{"id":"9cca0d62-1480-44a5-bdc9-cc0fdc30c9f9","timestamp":1747981620121,"matcher":{"static":{},"wildcard":{},"dynamic":{}},"prerendered":["/all-services/protection-security/risk-assessment","/all-services/application-security/secure-sdlc","/all-services/application-security/web-application-development","/all-services/offensive-security/vulnerability-research","/all-services/offensive-security/vulnerability-assessment","/all-services/offensive-security/penetration-testing","/all-services/offensive-security/red-team-assessment","/all-services/offensive-security/azure-red-team-assessment","/all-services/protection-security/system-hardening","/all-services/protection-security/secure-ai","/all-services/protection-security/mitigation-lifecycle","/all-services/protection-security/security-awareness","/all-services/response-security/incident-response","/all-services/response-security/threat-hunting","/all-services/response-security/digital-forensics","/all-services/response-security/threat-intelligence","/all-services/response-security/malware-analysis","/all-services/cloud-protection/cloud-best-practices","/all-services/cloud-protection/devsecops","/all-services/cloud-protection/finops-optimization","/all-services/regulatory-standards/compliance-readiness","/all-services/regulatory-standards/proactive-grc","/all-services/outsourcing-services/executive-management","/all-services/regulatory-standards/data-privacy-dpo","/all-services/outsourcing-services/offensive-security","/all-services/outsourcing-services/blue-team","/all-services/outsourcing-services/application-security","/all-services/outsourcing-services/information-security-consultants","/all-services/outsourcing-services/security-architects","/all-services/offensive-security/red-team-assessment/modal/physical-red-team","/all-services/offensive-security/red-team-assessment/modal/external-red-team","/all-services/offensive-security/red-team-assessment/modal/internal-red-team","/all-services/offensive-security/red-team-assessment/modal/phishing-campaign","/all-services/offensive-security/red-team-assessment/modal/social-engineering","/all-services/offensive-security/penetration-testing/modal/infrastructure-testing","/all-services/offensive-security/penetration-testing/modal/cloud-penetration-testing","/all-services/offensive-security/penetration-testing/modal/mobile-security-testing","/all-services/offensive-security/penetration-testing/modal/web-application-testing","/all-services/offensive-security/penetration-testing/modal/wireless-penetration-testing","/all-services/protection-security/secure-sdlc","/all-services/offensive-security/web-application-development","/privacy-policy","/contact-us","/all-services/offensive-security/risk-assessment","/solutions/grc-management","/solutions/risk-management","/solutions/workload-management","/about","/careers","/solutions/organization-structure","/solutions/threat-intelligence-platform","/solutions/cspm-platform","/solutions/threat-hunting-platform","/solutions/dfir-platform","/solutions/ndr-platform","/solutions","/all-services","/fr/about","/fr/careers","/fr/contact-us","/fr/partner","/partner","/","/fr","/fr/privacy-policy","/fr/contact-sales","/contact-sales","/fr/solutions","/fr/all-services","/open-positions/details","/fr/open-positions/details","/open-positions","/fr/open-positions"]}