2:I[1749,["574","static/chunks/370b0802-de2777ae184b25c9.js","749","static/chunks/749-43c2b7855fa56816.js","250","static/chunks/250-5d1eee2786853070.js","689","static/chunks/689-c24719034234702a.js","684","static/chunks/app/(pages)/services/web-app-security/page-344d6edde431026b.js"],"Image"] 3:I[5940,["574","static/chunks/370b0802-de2777ae184b25c9.js","749","static/chunks/749-43c2b7855fa56816.js","250","static/chunks/250-5d1eee2786853070.js","689","static/chunks/689-c24719034234702a.js","684","static/chunks/app/(pages)/services/web-app-security/page-344d6edde431026b.js"],""] 6:I[5250,["574","static/chunks/370b0802-de2777ae184b25c9.js","749","static/chunks/749-43c2b7855fa56816.js","250","static/chunks/250-5d1eee2786853070.js","689","static/chunks/689-c24719034234702a.js","684","static/chunks/app/(pages)/services/web-app-security/page-344d6edde431026b.js"],""] 7:I[5613,[],""] 8:I[1778,[],""] 4:{"src":"/_next/static/media/lins-carv.7b28c2b7.svg","height":1375,"width":1914,"blurWidth":0,"blurHeight":0} 5:{"src":"/_next/static/media/shield_protect.f24120e4.svg","height":76,"width":76,"blurWidth":0,"blurHeight":0} 0:["3T1-riK7N9l7M2WzmiGjm",[[["",{"children":["(pages)",{"children":["services",{"children":["web-app-security",{"children":["__PAGE__",{}]}]}]}]},"$undefined","$undefined",true],["",{"children":["(pages)",{"children":["services",{"children":["web-app-security",{"children":["__PAGE__",{},["$L1",["$","div",null,{"children":[["$","section",null,{"className":"py-10 relative","children":[["$","$L2",null,{"src":{"src":"/_next/static/media/lins-carv.7b28c2b7.svg","height":1375,"width":1914,"blurWidth":0,"blurHeight":0},"alt":"map","className":"opacity-40 md:hidden flex absolute lg:top-0 -z-10 w-full "}],["$","div",null,{"className":" mx-auto -mt-[20px] ","children":["$","$L2",null,{"className":"lg:flex hidden absolute opacity-40 -mt-36 -z-10 w-full lg:h-auto ","src":{"src":"/_next/static/media/services_banner.3cd20417.svg","height":872,"width":1920,"blurWidth":0,"blurHeight":0},"alt":"services banner","quality":70}]}],["$","div",null,{"className":"max-w-[1280px] mx-auto p-5 md:10","children":["$","div",null,{"className":"lg:px-10 grid grid-cols-1 lg:grid-cols-2 gap-10 lg:gap-1 items-center ","children":[["$","div",null,{"className":"space-y-8 mx-auto","children":[["$","h1",null,{"className":" text-2xl lg:text-[40px] font-semibold ","children":["Top Notch ",["$","span",null,{"className":" bg-gradient-to-tr from-secondary to-primary p-2 py-4 rounded-full","children":"Web App "}],["$","br",null,{}],["$","br",null,{}]," Pentest With Professionals."]}],["$","p",null,{"className":"leading-6 lg:leading-8 ","children":"Navigate the complex cybersecurity landscape with confidence, backed by our proactive measures and deep expertise in protecting your digital interests..."}],["$","div",null,{"children":["$","$L3",null,{"buttonSize":"medium"}]}]]}],["$","div",null,{"className":"mx-auto bg-light","children":["$","$L2",null,{"className":"lg:h-[400px]","src":{"src":"/_next/static/media/web_service.295b0d15.svg","height":400,"width":692,"blurWidth":0,"blurHeight":0},"alt":"mobile app banner part"}]}]]}]}]]}],["$","section",null,{"children":[["$","div",null,{"className":"relative","children":[["$","$L2",null,{"src":"$4","alt":"map","className":"opacity-40 absolute lg:top-0 -z-10 w-full "}],["$","div",null,{"className":"max-w-[1280px] mx-auto p-5 md:10","children":["$","div",null,{"className":"lg:py-16 py-10 md:px-8 lg:px-10","children":[["$","div",null,{"children":["$","h1",null,{"className":" text-center text-2xl font-semibold md:text-3xl lg:text-4xl","children":[["$","span",null,{"className":"text-secondary ","children":["Importance of ","Web Application"]}],["$","br",null,{}]," Penetration Testing and Vulnerability Assessment"]}]}],["$","div",null,{"className":"flex lg:flex-row flex-col items-center ","children":[["$","div",null,{"className":"grid grid-cols-1 gap-4 py-10","children":[["$","div","0",{"className":"lg:h-32 py-6 px-6 bg-secondary bg-opacity-30 backdrop-blur-xl border-secondary border-2 rounded-lg","children":[["$","h1",null,{"className":"font-semibold text-secondary","children":" \n Vulnerability Identification"}],["$","p",null,{"className":"text-[14px] ","children":" Discover and address security weaknesses before they are exploited.\n\n "}]]}],["$","div","1",{"className":"lg:h-32 py-6 px-6 bg-secondary bg-opacity-30 backdrop-blur-xl border-secondary border-2 rounded-lg","children":[["$","h1",null,{"className":"font-semibold text-secondary","children":"Data Protection\n "}],["$","p",null,{"className":"text-[14px] ","children":" Protect critical user data, such as credit card details and personal information.\n "}]]}],["$","div","2",{"className":"lg:h-32 py-6 px-6 bg-secondary bg-opacity-30 backdrop-blur-xl border-secondary border-2 rounded-lg","children":[["$","h1",null,{"className":"font-semibold text-secondary","children":"Regulatory Compliance"}],["$","p",null,{"className":"text-[14px] ","children":"Ensure adherence to industry standards, avoiding fines and legal issues.\n\n "}]]}]]}],["$","div",null,{"className":"-z-10 lg:flex hidden relative","children":["$","$L2",null,{"src":{"src":"/_next/static/media/importanceLogo1.e94e21af.svg","height":422,"width":204,"blurWidth":0,"blurHeight":0},"alt":"logo"}]}],["$","div",null,{"className":"-z-10 flex lg:hidden relative","children":["$","$L2",null,{"src":{"src":"/_next/static/media/importanceLogo.4ee0c19d.svg","height":114,"width":109,"blurWidth":0,"blurHeight":0},"alt":"logo"}]}],["$","div",null,{"className":"grid grid-cols-1 gap-4 py-10","children":[["$","div","0",{"className":"lg:h-32 py-6 px-6 bg-secondary bg-opacity-30 backdrop-blur-xl border-secondary border-2 rounded-lg","children":[["$","h1",null,{"className":"font-semibold text-secondary","children":"Tailored Security\n "}],["$","p",null,{"className":"text-[14px] ","children":" Receive customized security solutions based on your specific needs.\n\n "}]]}],["$","div","1",{"className":"lg:h-32 py-6 px-6 bg-secondary bg-opacity-30 backdrop-blur-xl border-secondary border-2 rounded-lg","children":[["$","h1",null,{"className":"font-semibold text-secondary","children":"Financial Loss"}],["$","p",null,{"className":"text-[14px] ","children":" Prevent costly incidents related to data breaches and system downtime.\n\n "}]]}],["$","div","2",{"className":"lg:h-32 py-6 px-6 bg-secondary bg-opacity-30 backdrop-blur-xl border-secondary border-2 rounded-lg","children":[["$","h1",null,{"className":"font-semibold text-secondary","children":"Actionable Insights\n "}],["$","p",null,{"className":"text-[14px] ","children":" Gain clear, actionable advice from detailed security reports.\n\n "}]]}]]}]]}]]}]}]]}],["$","div",null,{"className":"max-w-[1280px] mx-auto p-5 md:10","children":[["$","div",null,{"className":"text-center py-10 lg:py-14","children":["$","h1",null,{"className":"text-3xl lg:text-4xl font-semibold","children":[["$","span",null,{"className":"text-secondary","children":"How we Protect "}]," ",["$","br",null,{}],"Understand our Services."]}]}],["$","div",null,{"className":"relative flex justify-center items-center flex-col bg-center bg-contain bg-no-repeat ","style":{"backgroundImage":"url(/_next/static/media/protect_banner.02640dab.svg)"},"children":[["$","div",null,{"className":"bg-primary bg-opacity-30 absolute rounded-full w-[100px] h-[100px] lg:w-[600px] lg:h-[600px] animate-ping"}],["$","div",null,{"className":"flex flex-row lg:translate-y-24 gap-2","children":[["$","div",null,{}],[["$","div",null,{"style":{"backgroundImage":"url(/_next/static/media/Polygon.edaf156e.svg)"},"className":" bg-contain bg-no-repeat bg-center mx-auto w-44 md:w-80 h-64 md:h-96 p-6 relative flex items-center justify-center flex-col text-center gap-5","children":["$","div",null,{"className":" flex flex-col justify-center items-center md:px-8","children":[["$","$L2",null,{"className":"md:h-auto h-10","src":{"src":"/_next/static/media/shield_protect.f24120e4.svg","height":76,"width":76,"blurWidth":0,"blurHeight":0},"alt":"protect shield"}],["$","h1",null,{"className":"font-bold text-secondary text-[14px] md:text-[18px]","children":" Quotation "}],["$","p",null,{"className":" text-[9px] md:text-[14px]","children":[" ","Get a customized security service quote tailored to your business needs."]}]]}]}],["$","div",null,{"style":{"backgroundImage":"url(/_next/static/media/Polygon.edaf156e.svg)"},"className":" bg-contain bg-no-repeat bg-center mx-auto w-44 md:w-80 h-64 md:h-96 p-6 relative flex items-center justify-center flex-col text-center gap-5","children":["$","div",null,{"className":" flex flex-col justify-center items-center md:px-8","children":[["$","$L2",null,{"className":"md:h-auto h-10","src":"$5","alt":"protect shield"}],["$","h1",null,{"className":"font-bold text-secondary text-[14px] md:text-[18px]","children":" Scope Definition"}],["$","p",null,{"className":" text-[9px] md:text-[14px]","children":[" ","Outline assessment boundaries and goals for targeted security analysis."]}]]}]}]],["$","div",null,{}]]}],["$","div",null,{"className":"grid grid-cols-1 lg:grid-cols-3 lg:gap-0 gap-10 md:gap-14 ","children":[["$","div",null,{"className":"-mt-24 lg:mt-0","children":[["$","div",null,{"style":{"backgroundImage":"url(/_next/static/media/Polygon.edaf156e.svg)"},"className":" bg-contain bg-no-repeat bg-center mx-auto w-44 md:w-80 h-64 md:h-96 p-6 relative flex items-center justify-center flex-col text-center gap-5","children":["$","div",null,{"className":" flex flex-col justify-center items-center md:px-8","children":[["$","$L2",null,{"className":"md:h-auto h-10","src":"$5","alt":"protect shield"}],["$","h1",null,{"className":"font-bold text-secondary text-[14px] md:text-[18px]","children":" Assessment"}],["$","p",null,{"className":" text-[9px] md:text-[14px]","children":[" ","Identify vulnerabilities using advanced assessment techniques."]}]]}]}]]}],["$","div",null,{}],["$","div",null,{"className":"-mb-24 lg:mb-0","children":[["$","div",null,{"style":{"backgroundImage":"url(/_next/static/media/Polygon.edaf156e.svg)"},"className":" bg-contain bg-no-repeat bg-center mx-auto w-44 md:w-80 h-64 md:h-96 p-6 relative flex items-center justify-center flex-col text-center gap-5","children":["$","div",null,{"className":" flex flex-col justify-center items-center md:px-8","children":[["$","$L2",null,{"className":"md:h-auto h-10","src":"$5","alt":"protect shield"}],["$","h1",null,{"className":"font-bold text-secondary text-[14px] md:text-[18px]","children":"Exploitation"}],["$","p",null,{"className":" text-[9px] md:text-[14px]","children":[" ","Simulate attacks to evaluate real-world exposure and risks."]}]]}]}]]}]]}],["$","div",null,{"className":"flex flex-row lg:-translate-y-24 gap-2","children":[["$","div",null,{}],[["$","div",null,{"style":{"backgroundImage":"url(/_next/static/media/Polygon.edaf156e.svg)"},"className":" bg-contain bg-no-repeat bg-center mx-auto w-44 md:w-80 h-64 md:h-96 p-6 relative flex items-center justify-center flex-col text-center gap-5","children":["$","div",null,{"className":" flex flex-col justify-center items-center md:px-8","children":[["$","$L2",null,{"className":"md:h-auto h-10","src":"$5","alt":"protect shield"}],["$","h1",null,{"className":"font-bold text-secondary text-[14px] md:text-[18px]","children":"Reporting"}],["$","p",null,{"className":" text-[9px] md:text-[14px]","children":[" ","Receive concise reports with clear vulnerability insights and fixes."]}]]}]}],["$","div",null,{"style":{"backgroundImage":"url(/_next/static/media/Polygon.edaf156e.svg)"},"className":" bg-contain bg-no-repeat bg-center mx-auto w-44 md:w-80 h-64 md:h-96 p-6 relative flex items-center justify-center flex-col text-center gap-5","children":["$","div",null,{"className":" flex flex-col justify-center items-center md:px-8","children":[["$","$L2",null,{"className":"md:h-auto h-10","src":"$5","alt":"protect shield"}],["$","h1",null,{"className":"font-bold text-secondary text-[14px] md:text-[18px]","children":" Follow-up"}],["$","p",null,{"className":" text-[9px] md:text-[14px]","children":[" ","Ensure lasting security with follow-up checks and updates."]}]]}]}]],["$","div",null,{}]]}]]}]]}],["$","section",null,{"className":"relative","children":[["$","$L2",null,{"src":"$4","alt":"map","className":"opacity-30 absolute lg:top-0 -z-10 w-full "}],["$","div",null,{"className":"max-w-[1280px] mx-auto p-5 md:10","children":["$","div",null,{"className":"space-y-8","children":[["$","div",null,{"className":"text-center","children":["$","h1",null,{"className":"text-3xl md:text-4xl lg:text-5xl font-semibold","children":[["$","span",null,{"className":"text-secondary","children":"How We Submit Your "}]," ",["$","br",null,{}]," Penetration Testing Report"]}]}],["$","div",null,{"className":"flex lg:w-[70%] mx-auto","children":[["$","$L2",null,{"className":"lg:flex hidden -mt-44","src":{"src":"/_next/static/media/left_engel.40ae9685.svg","height":303,"width":90,"blurWidth":0,"blurHeight":0},"alt":"svg left"}],["$","div",null,{"className":"grid grid-cols-1 gap-6 mx-auto","children":[["$","div","0",{"className":"border-2 border-secondary p-9 flex flex-col gap-5 lg:flex-row items-center rounded-lg hover:shadow-lg md:hover:scale-105 transition-all ease-in-out duration-500 bg-secondary bg-opacity-30 backdrop-blur-xl","children":[["$","div",null,{"children":["$","$L2",null,{"src":{"src":"/_next/static/media/submit_report1.226c6c8a.svg","height":91,"width":90,"blurWidth":0,"blurHeight":0},"alt":"penetration submit report"}]}],["$","div",null,{"className":"space-y-2","children":[["$","h1",null,{"className":"text-2xl lg:text-3xl text-secondary font-semibold","children":"Revise and Revamp"}],["$","p",null,{"children":"This step involves refining the collected data. The team categorizes vulnerabilities by severity, fine-tunes remediation advice, and ensures the report is clear and understandable."}]]}]]}],["$","div","1",{"className":"border-2 border-secondary p-9 flex flex-col gap-5 lg:flex-row items-center rounded-lg hover:shadow-lg md:hover:scale-105 transition-all ease-in-out duration-500 bg-secondary bg-opacity-30 backdrop-blur-xl","children":[["$","div",null,{"children":["$","$L2",null,{"src":{"src":"/_next/static/media/submit_report2.3775f618.svg","height":91,"width":90,"blurWidth":0,"blurHeight":0},"alt":"penetration submit report"}]}],["$","div",null,{"className":"space-y-2","children":[["$","h1",null,{"className":"text-2xl lg:text-3xl text-secondary font-semibold","children":"Evaluate and Review"}],["$","p",null,{"children":"Here, the findings and recommendations are critically evaluated. The team assesses the potential impact of each vulnerability and reviews the suggested actions for feasibility and effectiveness."}]]}]]}],["$","div","2",{"className":"border-2 border-secondary p-9 flex flex-col gap-5 lg:flex-row items-center rounded-lg hover:shadow-lg md:hover:scale-105 transition-all ease-in-out duration-500 bg-secondary bg-opacity-30 backdrop-blur-xl","children":[["$","div",null,{"children":["$","$L2",null,{"src":{"src":"/_next/static/media/submit_report3.1f28e66f.svg","height":91,"width":90,"blurWidth":0,"blurHeight":0},"alt":"penetration submit report"}]}],["$","div",null,{"className":"space-y-2","children":[["$","h1",null,{"className":"text-2xl lg:text-3xl text-secondary font-semibold","children":"Initial Prototype"}],["$","p",null,{"children":"The final stage is presenting a preliminary version of the report for internal review. This prototype includes all findings, analyses, and recommendations, allowing for any necessary adjustments before delivering the final report to the client."}]]}]]}]]}],["$","$L2",null,{"className":"lg:flex hidden mt-44","src":{"src":"/_next/static/media/right_engel.183ac07c.svg","height":303,"width":90,"blurWidth":0,"blurHeight":0},"alt":"svg right"}]]}]]}]}]]}],["$","section",null,{"className":"relative","children":[["$","$L2",null,{"src":{"src":"/_next/static/media/lins-carv3.adde3907.svg","height":1000,"width":1000,"blurWidth":0,"blurHeight":0},"alt":"map","className":"opacity-20 absolute lg:-top-20 -z-[100000] w-full "}],["$","div",null,{"className":"max-w-[1280px] mx-auto p-5 md:10","children":["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-2 justify-between gap-10 lg:gap-6 lg:px-10 py-14 md:py-16 lg:py-20","children":[["$","div",null,{"children":["$","$L2",null,{"src":{"src":"/_next/static/media/reports.900b5095.svg","height":631,"width":496,"blurWidth":0,"blurHeight":0},"alt":"penetration testing report"}]}],["$","div",null,{"className":"space-y-5","children":[["$","h1",null,{"className":"text-4xl lg:text-5xl font-semibold","children":["Want to see our ",["$","span",null,{"className":"text-secondary","children":"Reports?"}]]}],["$","p",null,{"children":"We provide top notch digital services with professional hands. We not only think about present security."}],["$","div",null,{"children":["$","div",null,{"children":["$","$L6",null,{"href":"/contact","className":"\n \n bg-gradient-to-r from-cyan-500 to-blue-500\n \n \n \n \n btn-lg text-[16px] md:text-md lg:text-lg \n \n text-button-color transition-all duration-300 ease-in-out flex flex-col justify-center items-center rounded-md font-semibold transition-all duration-300 hover:scale-105","children":"Request a Demo"}]}]}]]}]]}]}]]}],["$","div",null,{"className":"max-w-[1280px] mx-auto p-5 md:10","children":["$","div",null,{"className":" grid grid-cols-1 lg:grid-cols-2 gap-12 items-center justify-between lg:px-10 px-0 py-12 lg:py-16","children":[["$","div",null,{"className":"space-y-5 lg:space-y-6","children":[["$","h1",null,{"className":"font-semibold text-3xl lg:text-4xl leading-10","children":[["$","span",null,{"className":"text-secondary leading-8 ","children":"If you want a Penetration Test "}],["$","br",null,{}]," We want to talk with you."]}],["$","p",null,{"children":"We provide to notch digital services with professional hands. We not only think about present security but also it’s future."}],["$","div",null,{"children":["$","$L3",null,{"buttonSize":"medium"}]}]]}],["$","div",null,{"children":["$","$L2",null,{"src":{"src":"/_next/static/media/talk_mail.8549fa5e.svg","height":359,"width":442,"blurWidth":0,"blurHeight":0},"alt":"Penetration Mail","className":"w-8/12 mx-auto bg-light"}]}]]}]}]]}]]}],null]]},["$","$L7",null,{"parallelRouterKey":"children","segmentPath":["children","(pages)","children","services","children","web-app-security","children"],"loading":"$undefined","loadingStyles":"$undefined","loadingScripts":"$undefined","hasLoading":false,"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L8",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","notFoundStyles":"$undefined","styles":null}]]},["$","$L7",null,{"parallelRouterKey":"children","segmentPath":["children","(pages)","children","services","children"],"loading":"$undefined","loadingStyles":"$undefined","loadingScripts":"$undefined","hasLoading":false,"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L8",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","notFoundStyles":"$undefined","styles":null}]]},["$","$L7",null,{"parallelRouterKey":"children","segmentPath":["children","(pages)","children"],"loading":"$undefined","loadingStyles":"$undefined","loadingScripts":"$undefined","hasLoading":false,"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L8",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","notFoundStyles":"$undefined","styles":null}]]},[null,"$L9",null]],[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/082ad26250f47c4f.css","precedence":"next","crossOrigin":""}]],"$La"]]]] b:I[7259,["522","static/chunks/94730671-497e2dfe32483119.js","950","static/chunks/f8025e75-8575e23f53d4a0a1.js","51","static/chunks/795d4814-8e3958f9a45a46a5.js","749","static/chunks/749-43c2b7855fa56816.js","250","static/chunks/250-5d1eee2786853070.js","185","static/chunks/app/layout-d436b36e426cd33a.js"],""] c:I[9748,["522","static/chunks/94730671-497e2dfe32483119.js","950","static/chunks/f8025e75-8575e23f53d4a0a1.js","51","static/chunks/795d4814-8e3958f9a45a46a5.js","749","static/chunks/749-43c2b7855fa56816.js","250","static/chunks/250-5d1eee2786853070.js","185","static/chunks/app/layout-d436b36e426cd33a.js"],""] 9:["$","html",null,{"lang":"en","data-theme":"dark","children":[null,["$","body",null,{"className":"__className_dd2ae8","children":[["$","$Lb",null,{}],["$","$L7",null,{"parallelRouterKey":"children","segmentPath":["children"],"loading":["$","div",null,{"children":["$","div",null,{"className":"h-[100vh] flex items-center justify-center","children":["$","div",null,{"className":"flex items-center gap-6","children":[["$","div",null,{"className":"bg-white animate-ping h-24 md:h-32","children":"."}],["$","div",null,{"className":"bg-white animate-ping h-16 md:h-24","children":"."}],["$","div",null,{"className":"bg-white animate-ping h-32 md:h-40","children":"."}],["$","div",null,{"className":"bg-white animate-ping h-16 md:h-24","children":"."}],["$","div",null,{"className":"bg-white animate-ping h-24 md:h-32","children":"."}]]}]}]}],"loadingStyles":[],"loadingScripts":[],"hasLoading":true,"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L8",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":["$","div",null,{"className":"py-20 flex text-center flex-col justify-center items-center gap-5 text-lg","children":[["$","$L2",null,{"src":{"src":"/_next/static/media/error.fea07956.svg","height":500,"width":500,"blurWidth":0,"blurHeight":0},"alt":"error w-full"}],["$","$L6",null,{"href":"/","className":"\n \n \n bg-gradient-to-r transition-all duration-300 ease-in-out from-transparent to-blue-500 border border-primary border-opacity-100 hover:bg-gradient-to-r hover:from-blue-500 hover:to-transparent\n \n \n \n \n btn-md\n text-button-color transition-all duration-300 ease-in-out flex flex-col justify-center items-center rounded-md font-semibold transition-all duration-300 hover:scale-105","children":"Back to Home"}]]}],"notFoundStyles":[],"styles":null}],["$","footer",null,{"className":"lg:pt-20 lg:py-0 md:py-20 bg-[#09112D]","children":["$","div",null,{"className":"max-w-[1280px] mx-auto p-5 md:10","children":[["$","div",null,{"className":"footer md:gap-20 gap-10 flex-col","children":[["$","nav",null,{"children":[["$","$L6",null,{"href":"/","children":[" ",["$","$L6",null,{"href":"/","children":["$","$L2",null,{"className":"h-12 md:h-auto w-full","src":{"src":"/_next/static/media/logo-light.f53c1fb3.svg","height":64,"width":224,"blurWidth":0,"blurHeight":0},"alt":"logo"}]}]]}],["$","p",null,{"children":"Partner with us to ensure that your digital assets are not just protected for today, but are also prepared for the threats of tomorrow."}]]}],["$","nav",null,{"children":[["$","h6",null,{"className":"footer-title","children":"Company"}],[["$","$L6","API Security",{"href":"/services/api-security","className":"link link-hover","children":"API Security"}],["$","$L6","Cloud Security",{"href":"/services/cloud-security","className":"link link-hover","children":"Cloud Security"}],["$","$L6","Network Security",{"href":"/services/network-security","className":"link link-hover","children":"Network Security"}],["$","$L6","Web Application Security",{"href":"/services/web-app-security","className":"link link-hover","children":"Web Application Security"}],["$","$L6","Desktop Application Security",{"href":"/services/desktop-app-security","className":"link link-hover","children":"Desktop Application Security"}],["$","$L6","Mobile Application Security",{"href":"/services/mobile-app-security","className":"link link-hover","children":"Mobile Application Security"}]]]}],["$","nav",null,{"children":[["$","h6",null,{"className":"footer-title","children":"about"}],[["$","$L6","About us",{"href":"/about","className":"link link-hover","children":"About us"}],["$","$L6","Contact Us",{"href":"/contact","className":"link link-hover","children":"Contact Us"}],["$","$L6","News & Insights",{"href":"/blog","className":"link link-hover","children":"News & Insights"}]]]}],["$","nav",null,{"children":[["$","h6",null,{"className":"footer-title","children":"Address"}],[["$","$L6","3550D 73rd St, Queens, NY 11372, United States",{"href":"#","className":"link link-hover flex justify-center items-center","children":[["$","div",null,{"className":"inline text-3xl mr-3","children":["$","svg",null,{"stroke":"currentColor","fill":"currentColor","strokeWidth":"0","viewBox":"0 0 24 24","children":["$undefined",[["$","path","0",{"fill":"none","d":"M0 0h24v24H0z","children":[]}],["$","path","1",{"d":"M12 2C8.13 2 5 5.13 5 9c0 1.74.5 3.37 1.41 4.84.95 1.54 2.2 2.86 3.16 4.4.47.75.81 1.45 1.17 2.26.26.55.47 1.5 1.26 1.5s1-.95 1.25-1.5c.37-.81.7-1.51 1.17-2.26.96-1.53 2.21-2.85 3.16-4.4C18.5 12.37 19 10.74 19 9c0-3.87-3.13-7-7-7zm0 9.75a2.5 2.5 0 0 1 0-5 2.5 2.5 0 0 1 0 5z","children":[]}]]],"className":"$undefined","style":{"color":"$undefined"},"height":"1em","width":"1em","xmlns":"http://www.w3.org/2000/svg"}]}],"3550D 73rd St, Queens, NY 11372, United States"]}],["$","$L6","info@penstrike.io",{"href":"#","className":"link link-hover flex justify-center items-center","children":[["$","div",null,{"className":"inline text-3xl mr-3","children":["$","svg",null,{"stroke":"currentColor","fill":"currentColor","strokeWidth":"0","viewBox":"0 0 24 24","children":["$undefined",[["$","path","0",{"fill":"none","d":"M0 0h24v24H0z","children":[]}],["$","path","1",{"d":"M20 4H4c-1.1 0-1.99.9-1.99 2L2 18c0 1.1.9 2 2 2h16c1.1 0 2-.9 2-2V6c0-1.1-.9-2-2-2zm0 4-8 5-8-5V6l8 5 8-5v2z","children":[]}]]],"className":"$undefined","style":{"color":"$undefined"},"height":"1em","width":"1em","xmlns":"http://www.w3.org/2000/svg"}]}],"info@penstrike.io"]}],["$","$L6","+1 (347) 449-9123",{"href":"#","className":"link link-hover flex justify-center items-center","children":[["$","div",null,{"className":"inline text-3xl mr-3","children":["$","svg",null,{"stroke":"currentColor","fill":"currentColor","strokeWidth":"0","viewBox":"0 0 24 24","children":["$undefined",[["$","path","0",{"fill":"none","d":"M0 0h24v24H0z","children":[]}],["$","path","1",{"d":"M20 15.5c-1.25 0-2.45-.2-3.57-.57a1.02 1.02 0 0 0-1.02.24l-2.2 2.2a15.045 15.045 0 0 1-6.59-6.59l2.2-2.21a.96.96 0 0 0 .25-1A11.36 11.36 0 0 1 8.5 4c0-.55-.45-1-1-1H4c-.55 0-1 .45-1 1 0 9.39 7.61 17 17 17 .55 0 1-.45 1-1v-3.5c0-.55-.45-1-1-1zM19 12h2a9 9 0 0 0-9-9v2c3.87 0 7 3.13 7 7zm-4 0h2c0-2.76-2.24-5-5-5v2c1.66 0 3 1.34 3 3z","children":[]}]]],"className":"$undefined","style":{"color":"$undefined"},"height":"1em","width":"1em","xmlns":"http://www.w3.org/2000/svg"}]}],"+1 (347) 449-9123"]}]]]}]]}],["$","hr",null,{"className":"border-t border-white border-opacity-65 mt-5"}],["$","div",null,{"className":"flex md:flex-row flex-col gap-6 md:gap-0 justify-between py-5","children":[["$","p",null,{"children":["© ",2025," Penstrike Security Inc. All rights reserved."]}],["$","div",null,{"className":"flex gap-5","children":[["$","$L6","facebook",{"href":"https://www.facebook.com/penstrike.io","className":"link link-hover flex justify-center items-center","children":["$","div",null,{"className":"inline text-3xl mr-3","children":["$","svg",null,{"stroke":"currentColor","fill":"currentColor","strokeWidth":"0","viewBox":"0 0 24 24","children":["$undefined",[["$","path","0",{"fill":"none","d":"M0 0h24v24H0z","children":[]}],["$","path","1",{"d":"M22 12c0-5.52-4.48-10-10-10S2 6.48 2 12c0 4.84 3.44 8.87 8 9.8V15H8v-3h2V9.5C10 7.57 11.57 6 13.5 6H16v3h-2c-.55 0-1 .45-1 1v2h3v3h-3v6.95c5.05-.5 9-4.76 9-9.95z","children":[]}]]],"className":"$undefined","style":{"color":"$undefined"},"height":"1em","width":"1em","xmlns":"http://www.w3.org/2000/svg"}]}]}],["$","$L6","Linkedin",{"href":"https://www.linkedin.com/company/penstrike","className":"link link-hover flex justify-center items-center","children":["$","div",null,{"className":"inline text-3xl mr-3","children":["$","svg",null,{"stroke":"currentColor","fill":"currentColor","strokeWidth":"0","viewBox":"0 0 448 512","children":["$undefined",[["$","path","0",{"d":"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z","children":[]}]]],"className":"$undefined","style":{"color":"$undefined"},"height":"1em","width":"1em","xmlns":"http://www.w3.org/2000/svg"}]}]}],["$","$L6","Twitter",{"href":"http://x.com/penstrikesec","className":"link link-hover flex justify-center items-center","children":["$","div",null,{"className":"inline text-3xl mr-3","children":["$","svg",null,{"stroke":"currentColor","fill":"currentColor","strokeWidth":"0","viewBox":"0 0 16 16","children":["$undefined",[["$","path","0",{"d":"M12.6.75h2.454l-5.36 6.142L16 15.25h-4.937l-3.867-5.07-4.425 5.07H.316l5.733-6.57L0 .75h5.063l3.495 4.633L12.601.75Zm-.86 13.028h1.36L4.323 2.145H2.865l8.875 11.633Z","children":[]}]]],"className":"$undefined","style":{"color":"$undefined"},"height":"1em","width":"1em","xmlns":"http://www.w3.org/2000/svg"}]}]}]]}]]}]]}]}],["$","$Lc",null,{}]]}]]}] a:[["$","meta","0",{"name":"viewport","content":"width=device-width, initial-scale=1"}],["$","meta","1",{"charSet":"utf-8"}],["$","title","2",{"children":"Penstrike Security | Web App Security"}],["$","meta","3",{"name":"description","content":"At Penstrike Security, we understand that each organization's security needs are unique. Whether you're a small startup or a large enterprise, our team is ready to provide you with a scalable and comprehensive security solution that protects, empowers, and grows with your business. Partner with us to ensure that your digital assets are not just protected for today, but are also prepared for the threats of tomorrow."}],["$","link","4",{"rel":"canonical","href":"www.penstrike.io"}],["$","meta","5",{"property":"og:title","content":"Penstrike Security | Web App Security"}],["$","meta","6",{"property":"og:description","content":"At Penstrike Security, we understand that each organization's security needs are unique. Whether you're a small startup or a large enterprise, our team is ready to provide you with a scalable and comprehensive security solution that protects, empowers, and grows with your business. Partner with us to ensure that your digital assets are not just protected for today, but are also prepared for the threats of tomorrow."}],["$","meta","7",{"property":"og:image","content":"https://www.penstrike.io/assets/og_image.jpg"}],["$","meta","8",{"property":"og:type","content":"website"}],["$","meta","9",{"name":"twitter:card","content":"summary_large_image"}],["$","meta","10",{"name":"twitter:title","content":"Penstrike Security | Web App Security"}],["$","meta","11",{"name":"twitter:description","content":"At Penstrike Security, we understand that each organization's security needs are unique. Whether you're a small startup or a large enterprise, our team is ready to provide you with a scalable and comprehensive security solution that protects, empowers, and grows with your business. Partner with us to ensure that your digital assets are not just protected for today, but are also prepared for the threats of tomorrow."}],["$","meta","12",{"name":"twitter:image","content":"https://www.penstrike.io/assets/og_image.jpg"}],["$","link","13",{"rel":"icon","href":"/favicon.ico","type":"image/x-icon","sizes":"80x80"}]] 1:null