile Application Security"}]]]}],["$","nav",null,{"children":[["$","h6",null,{"className":"footer-title","children":"about"}],[["$","$L6","About us",{"href":"/about","className":"link link-hover","children":"About us"}],["$","$L6","Contact Us",{"href":"/contact","className":"link link-hover","children":"Contact Us"}],["$","$L6","News & Insights",{"href":"/blog","className":"link link-hover","children":"News & Insights"}]]]}],["$","nav",null,{"children":[["$","h6",null,{"className":"footer-title","children":"Address"}],[["$","$L6","3550D 73rd St, Queens, NY 11372, United States",{"href":"#","className":"link link-hover flex justify-center items-center","children":[["$","div",null,{"className":"inline text-3xl mr-3","children":["$","svg",null,{"stroke":"currentColor","fill":"currentColor","strokeWidth":"0","viewBox":"0 0 24 24","children":["$undefined",[["$","path","0",{"fill":"none","d":"M0 0h24v24H0z","children":[]}],["$","path","1",{"d":"M12 2C8.13 2 5 5.13 5 9c0 1.74.5 3.37 1.41 4.84.95 1.54 2.2 2.86 3.16 4.4.47.75.81 1.45 1.17 2.26.26.55.47 1.5 1.26 1.5s1-.95 1.25-1.5c.37-.81.7-1.51 1.17-2.26.96-1.53 2.21-2.85 3.16-4.4C18.5 12.37 19 10.74 19 9c0-3.87-3.13-7-7-7zm0 9.75a2.5 2.5 0 0 1 0-5 2.5 2.5 0 0 1 0 5z","children":[]}]]],"className":"$undefined","style":{"color":"$undefined"},"height":"1em","width":"1em","xmlns":"http://www.w3.org/2000/svg"}]}],"3550D 73rd St, Queens, NY 11372, United States"]}],["$","$L6","info@penstrike.io",{"href":"#","className":"link link-hover flex justify-center items-center","children":[["$","div",null,{"className":"inline text-3xl mr-3","children":["$","svg",null,{"stroke":"currentColor","fill":"currentColor","strokeWidth":"0","viewBox":"0 0 24 24","children":["$undefined",[["$","path","0",{"fill":"none","d":"M0 0h24v24H0z","children":[]}],["$","path","1",{"d":"M20 4H4c-1.1 0-1.99.9-1.99 2L2 18c0 1.1.9 2 2 2h16c1.1 0 2-.9 2-2V6c0-1.1-.9-2-2-2zm0 4-8 5-8-5V6l8 5 8-5v2z","children":[]}]]],"className":"$undefined","style":{"color":"$undefined"},"height":"1em","width":"1em","xmlns":"http://www.w3.org/2000/svg"}]}],"info@penstrike.io"]}],["$","$L6","+1 (347) 449-9123",{"href":"#","className":"link link-hover flex justify-center items-center","children":[["$","div",null,{"className":"inline text-3xl mr-3","children":["$","svg",null,{"stroke":"currentColor","fill":"currentColor","strokeWidth":"0","viewBox":"0 0 24 24","children":["$undefined",[["$","path","0",{"fill":"none","d":"M0 0h24v24H0z","children":[]}],["$","path","1",{"d":"M20 15.5c-1.25 0-2.45-.2-3.57-.57a1.02 1.02 0 0 0-1.02.24l-2.2 2.2a15.045 15.045 0 0 1-6.59-6.59l2.2-2.21a.96.96 0 0 0 .25-1A11.36 11.36 0 0 1 8.5 4c0-.55-.45-1-1-1H4c-.55 0-1 .45-1 1 0 9.39 7.61 17 17 17 .55 0 1-.45 1-1v-3.5c0-.55-.45-1-1-1zM19 12h2a9 9 0 0 0-9-9v2c3.87 0 7 3.13 7 7zm-4 0h2c0-2.76-2.24-5-5-5v2c1.66 0 3 1.34 3 3z","children":[]}]]],"className":"$undefined","style":{"color":"$undefined"},"height":"1em","width":"1em","xmlns":"http://www.w3.org/2000/svg"}]}],"+1 (347) 449-9123"]}]]]}]]}],["$","hr",null,{"className":"border-t border-white border-opacity-65 mt-5"}],["$","div",null,{"className":"flex md:flex-row flex-col gap-6 md:gap-0 justify-between py-5","children":[["$","p",null,{"children":["© ",2025," Penstrike Security Inc. All rights reserved."]}],["$","div",null,{"className":"flex gap-5","children":[["$","$L6","facebook",{"href":"https://www.facebook.com/penstrike.io","className":"link link-hover flex justify-center items-center","children":["$","div",null,{"className":"inline text-3xl mr-3","children":["$","svg",null,{"stroke":"currentColor","fill":"currentColor","strokeWidth":"0","viewBox":"0 0 24 24","children":["$undefined",[["$","path","0",{"fill":"none","d":"M0 0h24v24H0z","children":[]}],["$","path","1",{"d":"M22 12c0-5.52-4.48-10-10-10S2 6.48 2 12c0 4.84 3.44 8.87 8 9.8V15H8v-3h2V9.5C10 7.57 11.57 6 13.5 6H16v3h-2c-.55 0-1 .45-1 1v2h3v3h-3v6.95c5.05-.5 9-4.76 9-9.95z","children":[]}]]],"className":"$undefined","style":{"color":"$undefined"},"height":"1em","width":"1em","xmlns":"http://www.w3.org/2000/svg"}]}]}],["$","$L6","Linkedin",{"href":"https://www.linkedin.com/company/penstrike","className":"link link-hover flex justify-center items-center","children":["$","div",null,{"className":"inline text-3xl mr-3","children":["$","svg",null,{"stroke":"currentColor","fill":"currentColor","strokeWidth":"0","viewBox":"0 0 448 512","children":["$undefined",[["$","path","0",{"d":"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z","children":[]}]]],"className":"$undefined","style":{"color":"$undefined"},"height":"1em","width":"1em","xmlns":"http://www.w3.org/2000/svg"}]}]}],["$","$L6","Twitter",{"href":"http://x.com/penstrikesec","className":"link link-hover flex justify-center items-center","children":["$","div",null,{"className":"inline text-3xl mr-3","children":["$","svg",null,{"stroke":"currentColor","fill":"currentColor","strokeWidth":"0","viewBox":"0 0 16 16","children":["$undefined",[["$","path","0",{"d":"M12.6.75h2.454l-5.36 6.142L16 15.25h-4.937l-3.867-5.07-4.425 5.07H.316l5.733-6.57L0 .75h5.063l3.495 4.633L12.601.75Zm-.86 13.028h1.36L4.323 2.145H2.865l8.875 11.633Z","children":[]}]]],"className":"$undefined","style":{"color":"$undefined"},"height":"1em","width":"1em","xmlns":"http://www.w3.org/2000/svg"}]}]}]]}]]}]]}]}],["$","$Lc",null,{}]]}]]}] a:[["$","meta","0",{"name":"viewport","content":"width=device-width, initial-scale=1"}],["$","meta","1",{"charSet":"utf-8"}],["$","title","2",{"children":"Penstrike Security | Network Security"}],["$","meta","3",{"name":"description","content":"At Penstrike Security, we understand that each organization's security needs are unique. Whether you're a small startup or a large enterprise, our team is ready to provide you with a scalable and comprehensive security solution that protects, empowers, and grows with your business. Partner with us to ensure that your digital assets are not just protected for today, but are also prepared for the threats of tomorrow."}],["$","link","4",{"rel":"canonical","href":"www.penstrike.io"}],["$","meta","5",{"property":"og:title","content":"Penstrike Security | Network Security"}],["$","meta","6",{"property":"og:description","content":"At Penstrike Security, we understand that each organization's security needs are unique. Whether you're a small startup or a large enterprise, our team is ready to provide you with a scalable and comprehensive security solution that protects, empowers, and grows with your business. Partner with us to ensure that your digital assets are not just protected for today, but are also prepared for the threats of tomorrow."}],["$","meta","7",{"property":"og:image","content":"https://www.penstrike.io/assets/og_image.jpg"}],["$","meta","8",{"property":"og:type","content":"website"}],["$","meta","9",{"name":"twitter:card","content":"summary_large_image"}],["$","meta","10",{"name":"twitter:title","content":"Penstrike Security | Network Security"}],["$","meta","11",{"name":"twitter:description","content":"At Penstrike Security, we understand that each organization's security needs are unique. Whether you're a small startup or a large enterprise, our team is ready to provide you with a scalable and comprehensive security solution that protects, empowers, and grows with your business. Partner with us to ensure that your digital assets are not just protected for today, but are also prepared for the threats of tomorrow."}],["$","meta","12",{"name":"twitter:image","content":"https://www.penstrike.io/assets/og_image.jpg"}],["$","link","13",{"rel":"icon","href":"/favicon.ico","type":"image/x-icon","sizes":"80x80"}]] 1:null