2:I[6606,["590","static/chunks/590-aece1635e7baaa0f.js","241","static/chunks/241-94eb3b511ede0257.js","648","static/chunks/648-ca5c008ca4413444.js","154","static/chunks/154-0f5a2e59eb45e23e.js","743","static/chunks/app/nos-services/cybersecurite/page-5735551f9008402b.js"],"default"] 3:I[2972,["590","static/chunks/590-aece1635e7baaa0f.js","241","static/chunks/241-94eb3b511ede0257.js","648","static/chunks/648-ca5c008ca4413444.js","154","static/chunks/154-0f5a2e59eb45e23e.js","743","static/chunks/app/nos-services/cybersecurite/page-5735551f9008402b.js"],""] 4:I[4226,["590","static/chunks/590-aece1635e7baaa0f.js","241","static/chunks/241-94eb3b511ede0257.js","648","static/chunks/648-ca5c008ca4413444.js","154","static/chunks/154-0f5a2e59eb45e23e.js","743","static/chunks/app/nos-services/cybersecurite/page-5735551f9008402b.js"],"default"] 5:I[3696,["590","static/chunks/590-aece1635e7baaa0f.js","241","static/chunks/241-94eb3b511ede0257.js","648","static/chunks/648-ca5c008ca4413444.js","154","static/chunks/154-0f5a2e59eb45e23e.js","743","static/chunks/app/nos-services/cybersecurite/page-5735551f9008402b.js"],"default"] 6:I[4707,[],""] 7:I[6423,[],""] 8:I[6951,["590","static/chunks/590-aece1635e7baaa0f.js","648","static/chunks/648-ca5c008ca4413444.js","510","static/chunks/510-21d3aff96037e641.js","185","static/chunks/app/layout-1b47cafcc3f226e9.js"],"default"] 9:I[7963,["590","static/chunks/590-aece1635e7baaa0f.js","648","static/chunks/648-ca5c008ca4413444.js","510","static/chunks/510-21d3aff96037e641.js","185","static/chunks/app/layout-1b47cafcc3f226e9.js"],"default"] 0:["FCWS66y3_Uj_obKU_EvlI",[[["",{"children":["nos-services",{"children":["cybersecurite",{"children":["__PAGE__",{}]}]}]},"$undefined","$undefined",true],["",{"children":["nos-services",{"children":["cybersecurite",{"children":["__PAGE__",{},[["$L1",[["$","script",null,{"type":"application/ld+json","dangerouslySetInnerHTML":{"__html":"{\"@context\":\"https://schema.org\",\"@type\":\"Service\",\"serviceType\":\"Cybersécurité\",\"name\":\"Cybersécurité\",\"description\":\"Protection cybersécurité complète pour entreprises à Lyon. Audit, antivirus, firewall, formation.\",\"url\":\"https://arezo-si.fr/nos-services/cybersecurite\",\"provider\":{\"@type\":\"LocalBusiness\",\"name\":\"AREZO Services Informatiques\",\"@id\":\"https://arezo-si.fr/#organization\"},\"areaServed\":{\"@type\":\"AdministrativeArea\",\"name\":\"Rhône-Alpes\"}}"}}],["$","div",null,{"className":"min-h-screen bg-bg-primary pt-24","children":[["$","div",null,{"className":"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8","children":["$","$L2",null,{"items":[{"label":"Services","href":"/nos-services"},{"label":"Cybersécurité","href":"/nos-services/cybersecurite"}]}]}],["$","section",null,{"className":"py-12 bg-bg-secondary","children":["$","div",null,{"className":"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8","children":["$","div",null,{"className":"flex flex-col lg:flex-row items-center gap-12","children":[["$","div",null,{"className":"lg:w-1/2","children":[["$","span",null,{"className":"text-accent-cyan font-semibold text-sm uppercase tracking-wider","children":"Cybersécurité"}],["$","h1",null,{"className":"text-4xl sm:text-5xl font-bold text-text-primary mt-2 mb-6","children":["Cybersécurité pour Entreprises à ",["$","span",null,{"className":"text-gradient","children":"Lyon"}]]}],["$","p",null,{"className":"text-text-secondary text-lg mb-6","children":"Protégez votre entreprise contre les cybermenaces. AREZO propose des solutions de cybersécurité complètes: audit, protection, formation et accompagnement pour les PME de Lyon et Rhône-Alpes."}],["$","div",null,{"className":"flex flex-col sm:flex-row gap-4","children":[["$","$L3",null,{"href":"/contactez-nous","children":["$","$L4",null,{"variant":"primary","size":"lg","glow":true,"children":"Demander un audit gratuit"}]}],["$","a",null,{"href":"tel:0695402762","children":["$","$L4",null,{"variant":"outline","size":"lg","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-phone mr-2","children":[["$","path","foiqr5",{"d":"M22 16.92v3a2 2 0 0 1-2.18 2 19.79 19.79 0 0 1-8.63-3.07 19.5 19.5 0 0 1-6-6 19.79 19.79 0 0 1-3.07-8.67A2 2 0 0 1 4.11 2h3a2 2 0 0 1 2 1.72 12.84 12.84 0 0 0 .7 2.81 2 2 0 0 1-.45 2.11L8.09 9.91a16 16 0 0 0 6 6l1.27-1.27a2 2 0 0 1 2.11-.45 12.84 12.84 0 0 0 2.81.7A2 2 0 0 1 22 16.92z"}],"$undefined"]}],"06 95 40 27 62"]}]}]]}]]}],["$","div",null,{"className":"lg:w-1/2","children":["$","div",null,{"className":"w-32 h-32 bg-gradient-to-br from-accent-cyan/20 to-accent-blue/20 rounded-2xl flex items-center justify-center mx-auto","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":64,"height":64,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield text-accent-cyan","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}]}]]}]}]}],["$","section",null,{"className":"py-20","children":["$","div",null,{"className":"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8","children":[["$","h2",null,{"className":"text-3xl font-bold text-text-primary text-center mb-4","children":"Les menaces qui pèsent sur votre entreprise"}],["$","p",null,{"className":"text-text-secondary text-center max-w-2xl mx-auto mb-12","children":"En 2024, une PME sur deux est victime d'une cyberattaque. Ne prenez pas de risques."}],["$","div",null,{"className":"grid grid-cols-1 sm:grid-cols-2 lg:grid-cols-4 gap-6","children":[["$","div","Ransomware",{"className":"bg-bg-card rounded-xl p-6 border border-gray-800","children":[["$","div",null,{"className":"w-10 h-10 bg-red-500/10 rounded-lg flex items-center justify-center mb-4","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-triangle-alert text-red-500","children":[["$","path","wmoenq",{"d":"m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3"}],["$","path","juzpu7",{"d":"M12 9v4"}],["$","path","p32p05",{"d":"M12 17h.01"}],"$undefined"]}]}],["$","h3",null,{"className":"text-lg font-bold text-text-primary mb-2","children":"Ransomware"}],["$","p",null,{"className":"text-text-secondary text-sm","children":"Chiffrement de vos données avec demande de rançon"}]]}],["$","div","Phishing",{"className":"bg-bg-card rounded-xl p-6 border border-gray-800","children":[["$","div",null,{"className":"w-10 h-10 bg-red-500/10 rounded-lg flex items-center justify-center mb-4","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-triangle-alert text-red-500","children":[["$","path","wmoenq",{"d":"m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3"}],["$","path","juzpu7",{"d":"M12 9v4"}],["$","path","p32p05",{"d":"M12 17h.01"}],"$undefined"]}]}],["$","h3",null,{"className":"text-lg font-bold text-text-primary mb-2","children":"Phishing"}],["$","p",null,{"className":"text-text-secondary text-sm","children":"Emails frauduleux pour voler vos identifiants"}]]}],["$","div","Malware",{"className":"bg-bg-card rounded-xl p-6 border border-gray-800","children":[["$","div",null,{"className":"w-10 h-10 bg-red-500/10 rounded-lg flex items-center justify-center mb-4","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-triangle-alert text-red-500","children":[["$","path","wmoenq",{"d":"m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3"}],["$","path","juzpu7",{"d":"M12 9v4"}],["$","path","p32p05",{"d":"M12 17h.01"}],"$undefined"]}]}],["$","h3",null,{"className":"text-lg font-bold text-text-primary mb-2","children":"Malware"}],["$","p",null,{"className":"text-text-secondary text-sm","children":"Logiciels malveillants infiltrant votre système"}]]}],["$","div","Attaques DDoS",{"className":"bg-bg-card rounded-xl p-6 border border-gray-800","children":[["$","div",null,{"className":"w-10 h-10 bg-red-500/10 rounded-lg flex items-center justify-center mb-4","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-triangle-alert text-red-500","children":[["$","path","wmoenq",{"d":"m21.73 18-8-14a2 2 0 0 0-3.48 0l-8 14A2 2 0 0 0 4 21h16a2 2 0 0 0 1.73-3"}],["$","path","juzpu7",{"d":"M12 9v4"}],["$","path","p32p05",{"d":"M12 17h.01"}],"$undefined"]}]}],["$","h3",null,{"className":"text-lg font-bold text-text-primary mb-2","children":"Attaques DDoS"}],["$","p",null,{"className":"text-text-secondary text-sm","children":"Saturation de vos services en ligne"}]]}]]}]]}]}],["$","section",null,{"className":"py-20 bg-bg-secondary","children":["$","div",null,{"className":"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8","children":[["$","h2",null,{"className":"text-3xl font-bold text-text-primary text-center mb-12","children":"Notre approche de la cybersécurité"}],["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-2 gap-8","children":[["$","div","Audit de sécurité complet",{"className":"bg-bg-card rounded-xl p-6 border border-gray-800 hover:border-accent-cyan/50 transition-colors","children":[["$","div",null,{"className":"w-12 h-12 bg-accent-cyan/10 rounded-lg flex items-center justify-center mb-4","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-eye text-accent-cyan","children":[["$","path","1nclc0",{"d":"M2.062 12.348a1 1 0 0 1 0-.696 10.75 10.75 0 0 1 19.876 0 1 1 0 0 1 0 .696 10.75 10.75 0 0 1-19.876 0"}],["$","circle","1v7zrd",{"cx":"12","cy":"12","r":"3"}],"$undefined"]}]}],["$","h3",null,{"className":"text-xl font-bold text-text-primary mb-2","children":"Audit de sécurité complet"}],["$","p",null,{"className":"text-text-secondary","children":"Analyse approfondie de vos vulnérabilités et recommandations personnalisées."}]]}],["$","div","Protection antivirus & anti-malware",{"className":"bg-bg-card rounded-xl p-6 border border-gray-800 hover:border-accent-cyan/50 transition-colors","children":[["$","div",null,{"className":"w-12 h-12 bg-accent-cyan/10 rounded-lg flex items-center justify-center mb-4","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-lock text-accent-cyan","children":[["$","rect","1w4ew1",{"width":"18","height":"11","x":"3","y":"11","rx":"2","ry":"2"}],["$","path","fwvmzm",{"d":"M7 11V7a5 5 0 0 1 10 0v4"}],"$undefined"]}]}],["$","h3",null,{"className":"text-xl font-bold text-text-primary mb-2","children":"Protection antivirus & anti-malware"}],["$","p",null,{"className":"text-text-secondary","children":"Solutions professionnelles F-Secure pour une protection optimale."}]]}],["$","div","Firewall & protection réseau",{"className":"bg-bg-card rounded-xl p-6 border border-gray-800 hover:border-accent-cyan/50 transition-colors","children":[["$","div",null,{"className":"w-12 h-12 bg-accent-cyan/10 rounded-lg flex items-center justify-center mb-4","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield text-accent-cyan","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","h3",null,{"className":"text-xl font-bold text-text-primary mb-2","children":"Firewall & protection réseau"}],["$","p",null,{"className":"text-text-secondary","children":"Pare-feux Stormshield et segmentation réseau pour bloquer les intrusions."}]]}],["$","div","Formation des utilisateurs",{"className":"bg-bg-card rounded-xl p-6 border border-gray-800 hover:border-accent-cyan/50 transition-colors","children":[["$","div",null,{"className":"w-12 h-12 bg-accent-cyan/10 rounded-lg flex items-center justify-center mb-4","children":["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-graduation-cap text-accent-cyan","children":[["$","path","j76jl0",{"d":"M21.42 10.922a1 1 0 0 0-.019-1.838L12.83 5.18a2 2 0 0 0-1.66 0L2.6 9.08a1 1 0 0 0 0 1.832l8.57 3.908a2 2 0 0 0 1.66 0z"}],["$","path","1lu8f3",{"d":"M22 10v6"}],["$","path","1r8lef",{"d":"M6 12.5V16a6 3 0 0 0 12 0v-3.5"}],"$undefined"]}]}],["$","h3",null,{"className":"text-xl font-bold text-text-primary mb-2","children":"Formation des utilisateurs"}],["$","p",null,{"className":"text-text-secondary","children":"Sensibilisation de vos équipes aux risques de phishing et bonnes pratiques."}]]}]]}]]}]}],["$","section",null,{"className":"py-20","children":["$","div",null,{"className":"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8","children":["$","div",null,{"className":"grid grid-cols-1 lg:grid-cols-2 gap-12 items-center","children":[["$","div",null,{"children":[["$","h2",null,{"className":"text-3xl font-bold text-text-primary mb-6","children":"Pourquoi nous confier votre sécurité?"}],["$","p",null,{"className":"text-text-secondary mb-8","children":"Partenaires F-Secure et Stormshield, nous combinons les meilleures technologies avec notre expertise terrain pour une protection sur mesure."}],["$","ul",null,{"className":"space-y-4","children":[["$","li","0",{"className":"flex items-start","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big text-accent-cyan mr-3 flex-shrink-0 mt-0.5","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","span",null,{"className":"text-text-primary","children":"Protection 24/7 de votre infrastructure"}]]}],["$","li","1",{"className":"flex items-start","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big text-accent-cyan mr-3 flex-shrink-0 mt-0.5","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","span",null,{"className":"text-text-primary","children":"Détection proactive des menaces"}]]}],["$","li","2",{"className":"flex items-start","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big text-accent-cyan mr-3 flex-shrink-0 mt-0.5","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","span",null,{"className":"text-text-primary","children":"Sauvegarde sécurisée des données"}]]}],["$","li","3",{"className":"flex items-start","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big text-accent-cyan mr-3 flex-shrink-0 mt-0.5","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","span",null,{"className":"text-text-primary","children":"Conformité RGPD assurée"}]]}],["$","li","4",{"className":"flex items-start","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big text-accent-cyan mr-3 flex-shrink-0 mt-0.5","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","span",null,{"className":"text-text-primary","children":"Plan de reprise d'activité"}]]}],["$","li","5",{"className":"flex items-start","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":20,"height":20,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check-big text-accent-cyan mr-3 flex-shrink-0 mt-0.5","children":[["$","path","yps3ct",{"d":"M21.801 10A10 10 0 1 1 17 3.335"}],["$","path","1pflzl",{"d":"m9 11 3 3L22 4"}],"$undefined"]}],["$","span",null,{"className":"text-text-primary","children":"Support expert en cas d'incident"}]]}]]}]]}],["$","div",null,{"className":"bg-bg-card rounded-2xl p-8 border border-gray-800","children":[["$","h3",null,{"className":"text-2xl font-bold text-text-primary mb-4","children":"Partenaires certifiés"}],["$","p",null,{"className":"text-text-secondary mb-6","children":"Nous travaillons avec les leaders de la cybersécurité pour vous offrir une protection optimale."}],["$","div",null,{"className":"grid grid-cols-2 gap-4","children":[["$","div",null,{"className":"text-center p-4 bg-bg-secondary rounded-lg","children":[["$","div",null,{"className":"text-xl font-bold text-accent-cyan","children":"F-Secure"}],["$","div",null,{"className":"text-text-secondary text-sm","children":"Antivirus"}]]}],["$","div",null,{"className":"text-center p-4 bg-bg-secondary rounded-lg","children":[["$","div",null,{"className":"text-xl font-bold text-accent-cyan","children":"Stormshield"}],["$","div",null,{"className":"text-text-secondary text-sm","children":"Firewall"}]]}]]}]]}]]}]}]}],["$","section",null,{"className":"py-20 bg-bg-secondary","children":["$","div",null,{"className":"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8","children":["$","$L5",null,{"items":[{"question":"Qu'est-ce qu'un audit de cybersécurité?","answer":"Un audit de cybersécurité est une analyse complète de votre infrastructure pour identifier les vulnérabilités et failles de sécurité. Il comprend l'examen des configurations, des accès, des politiques de sécurité et des pratiques utilisateurs. Le rapport final propose des recommandations prioritaires."},{"question":"Comment protéger mon entreprise contre le ransomware?","answer":"La protection contre les ransomwares repose sur plusieurs piliers: antivirus professionnel à jour, sauvegardes régulières testées et isolées, formation des employés au phishing, mises à jour système, et segmentation réseau. Nous proposons une solution complète couvrant tous ces aspects."},{"question":"Pourquoi former les employés à la cybersécurité?","answer":"90% des cyberattaques réussies exploitent l'erreur humaine. La formation sensibilise vos équipes aux risques (phishing, mots de passe faibles, clés USB) et leur apprend les bons réflexes. C'est un investissement essentiel pour votre sécurité."},{"question":"Quelles solutions antivirus recommandez-vous?","answer":"En tant que partenaire F-Secure, nous recommandons leurs solutions professionnelles pour leur excellent taux de détection et leur faible impact sur les performances. Nous proposons aussi Stormshield pour la protection réseau."}],"title":"Questions fréquentes sur la cybersécurité"}]}]}],["$","section",null,{"className":"py-20","children":["$","div",null,{"className":"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8","children":[["$","h2",null,{"className":"text-3xl font-bold text-text-primary text-center mb-12","children":"Services complémentaires"}],["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-3 gap-6","children":[["$","$L3","/nos-services/infrastructure-reseau",{"href":"/nos-services/infrastructure-reseau","className":"bg-bg-card rounded-xl p-6 border border-gray-800 hover:border-accent-cyan/50 transition-colors group","children":[["$","h3",null,{"className":"text-xl font-bold text-text-primary mb-2 group-hover:text-accent-cyan transition-colors","children":"Infrastructure Réseau"}],["$","p",null,{"className":"text-text-secondary mb-4","children":"Réseau sécurisé"}],["$","span",null,{"className":"text-accent-cyan font-medium flex items-center","children":["Découvrir",["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":16,"height":16,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right ml-2 group-hover:translate-x-1 transition-transform","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]]}],["$","$L3","/nos-services/solutions-cloud",{"href":"/nos-services/solutions-cloud","className":"bg-bg-card rounded-xl p-6 border border-gray-800 hover:border-accent-cyan/50 transition-colors group","children":[["$","h3",null,{"className":"text-xl font-bold text-text-primary mb-2 group-hover:text-accent-cyan transition-colors","children":"Solutions Cloud"}],["$","p",null,{"className":"text-text-secondary mb-4","children":"Cloud sécurisé"}],["$","span",null,{"className":"text-accent-cyan font-medium flex items-center","children":["Découvrir",["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":16,"height":16,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right ml-2 group-hover:translate-x-1 transition-transform","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]]}],["$","$L3","/nos-services/support-assistance",{"href":"/nos-services/support-assistance","className":"bg-bg-card rounded-xl p-6 border border-gray-800 hover:border-accent-cyan/50 transition-colors group","children":[["$","h3",null,{"className":"text-xl font-bold text-text-primary mb-2 group-hover:text-accent-cyan transition-colors","children":"Support & Assistance"}],["$","p",null,{"className":"text-text-secondary mb-4","children":"Intervention rapide"}],["$","span",null,{"className":"text-accent-cyan font-medium flex items-center","children":["Découvrir",["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":16,"height":16,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right ml-2 group-hover:translate-x-1 transition-transform","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]]}]]}]]}]}],["$","section",null,{"className":"py-20 bg-bg-secondary","children":["$","div",null,{"className":"max-w-4xl mx-auto px-4 sm:px-6 lg:px-8 text-center","children":["$","div",null,{"className":"bg-gradient-to-br from-accent-cyan/10 to-accent-blue/10 rounded-2xl p-8 md:p-12 border border-accent-cyan/20","children":[["$","h2",null,{"className":"text-3xl font-bold text-text-primary mb-4","children":"Protégez votre entreprise dès maintenant"}],["$","p",null,{"className":"text-text-secondary text-lg mb-8","children":"Demandez un audit de sécurité gratuit et découvrez vos vulnérabilités."}],["$","$L3",null,{"href":"/contactez-nous","children":["$","$L4",null,{"variant":"primary","size":"lg","glow":true,"children":"Demander un audit gratuit"}]}]]}]}]}]]}]],null],null],null]},[null,["$","$L6",null,{"parallelRouterKey":"children","segmentPath":["children","nos-services","children","cybersecurite","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L7",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","notFoundStyles":"$undefined"}]],null]},[[null,["$","$L6",null,{"parallelRouterKey":"children","segmentPath":["children","nos-services","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L7",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","notFoundStyles":"$undefined"}]],null],null]},[[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/272b94c966648c10.css","precedence":"next","crossOrigin":"$undefined"}]],["$","html",null,{"lang":"fr","className":"scroll-smooth","children":["$","body",null,{"className":"__className_f367f3","children":[["$","$L8",null,{}],["$","main",null,{"children":["$","$L6",null,{"parallelRouterKey":"children","segmentPath":["children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L7",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":"404"}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],"notFoundStyles":[]}]}],["$","$L9",null,{}]]}]}]],null],null],["$La",null]]]] a:[["$","meta","0",{"name":"viewport","content":"width=device-width, initial-scale=1"}],["$","meta","1",{"charSet":"utf-8"}],["$","title","2",{"children":"Cybersécurité Entreprise Lyon | Protection & Audit | AREZO-SI"}],["$","meta","3",{"name":"description","content":"Protection cybersécurité pour PME à Lyon. Audit sécurité, antivirus professionnel, firewall, formation utilisateurs. Protégez vos données contre les cyberattaques."}],["$","meta","4",{"name":"author","content":"AREZO Services Informatiques"}],["$","meta","5",{"name":"keywords","content":"services informatiques Lyon,maintenance informatique Lyon,cybersécurité entreprise Lyon,cloud PME Rhône-Alpes,support informatique Lyon,prestataire informatique Lyon,infogérance Lyon,réseau entreprise Lyon,serveur PME Lyon,dépannage informatique Lyon,AREZO-SI,consultant IT Lyon"}],["$","meta","6",{"name":"creator","content":"AREZO Services Informatiques"}],["$","meta","7",{"name":"publisher","content":"AREZO Services Informatiques"}],["$","meta","8",{"name":"robots","content":"index, follow"}],["$","meta","9",{"name":"googlebot","content":"index, follow, max-video-preview:-1, max-image-preview:large, max-snippet:-1"}],["$","link","10",{"rel":"canonical","href":"https://arezo-si.fr/nos-services/cybersecurite"}],["$","meta","11",{"name":"format-detection","content":"telephone=no, address=no, email=no"}],["$","meta","12",{"name":"google-site-verification","content":"t12UfUzYapw_lsMOXoB_o-9MXldiBYlJICs0j204U7U"}],["$","meta","13",{"property":"og:title","content":"Cybersécurité Entreprise Lyon | AREZO-SI"}],["$","meta","14",{"property":"og:description","content":"Protection complète contre les cybermenaces pour PME à Lyon. Audit, antivirus, firewall."}],["$","meta","15",{"property":"og:url","content":"https://arezo-si.fr/nos-services/cybersecurite"}],["$","meta","16",{"property":"og:type","content":"website"}],["$","meta","17",{"name":"twitter:card","content":"summary_large_image"}],["$","meta","18",{"name":"twitter:title","content":"AREZO-SI | Services Informatiques Lyon"}],["$","meta","19",{"name":"twitter:description","content":"Expert informatique à Lyon depuis 20 ans. Maintenance, cybersécurité, cloud pour PME."}],["$","meta","20",{"name":"twitter:image","content":"https://arezo-si.fr/images/og-image.jpg"}],["$","meta","21",{"name":"next-size-adjust"}]] 1:null