1:"$Sreact.fragment" 2:I[7780,["63","static/chunks/63-ddec78ffc4cb7138.js","874","static/chunks/874-f11f1fe6182f9b6f.js","497","static/chunks/497-146d19ca9c59647f.js","177","static/chunks/app/layout-e92d36e08924af4a.js"],"ThemeProvider"] 3:I[3115,["63","static/chunks/63-ddec78ffc4cb7138.js","874","static/chunks/874-f11f1fe6182f9b6f.js","497","static/chunks/497-146d19ca9c59647f.js","177","static/chunks/app/layout-e92d36e08924af4a.js"],"default"] 4:I[7555,[],""] 5:I[1295,[],""] 6:I[6874,["63","static/chunks/63-ddec78ffc4cb7138.js","874","static/chunks/874-f11f1fe6182f9b6f.js","801","static/chunks/app/projects/%5Bid%5D/page-033a70c6acd18d0c.js"],""] 7:I[3063,["63","static/chunks/63-ddec78ffc4cb7138.js","874","static/chunks/874-f11f1fe6182f9b6f.js","801","static/chunks/app/projects/%5Bid%5D/page-033a70c6acd18d0c.js"],"Image"] 8:I[9665,[],"OutletBoundary"] b:I[9665,[],"ViewportBoundary"] d:I[9665,[],"MetadataBoundary"] f:I[6614,[],""] :HL["/_next/static/css/c39f51efb307ebde.css","style"] 0:{"P":null,"b":"bhSPD8AMcIGNAKB3hNhS0","p":"","c":["","projects","project7"],"i":false,"f":[[["",{"children":["projects",{"children":[["id","project7","d"],{"children":["__PAGE__",{}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/c39f51efb307ebde.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"en","children":["$","body",null,{"className":"__className_e8ce0c","children":["$","$L2",null,{"attribute":"class","defaultTheme":"light","enableSystem":true,"disableTransitionOnChange":true,"children":[["$","$L3",null,{}],["$","main",null,{"className":"min-h-screen","children":["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]}],["$","footer",null,{"className":"bg-gray-900 text-white","children":["$","div",null,{"className":"container mx-auto px-4 py-12","children":[["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-2 lg:grid-cols-4 gap-8","children":[["$","div",null,{"children":[["$","$L6",null,{"href":"/","className":"flex items-center space-x-2","children":["$","$L7",null,{"src":"/SOHA Logo.png","alt":"SOHA Logo","width":60,"height":40,"className":"h-10 w-28"}]}],["$","p",null,{"className":"mb-4 text-gray-300","children":"Providing innovative IT, software, and AI solutions to help businesses thrive in the digital age. SOHA stands for Scalable Omni Hybrid Application."}],["$","div",null,{"className":"flex space-x-4","children":[["$","a",null,{"href":"#","className":"text-gray-300 hover:text-primary","aria-label":"Facebook","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-facebook","children":[["$","path","1jg4f8",{"d":"M18 2h-3a5 5 0 0 0-5 5v3H7v4h3v8h4v-8h3l1-4h-4V7a1 1 0 0 1 1-1h3z"}],"$undefined"]}]}],["$","a",null,{"href":"#","className":"text-gray-300 hover:text-primary","aria-label":"Twitter","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-twitter","children":[["$","path","pff0z6",{"d":"M22 4s-.7 2.1-2 3.4c1.6 10-9.4 17.3-18 11.6 2.2.1 4.4-.6 6-2C3 15.5.5 9.6 3 5c2.2 2.6 5.6 4.1 9 4-.9-4.2 4-6.6 7-3.8 1.1 0 3-1.2 3-1.2z"}],"$undefined"]}]}],["$","a",null,{"href":"#","className":"text-gray-300 hover:text-primary","aria-label":"LinkedIn","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-linkedin","children":[["$","path","c2jq9f",{"d":"M16 8a6 6 0 0 1 6 6v7h-4v-7a2 2 0 0 0-2-2 2 2 0 0 0-2 2v7h-4v-7a6 6 0 0 1 6-6z"}],["$","rect","mk3on5",{"width":"4","height":"12","x":"2","y":"9"}],["$","circle","bt5ra8",{"cx":"4","cy":"4","r":"2"}],"$undefined"]}]}],["$","a",null,{"href":"#","className":"text-gray-300 hover:text-primary","aria-label":"Instagram","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-instagram","children":[["$","rect","2e1cvw",{"width":"20","height":"20","x":"2","y":"2","rx":"5","ry":"5"}],["$","path","9exkf1",{"d":"M16 11.37A4 4 0 1 1 12.63 8 4 4 0 0 1 16 11.37z"}],["$","line","r4j83e",{"x1":"17.5","x2":"17.51","y1":"6.5","y2":"6.5"}],"$undefined"]}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold mb-4 text-primary","children":"Quick Links"}],["$","ul",null,{"className":"space-y-2","children":[["$","li",null,{"children":["$","$L6",null,{"href":"/","className":"text-gray-300 hover:text-primary","children":"Home"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/about","className":"text-gray-300 hover:text-primary","children":"About Us"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/services","className":"text-gray-300 hover:text-primary","children":"Services"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/projects","className":"text-gray-300 hover:text-primary","children":"Projects"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/blog","className":"text-gray-300 hover:text-primary","children":"Blog"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/contact","className":"text-gray-300 hover:text-primary","children":"Contact"}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold mb-4 text-primary","children":"Our Services"}],["$","ul",null,{"className":"space-y-2","children":[["$","li",null,{"children":["$","$L6",null,{"href":"/services#software-development","className":"text-gray-300 hover:text-primary","children":"Software Development"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/services#web-development","className":"text-gray-300 hover:text-primary","children":"Web Development"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/services#mobile-apps","className":"text-gray-300 hover:text-primary","children":"Mobile Applications"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/services#ai-solutions","className":"text-gray-300 hover:text-primary","children":"AI Solutions"}]}],["$","li",null,{"children":["$","$L6",null,{"href":"/services#it-consulting","className":"text-gray-300 hover:text-primary","children":"IT Consulting"}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xl font-bold mb-4 text-primary","children":"Contact Us"}],["$","ul",null,{"className":"space-y-4","children":[["$","li",null,{"className":"flex items-start space-x-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-map-pin text-primary mt-1 flex-shrink-0","children":[["$","path","1r0f0z",{"d":"M20 10c0 4.993-5.539 10.193-7.399 11.799a1 1 0 0 1-1.202 0C9.539 20.193 4 14.993 4 10a8 8 0 0 1 16 0"}],["$","circle","ilqhr7",{"cx":"12","cy":"10","r":"3"}],"$undefined"]}],["$","span",null,{"className":"text-gray-300","children":"40 Dominick Street Lower, Dublin 1, Ireland"}]]}],["$","li",null,{"className":"flex items-center space-x-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-phone text-primary flex-shrink-0","children":[["$","path","foiqr5",{"d":"M22 16.92v3a2 2 0 0 1-2.18 2 19.79 19.79 0 0 1-8.63-3.07 19.5 19.5 0 0 1-6-6 19.79 19.79 0 0 1-3.07-8.67A2 2 0 0 1 4.11 2h3a2 2 0 0 1 2 1.72 12.84 12.84 0 0 0 .7 2.81 2 2 0 0 1-.45 2.11L8.09 9.91a16 16 0 0 0 6 6l1.27-1.27a2 2 0 0 1 2.11-.45 12.84 12.84 0 0 0 2.81.7A2 2 0 0 1 22 16.92z"}],"$undefined"]}],["$","span",null,{"className":"text-gray-300","children":"+353894678033"}]]}],["$","li",null,{"className":"flex items-center space-x-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-mail text-primary flex-shrink-0","children":[["$","rect","18n3k1",{"width":"20","height":"16","x":"2","y":"4","rx":"2"}],["$","path","1ocrg3",{"d":"m22 7-8.97 5.7a1.94 1.94 0 0 1-2.06 0L2 7"}],"$undefined"]}],["$","span",null,{"className":"text-gray-300","children":"support@soha.systems"}]]}]]}]]}]]}],["$","div",null,{"className":"border-t border-gray-800 mt-12 pt-8 text-center text-gray-400","children":["$","p",null,{"children":["© ",2025," SOHA. All rights reserved."]}]}]]}]}]]}]}]}]]}],{"children":["projects",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":[["id","project7","d"],["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[[["$","section",null,{"className":"relative h-[400px] md:h-[500px] w-full overflow-hidden","children":[["$","div",null,{"className":"absolute inset-0 bg-black/60 z-10"}],["$","$L7",null,{"src":"/cyber.png?height=400&width=600","alt":"Cybersecurity Implementation","fill":true,"className":"object-cover","priority":true}],["$","div",null,{"className":"relative z-20 h-full flex flex-col justify-center items-center text-center text-white px-4","children":["$","div",null,{"className":"max-w-3xl mx-auto","children":[["$","div",null,{"className":"text-sm md:text-base font-medium text-primary-300 mb-2","children":"Cybersecurity"}],["$","h1",null,{"className":"text-4xl md:text-5xl lg:text-6xl font-bold mb-4","children":"Cybersecurity Implementation"}],["$","p",null,{"className":"text-lg md:text-xl max-w-2xl mx-auto","children":"Implemented comprehensive cybersecurity measures for a financial institution, protecting sensitive data and ensuring regulatory compliance."}]]}]}]]}],["$","section",null,{"className":"py-20 bg-gray-50","children":["$","div",null,{"className":"container mx-auto px-4","children":[["$","div",null,{"className":"mb-8","children":["$","$L6",null,{"href":"/projects","className":"inline-flex items-center justify-center gap-2 whitespace-nowrap rounded-md text-sm font-medium ring-offset-background transition-colors focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 disabled:pointer-events-none disabled:opacity-50 [&_svg]:pointer-events-none [&_svg]:size-4 [&_svg]:shrink-0 border border-input bg-background hover:bg-accent hover:text-accent-foreground h-10 px-4 py-2 mb-8 flex items-center","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-left mr-2 h-4 w-4","children":[["$","path","1l729n",{"d":"m12 19-7-7 7-7"}],["$","path","x3x0zl",{"d":"M19 12H5"}],"$undefined"]}]," Back to Projects"],"ref":null}]}],["$","div",null,{"className":"grid grid-cols-1 lg:grid-cols-3 gap-12","children":[["$","div",null,{"className":"lg:col-span-2","children":[["$","h2",null,{"className":"text-3xl text-blue-900 font-bold mb-6","children":"Project Overview"}],["$","p",null,{"className":"text-lg text-gray-600 mb-8","children":"We implemented a comprehensive cybersecurity solution for a financial institution to protect their sensitive data and ensure regulatory compliance. The project included security assessment, vulnerability remediation, implementation of advanced security measures, and establishment of ongoing security monitoring and incident response processes. The solution has significantly enhanced the client's security posture and compliance status."}],["$","div",null,{"className":"mb-10","children":[["$","h3",null,{"className":"text-2xl text-blue-900 font-bold mb-4","children":"Challenges"}],["$","ul",null,{"className":"space-y-3","children":[["$","li","0",{"className":"flex items-start space-x-2","children":[["$","span",null,{"className":"text-primary font-bold","children":"•"}],["$","span",null,{"className":"text-gray-700","children":"Identifying and addressing vulnerabilities in existing systems"}]]}],["$","li","1",{"className":"flex items-start space-x-2","children":[["$","span",null,{"className":"text-primary font-bold","children":"•"}],["$","span",null,{"className":"text-gray-700","children":"Implementing security measures without disrupting operations"}]]}],["$","li","2",{"className":"flex items-start space-x-2","children":[["$","span",null,{"className":"text-primary font-bold","children":"•"}],["$","span",null,{"className":"text-gray-700","children":"Ensuring compliance with multiple financial regulations"}]]}],["$","li","3",{"className":"flex items-start space-x-2","children":[["$","span",null,{"className":"text-primary font-bold","children":"•"}],["$","span",null,{"className":"text-gray-700","children":"Balancing security with user experience"}]]}],["$","li","4",{"className":"flex items-start space-x-2","children":[["$","span",null,{"className":"text-primary font-bold","children":"•"}],["$","span",null,{"className":"text-gray-700","children":"Establishing effective security monitoring and response processes"}]]}]]}]]}],["$","div",null,{"className":"mb-10","children":[["$","h3",null,{"className":"text-2xl text-blue-900 font-bold mb-4","children":"Our Approach"}],["$","ul",null,{"className":"space-y-3","children":[["$","li","0",{"className":"flex items-start space-x-2","children":[["$","span",null,{"className":"text-primary font-bold","children":"•"}],["$","span",null,{"className":"text-gray-700","children":"Comprehensive security assessment and penetration testing"}]]}],["$","li","1",{"className":"flex items-start space-x-2","children":[["$","span",null,{"className":"text-primary font-bold","children":"•"}],["$","span",null,{"className":"text-gray-700","children":"Phased implementation of security measures"}]]}],["$","li","2",{"className":"flex items-start space-x-2","children":[["$","span",null,{"className":"text-primary font-bold","children":"•"}],["$","span",null,{"className":"text-gray-700","children":"Development of compliance frameworks and documentation"}]]}],["$","li","3",{"className":"flex items-start space-x-2","children":[["$","span",null,{"className":"text-primary font-bold","children":"•"}],["$","span",null,{"className":"text-gray-700","children":"User-centered security design and authentication processes"}]]}],["$","li","4",{"className":"flex items-start space-x-2","children":[["$","span",null,{"className":"text-primary font-bold","children":"•"}],["$","span",null,{"className":"text-gray-700","children":"Implementation of 24/7 security monitoring and incident response"}]]}]]}]]}],["$","div",null,{"className":"mb-10","children":[["$","h3",null,{"className":"text-2xl text-blue-900 font-bold mb-4","children":"Results"}],["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-2 gap-4","children":[["$","div","0",{"className":"bg-gray-50 p-4 rounded-lg","children":["$","div",null,{"className":"flex items-start space-x-2","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big text-primary h-5 w-5 mt-0.5 flex-shrink-0","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","span",null,{"className":"text-gray-700","children":"90% reduction in security vulnerabilities"}]]}]}],["$","div","1",{"className":"bg-gray-50 p-4 rounded-lg","children":["$","div",null,{"className":"flex items-start space-x-2","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big text-primary h-5 w-5 mt-0.5 flex-shrink-0","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","span",null,{"className":"text-gray-700","children":"100% compliance with regulatory requirements"}]]}]}],["$","div","2",{"className":"bg-gray-50 p-4 rounded-lg","children":["$","div",null,{"className":"flex items-start space-x-2","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big text-primary h-5 w-5 mt-0.5 flex-shrink-0","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","span",null,{"className":"text-gray-700","children":"Successful prevention of multiple cyber attack attempts"}]]}]}],["$","div","3",{"className":"bg-gray-50 p-4 rounded-lg","children":["$","div",null,{"className":"flex items-start space-x-2","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big text-primary h-5 w-5 mt-0.5 flex-shrink-0","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","span",null,{"className":"text-gray-700","children":"Enhanced data protection and privacy"}]]}]}],["$","div","4",{"className":"bg-gray-50 p-4 rounded-lg","children":["$","div",null,{"className":"flex items-start space-x-2","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big text-primary h-5 w-5 mt-0.5 flex-shrink-0","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","span",null,{"className":"text-gray-700","children":"Improved security awareness among staff"}]]}]}]]}]]}],["$","div",null,{"className":"bg-primary-50 p-6 rounded-lg border-l-4 border-primary mb-10","children":[["$","p",null,{"className":"text-lg italic text-gray-700 mb-4","children":["\"","SOHA's cybersecurity implementation has transformed our security posture. Their thorough approach identified vulnerabilities we weren't aware of, and their solutions have provided robust protection without impacting our operations. We now have confidence in our ability to protect our clients' sensitive data.","\""]}],["$","div",null,{"children":[["$","p",null,{"className":"font-bold","children":"Amanda Johnson"}],["$","p",null,{"className":"text-gray-600","children":"CISO, SecureBank Financial"}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-2xl text-blue-900 font-bold mb-4","children":"Technologies Used"}],["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","0",{"className":"bg-gray-100 text-gray-800 px-3 py-1 rounded-full text-sm font-medium","children":"Security Auditing"}],["$","span","1",{"className":"bg-gray-100 text-gray-800 px-3 py-1 rounded-full text-sm font-medium","children":"Penetration Testing"}],["$","span","2",{"className":"bg-gray-100 text-gray-800 px-3 py-1 rounded-full text-sm font-medium","children":"Encryption"}],["$","span","3",{"className":"bg-gray-100 text-gray-800 px-3 py-1 rounded-full text-sm font-medium","children":"Compliance"}]]}]]}]]}],["$","div",null,{"children":[["$","div",null,{"className":"bg-gray-50 p-6 rounded-lg mb-6","children":[["$","h3",null,{"className":"text-xl text-blue-900 font-bold mb-4","children":"Project Details"}],["$","div",null,{"className":"space-y-4","children":[["$","div",null,{"children":[["$","p",null,{"className":"font-semibold text-gray-700","children":"Client:"}],["$","p",null,{"className":"text-gray-600","children":"SecureBank Financial"}]]}],["$","div",null,{"children":[["$","p",null,{"className":"font-semibold text-gray-700","children":"Industry:"}],["$","p",null,{"className":"text-gray-600","children":"Finance"}]]}],["$","div",null,{"children":[["$","p",null,{"className":"font-semibold text-gray-700","children":"Duration:"}],["$","p",null,{"className":"text-gray-600","children":"6 months"}]]}],["$","div",null,{"children":[["$","p",null,{"className":"font-semibold text-gray-700","children":"Team:"}],["$","p",null,{"className":"text-gray-600","children":"3 security specialists, 1 compliance expert, 2 system engineers, 1 project manager"}]]}]]}]]}],["$","div",null,{"className":"bg-primary-50 p-6 rounded-lg","children":[["$","h3",null,{"className":"text-xl font-bold mb-4","children":"Need a Similar Solution?"}],["$","p",null,{"className":"text-gray-600 mb-6","children":"We can help you develop a custom solution tailored to your specific business needs."}],["$","$L6",null,{"href":"/contact","children":"Contact Us","className":"inline-flex items-center justify-center gap-2 whitespace-nowrap rounded-md text-sm font-medium ring-offset-background transition-colors focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 disabled:pointer-events-none disabled:opacity-50 [&_svg]:pointer-events-none [&_svg]:size-4 [&_svg]:shrink-0 h-10 px-4 py-2 w-full bg-primary hover:bg-primary-600 text-white","ref":null}]]}]]}]]}]]}]}],["$","section",null,{"className":"py-20 bg-primary text-white","children":["$","div",null,{"className":"container mx-auto px-4 text-center","children":[["$","h2",null,{"className":"text-3xl md:text-4xl font-bold mb-6","children":"Ready to Start Your Project?"}],["$","p",null,{"className":"text-xl mb-8 max-w-3xl mx-auto","children":"Contact us today to discuss how we can help you achieve your business goals with our custom IT, software, and AI solutions."}],["$","$L6",null,{"href":"/contact","children":"Get in Touch","className":"inline-flex items-center justify-center gap-2 whitespace-nowrap text-sm font-medium ring-offset-background transition-colors focus-visible:outline-none focus-visible:ring-2 focus-visible:ring-ring focus-visible:ring-offset-2 disabled:pointer-events-none disabled:opacity-50 [&_svg]:pointer-events-none [&_svg]:size-4 [&_svg]:shrink-0 h-11 rounded-md px-8 bg-white text-primary hover:bg-gray-100","ref":null}]]}]}]],"$undefined",null,["$","$L8",null,{"children":["$L9","$La",null]}]]}],{},null,false]},null,false]},null,false]},null,false],["$","$1","h",{"children":[null,["$","$1","B2yfMxtjh27rSRTV0KD59",{"children":[["$","$Lb",null,{"children":"$Lc"}],null]}],["$","$Ld",null,{"children":"$Le"}]]}],false]],"m":"$undefined","G":["$f","$undefined"],"s":false,"S":true} c:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] 9:null a:null e:[["$","title","0",{"children":"SOHA Systems"}],["$","meta","1",{"name":"description","content":"Professional IT and software services for businesses of all sizes. We provide custom software development, IT consulting, cloud solutions, and more."}],["$","link","2",{"rel":"icon","href":"/SOHA Logo.png"}]]