1:"$Sreact.fragment" 2:I[1970,["592","static/chunks/c15bf2b0-2e5094ff64f4d456.js","970","static/chunks/970-16a10288295973ab.js","880","static/chunks/880-207ac6e6903d4931.js","795","static/chunks/795-77b345457a57fcf5.js","173","static/chunks/173-ee8da25fc11ecea2.js","241","static/chunks/241-5ac480ceeca34945.js","415","static/chunks/415-b162a6f0ce39be43.js","177","static/chunks/app/layout-4292495dccddc579.js"],"ThemeProvider"] 3:I[8882,["592","static/chunks/c15bf2b0-2e5094ff64f4d456.js","970","static/chunks/970-16a10288295973ab.js","880","static/chunks/880-207ac6e6903d4931.js","795","static/chunks/795-77b345457a57fcf5.js","173","static/chunks/173-ee8da25fc11ecea2.js","241","static/chunks/241-5ac480ceeca34945.js","415","static/chunks/415-b162a6f0ce39be43.js","177","static/chunks/app/layout-4292495dccddc579.js"],"SiteHeader"] 4:I[5244,[],""] 5:I[3866,[],""] 6:I[8761,["592","static/chunks/c15bf2b0-2e5094ff64f4d456.js","970","static/chunks/970-16a10288295973ab.js","880","static/chunks/880-207ac6e6903d4931.js","795","static/chunks/795-77b345457a57fcf5.js","173","static/chunks/173-ee8da25fc11ecea2.js","241","static/chunks/241-5ac480ceeca34945.js","415","static/chunks/415-b162a6f0ce39be43.js","177","static/chunks/app/layout-4292495dccddc579.js"],"default"] 8:I[6213,[],"OutletBoundary"] a:I[6213,[],"MetadataBoundary"] c:I[6213,[],"ViewportBoundary"] e:I[4835,[],""] :HL["/_next/static/css/aa00545f5338d10f.css","style"] 0:{"P":null,"b":"4yg2o0fNdQSpuaS8j5rg8","p":"","c":["","insights","case-studies","ai-cybersecurity-threat-detection"],"i":false,"f":[[["",{"children":["insights",{"children":["case-studies",{"children":[["slug","ai-cybersecurity-threat-detection","d"],{"children":["__PAGE__",{}]}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/aa00545f5338d10f.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"en","suppressHydrationWarning":true,"children":[["$","head",null,{}],["$","body",null,{"className":"min-h-screen bg-background font-sans antialiased __variable_3a0388 __variable_c1e5c9","children":["$","$L2",null,{"attribute":"class","defaultTheme":"system","enableSystem":true,"disableTransitionOnChange":true,"children":["$","div",null,{"className":"relative flex min-h-screen flex-col","children":[["$","$L3",null,{}],["$","div",null,{"className":"flex-1","children":["$","$L4",null,{"parallelRouterKey":"children","segmentPath":["children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[],[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]]],"forbidden":"$undefined","unauthorized":"$undefined"}]}],["$","$L6",null,{}]]}]}]}]]}]]}],{"children":["insights",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","segmentPath":["children","insights","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["case-studies",["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","segmentPath":["children","insights","children","case-studies","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":[["slug","ai-cybersecurity-threat-detection","d"],["$","$1","c",{"children":[null,["$","$L4",null,{"parallelRouterKey":"children","segmentPath":["children","insights","children","case-studies","children","$0:f:0:1:2:children:2:children:2:children:0","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":["$L7",null,["$","$L8",null,{"children":"$L9"}]]}],{},null,false]},null,false]},null,false]},null,false]},null,false],["$","$1","h",{"children":[null,["$","$1","eEdREMXgKafFYRfrh9j43",{"children":[["$","$La",null,{"children":"$Lb"}],["$","$Lc",null,{"children":"$Ld"}],null]}]]}],false]],"m":"$undefined","G":["$e","$undefined"],"s":false,"S":true} f:I[6035,["592","static/chunks/c15bf2b0-2e5094ff64f4d456.js","970","static/chunks/970-16a10288295973ab.js","880","static/chunks/880-207ac6e6903d4931.js","795","static/chunks/795-77b345457a57fcf5.js","241","static/chunks/241-5ac480ceeca34945.js","415","static/chunks/415-b162a6f0ce39be43.js","456","static/chunks/456-3cf01672b6546673.js","949","static/chunks/app/insights/case-studies/%5Bslug%5D/page-64e81fee94892435.js"],"default"] 7:["$","$Lf",null,{"slug":"ai-cybersecurity-threat-detection","client":"A leading multinational corporation","industry":"Enterprise Security & IT","duration":"9 months","teamSize":"14","title":"AI-Powered Threat Detection & Response for a Global Enterprise","description":"Debite helped a multinational corporation enhance its cybersecurity posture by implementing AI-driven threat detection, real-time monitoring, and automated incident response. Our solution significantly reduced cyber attack risks and improved compliance with global security standards.","heroImage":"https://images.pexels.com/photos/5380663/pexels-photo-5380663.jpeg?auto=compress&cs=tinysrgb&w=1260&h=750&dpr=1","challenge":"The client faced frequent phishing attacks, ransomware threats, and vulnerabilities in their IT infrastructure. Traditional security solutions failed to detect sophisticated cyber threats in real time.","approach":"We deployed an AI-driven Security Information and Event Management (SIEM) system, combined with machine learning algorithms for anomaly detection. This allowed real-time monitoring, predictive threat intelligence, and automated response mechanisms.","metrics":[{"label":"Threat Detection Speed","value":"90% faster","description":"AI-driven monitoring detected threats in real-time, reducing breach response time from hours to minutes."},{"label":"Phishing Attack Reduction","value":"85% decrease","description":"AI-powered email filtering and user training significantly lowered phishing attack success rates."},{"label":"Compliance Score","value":"ISO 27001 & GDPR certified","description":"Ensured the company met international cybersecurity standards and compliance requirements."}],"solutions":[{"title":"AI-Driven Threat Intelligence","description":"Developed an AI-powered SIEM platform that continuously analyzed network traffic, identifying and mitigating potential threats in real time.","image":"https://images.pexels.com/photos/1181351/pexels-photo-1181351.jpeg?auto=compress&cs=tinysrgb&w=1260&h=750&dpr=1"},{"title":"Automated Incident Response","description":"Implemented automated security workflows to contain threats instantly, reducing the impact of cyber attacks.","image":"https://images.pexels.com/photos/6239033/pexels-photo-6239033.jpeg?auto=compress&cs=tinysrgb&w=1260&h=750&dpr=1"},{"title":"Employee Security Awareness Training","description":"Conducted AI-driven security awareness training to educate employees on identifying and avoiding phishing and social engineering attacks.","image":"https://images.pexels.com/photos/3183197/pexels-photo-3183197.jpeg?auto=compress&cs=tinysrgb&w=1260&h=750&dpr=1"}],"technologies":[{"name":"AI & Machine Learning","description":"Real-time anomaly detection and predictive analytics for proactive cybersecurity.","logo":"/images/technologies/ai-ml-logo.png"},{"name":"SIEM & Threat Intelligence","description":"Security event management and predictive analytics for cyber threat detection.","logo":"/images/technologies/siem-logo.png"},{"name":"Zero Trust Architecture","description":"Implemented a zero-trust framework to enhance network security and access control.","logo":"/images/technologies/zero-trust-logo.png"}],"testimonial":{"quote":"With Debite’s AI-driven security solutions, we have dramatically improved our threat detection capabilities. We now detect and neutralize cyber threats before they cause damage.","author":"Mark Reynolds","role":"CISO, Leading Multinational Corporation","image":"/images/testimonials/mark-reynolds.jpg"}}] d:[["$","meta","0",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] b:[["$","meta","0",{"charSet":"utf-8"}],["$","title","1",{"children":"Debite | You Digital Transformation Partner"}],["$","meta","2",{"name":"description","content":"Debite is your digital transformation partner with years of expertise"}],["$","link","3",{"rel":"icon","href":"/favicon.ico","type":"image/x-icon","sizes":"16x16"}]] 9:null