3:I[1699,[],""] 5:I[2579,[],""] 7:I[5566,["931","static/chunks/app/page-62466f54f0567527.js"],"LocaleRedirect"] 4:["locale","en","d"] 0:["7HbhqDT3-E7PxMkgPV-6v",[[["",{"children":[["locale","en","d"],{"children":["roadmap",{"children":["__PAGE__?{\"locale\":\"en\"}",{}]}]}]},"$undefined","$undefined",true],["",{"children":[["locale","en","d"],{"children":["roadmap",{"children":["__PAGE__",{},[["$L1","$L2"],null],null]},["$","$L3",null,{"parallelRouterKey":"children","segmentPath":["children","$4","children","roadmap","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","notFoundStyles":"$undefined","styles":null}],null]},["$L6",null],null]},[["$","$L3",null,{"parallelRouterKey":"children","segmentPath":["children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":["$","$L7",null,{}],"notFoundStyles":[],"styles":[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/01507d47fbdb017b.css","precedence":"next","crossOrigin":"$undefined"}],["$","link","1",{"rel":"stylesheet","href":"/_next/static/css/cabba1c004b0dd6d.css","precedence":"next","crossOrigin":"$undefined"}]]}],null],null],[null,[null,"$L8"]]]]] 9:I[5638,["413","static/chunks/413-c5012b4a9dd73ea1.js","980","static/chunks/980-ec60b031432d3fb6.js","891","static/chunks/891-95e41e83df2464ab.js","754","static/chunks/754-5009431bfe58d324.js","25","static/chunks/25-64101fb57c4698c6.js","203","static/chunks/app/%5Blocale%5D/layout-89a26d1114995053.js"],"GoogleAnalytics"] a:I[5703,["413","static/chunks/413-c5012b4a9dd73ea1.js","980","static/chunks/980-ec60b031432d3fb6.js","891","static/chunks/891-95e41e83df2464ab.js","754","static/chunks/754-5009431bfe58d324.js","25","static/chunks/25-64101fb57c4698c6.js","203","static/chunks/app/%5Blocale%5D/layout-89a26d1114995053.js"],"NextIntlProvider"] d:I[8090,["413","static/chunks/413-c5012b4a9dd73ea1.js","980","static/chunks/980-ec60b031432d3fb6.js","891","static/chunks/891-95e41e83df2464ab.js","754","static/chunks/754-5009431bfe58d324.js","25","static/chunks/25-64101fb57c4698c6.js","203","static/chunks/app/%5Blocale%5D/layout-89a26d1114995053.js"],"NavigationBar"] 14:I[2536,["413","static/chunks/413-c5012b4a9dd73ea1.js","980","static/chunks/980-ec60b031432d3fb6.js","891","static/chunks/891-95e41e83df2464ab.js","754","static/chunks/754-5009431bfe58d324.js","25","static/chunks/25-64101fb57c4698c6.js","203","static/chunks/app/%5Blocale%5D/layout-89a26d1114995053.js"],"CookieBanner"] 15:"$Sreact.fragment" b:T4ce0,## Redamp.io Service **Last updated August 22, 2023** This privacy notice for REDAMP SECURITY s.r.o. (\"**we**\", \"**us**\", or \"**our**\"), describes how and why we might collect, store, use, and/or share (\"**process**\") your information when you use our services (\"**Services**\"), such as when you: - Visit our website at [https://app.redamp.io](https://app.redamp.io) , or any website of ours that links to this privacy notice - Download and use our mobile application (Redamp.io), or any other application of ours that links to this privacy notice - Engage with us in other related ways, including any sales, marketing, or events **Questions or concerns?** Reading this privacy notice will help you understand your privacy rights and choices. If you do not agree with our policies and practices, please do not use our Services. If you still have any questions or concerns, please contact us at privacy@redamp.io. ### Summary of key points **This summary provides key points from our privacy notice, but you can find out more details about any of these topics by clicking the link following each key point or by using our table of contents below**  to find the section you are looking for. **What personal information do we process?** When you visit, use, or navigate our Services, we may process personal information depending on how you interact with us and the Services, the choices you make, and the products and features you use. **Do we process any sensitive personal information?** We do not process sensitive personal information. **Do we receive any information from third parties?** We do not receive any information from third parties. **How do we process your information?** We process your information to provide, improve, and administer our Services, communicate with you, for security and fraud prevention, and to comply with law. We may also process your information for other purposes with your consent. We process your information only when we have a valid legal reason to do so. **In what situations and with which parties do we share personal information?** We may share information in specific situations and with specific third parties. **How do we keep your information safe?** We have organizational and technical processes and procedures in place to protect your personal information. However, no electronic transmission over the internet or information storage technology can be guaranteed to be 100% secure, so we cannot promise or guarantee that hackers, cybercriminals, or other unauthorized third parties will not be able to defeat our security and improperly collect, access, steal, or modify your information. **What are your rights?** Depending on where you are located geographically, the applicable privacy law may mean you have certain rights regarding your personal information. **How do you exercise your rights?** The easiest way to exercise your rights is by visiting [https://redamp.io/contact](https://www.redamp.io/contact) , or by contacting us. We will consider and act upon any request in accordance with applicable data protection laws. ### Table of contents 1. WHAT INFORMATION DO WE COLLECT? 2. HOW DO WE PROCESS YOUR INFORMATION? 3. WHAT LEGAL BASES DO WE RELY ON TO PROCESS YOUR PERSONAL INFORMATION? 4. WHEN AND WITH WHOM DO WE SHARE YOUR PERSONAL INFORMATION? 5. HOW LONG DO WE KEEP YOUR INFORMATION? 6. HOW DO WE KEEP YOUR INFORMATION SAFE? 7. DO WE COLLECT INFORMATION FROM MINORS? 8. WHAT ARE YOUR PRIVACY RIGHTS? 9. CONTROLS FOR DO-NOT-TRACK FEATURES 10. DO CALIFORNIA RESIDENTS HAVE SPECIFIC PRIVACY RIGHTS? 11. DO WE MAKE UPDATES TO THIS NOTICE? 12. HOW CAN YOU CONTACT US ABOUT THIS NOTICE? 13. HOW CAN YOU REVIEW, UPDATE, OR DELETE THE DATA WE COLLECT FROM YOU? #### 1. WHAT INFORMATION DO WE COLLECT? **Personal information you disclose to us** ***In Short:*** We collect personal information that you provide to us. We collect personal information that you voluntarily provide to us when you register on the Services, express an interest in obtaining information about us or our products and Services, when you participate in activities on the Services, or otherwise when you contact us. **Personal Information Provided by You.** The personal information that we collect depends on the context of your interactions with us and the Services, the choices you make, and the products and features you use. The personal information we collect may include the following: - Names - Email addresses - Usernames - Passwords - Contact or authentication data - Billing addresses **Sensitive Information.** We do not process sensitive information. **Application Data.** If you use our application(s), we also may collect the following information if you choose to provide us with access or permission: - Application Data: - App names and package IDs - App version numbers - Installation dates - Device and Network Data: - Location - Network details, including SSID, BSSID, cellular provider, DNS, and default gateway IP address - Device indentifier - Device Settings and Permissions Data: - Whether the app has access to your camera (this is optional) - Whether biometrics are enabled on your device - Operating System and Device Specifications Data: - Operating System Name (e.g., Android, iOS) - Version of the Operating System - Any installed patches or updates - Build details - Firmware version - Other additional data related to the operating system - Device Details Data: - Type of device (e.g., smartphone, tablet) - Manufacturer of the device (e.g., Samsung, Apple) - Specific model of the device - Notification token, which may be used for app-specific notifications - Device Settings Data: - Whether the device is rooted - Status of the Bluetooth connection - Status of the NFC connection - Whether USB debugging is enabled - If location services are active - The level of biometric security in use (e.g., fingerprint, facial recognition) - Any security systems enabled on the device This information is primarily needed to maintain the security and operation of our application(s), for troubleshooting, and for our internal analytics and reporting purposes. All personal information that you provide to us must be true, complete, and accurate, and you must notify us of any changes to such personal information. #### 2. HOW DO WE PROCESS YOUR INFORMATION? ***In Short:***  We process your information to provide, improve, and administer our Services, communicate with you, for security and fraud prevention, and to comply with law. We may also process your information for other purposes with your consent. We process your personal information for a variety of reasons, depending on how you interact with our Services, including: - **To facilitate account creation and authentication and otherwise manage user accounts.** We may process your information so you can create and log in to your account, as well as keep your account in working order. - **To deliver and facilitate delivery of services to the user.** We may process your information to provide you with the requested service. - **To save or protect an individual\'s vital interest.** We may process your information when necessary to save or protect an individual's vital interest, such as to prevent harm. - **Analyzing potential threats and vulnerabilities** related to the apps installed on your device or your device settings. - **Enhancing our ability to protect you** by understanding the digital ecosystem of your mobile device. - **Preventing any potential threats** that might harm your device or data. #### 3. WHAT LEGAL BASES DO WE RELY ON TO PROCESS YOUR INFORMATION? ***In Short:***  We only process your personal information when we believe it is necessary and we have a valid legal reason (i.e., legal basis) to do so under applicable law, like with your consent, to comply with laws, to provide you with services to enter into or fulfill our contractual obligations, to protect your rights, or to fulfill our legitimate business interests. The General Data Protection Regulation (GDPR) and UK GDPR require us to explain the valid legal bases we rely on in order to process your personal information. As such, we may rely on the following legal bases to process your personal information: - **Consent.** We may process your information if you have given us permission (i.e., consent) to use your personal information for a specific purpose. You can withdraw your consent at any time. - **Performance of a Contract.** We may process your personal information when we believe it is necessary to fulfill our contractual obligations to you, including providing our Services or at your request prior to entering into a contract with you. - **Legal Obligations.** We may process your information where we believe it is necessary for compliance with our legal obligations, such as to cooperate with a law enforcement body or regulatory agency, exercise or defend our legal rights, or disclose your information as evidence in litigation in which we are involved. - **Vital Interests.** We may process your information where we believe it is necessary to protect your vital interests or the vital interests of a third party, such as situations involving potential threats to the safety of any person. #### 4. WHEN AND WITH WHOM DO WE SHARE YOUR PERSONAL INFORMATION? ***In Short:***  We may share information in specific situations described in this section and/or with the following third parties. We may need to share your personal information in the following situations: - **Business Transfers.** We may share or transfer your information in connection with, or during negotiations of, any merger, sale of company assets, financing, or acquisition of all or a portion of our business to another company. #### 5. HOW LONG DO WE KEEP YOUR INFORMATION? ***In Short:***  We keep your information for as long as necessary to fulfill the purposes outlined in this privacy notice unless otherwise required by law. We will only keep your personal information for as long as it is necessary for the purposes set out in this privacy notice, unless a longer retention period is required or permitted by law (such as tax, accounting, or other legal requirements). No purpose in this notice will require us keeping your personal information for longer than the period of time in which users have an account with us. When we have no ongoing legitimate business need to process your personal information, we will either delete or anonymize such information, or, if this is not possible (for example, because your personal information has been stored in backup archives), then we will securely store your personal information and isolate it from any further processing until deletion is possible. #### 6. HOW DO WE KEEP YOUR INFORMATION SAFE? ***In Short:***  We aim to protect your personal information through a system of organizational and technical security measures. We have implemented appropriate technical and organizational security measures designed to protect the security of any personal information we process. However, despite our safeguards and efforts to secure your information, no electronic transmission over the Internet or information storage technology can be guaranteed to be 100% secure, so we cannot promise or guarantee that hackers, cybercriminals, or other unauthorized third parties will not be able to defeat our security, and improperly collect, access, steal, or modify your information. Although we will do our best to protect your personal information, transmission of personal information to and from our Services is at your own risk. You should only access the Services within a secure environment. - **Storage:** All collected data is stored in a secure environment, with state-of-the-art encryption and protective measures in place to ensure the safety of your information. - **Internal Access:** Access to this data within our company is strictly regulated. Only key personnel with appropriate permissions and clearances can access and process this data. - **Data Sharing:** We do not sell, share, or distribute the data we collect to third parties. We value your trust and uphold it by ensuring that your data stays within our organization and is used exclusively for the purposes mentioned. - **Profiling:** We do not use the data collected to profile users or for any other purpose other than analyzing and preventing threats. #### 7. DO WE COLLECT INFORMATION FROM MINORS? ***In Short:***  We do not knowingly collect data from or market to children under 18 years of age. We do not knowingly solicit data from or market to children under 18 years of age. By using the Services, you represent that you are at least 18 or that you are the parent or guardian of such a minor and consent to such minor dependent's use of the Services. If we learn that personal information from users less than 18 years of age has been collected, we will deactivate the account and take reasonable measures to promptly delete such data from our records. If you become aware of any data we may have collected from children under age 18, please contact us at privacy@redamp.io. #### 8. WHAT ARE YOUR PRIVACY RIGHTS? ***In Short:***  In some regions, such as the European Economic Area (EEA) and United Kingdom (UK), you have rights that allow you greater access to and control over your personal information. You may review, change, or terminate your account at any time. In some regions (like the EEA and UK), you have certain rights under applicable data protection laws. These may include the right (i) to request access and obtain a copy of your personal information, (ii) to request rectification or erasure; (iii) to restrict the processing of your personal information; and (iv) if applicable, to data portability. In certain circumstances, you may also have the right to object to the processing of your personal information. You can make such a request by contacting us by using the contact details provided in the section \"HOW CAN YOU CONTACT US ABOUT THIS NOTICE?\" below. We will consider and act upon any request in accordance with applicable data protection laws. If you are located in the EEA or UK and you believe we are unlawfully processing your personal information, you also have the right to complain to your [Member State data protection authority](https://ec.europa.eu/justice/data-protection/bodies/authorities/index_en.htm) or [UK data protection authority](https://ico.org.uk/make-a-complaint/data-protection-complaints/data-protection-complaints/) . If you are located in Switzerland, you may contact [Federal Data Protection and Information Commissioner](https://www.edoeb.admin.ch/edoeb/en/home.html) . **Withdrawing your consent:**  If we are relying on your consent to process your personal information, you have the right to withdraw your consent at any time. You can withdraw your consent at any time by contacting us by using the contact details provided in the section \"HOW CAN YOU CONTACT US ABOUT THIS NOTICE?\" below. However, please note that this will not affect the lawfulness of the processing before its withdrawal nor, will it affect the processing of your personal information conducted in reliance on lawful processing grounds other than consent. **Account Information** If you would at any time like to review or change the information in your account or terminate your account, you can: - Contact us using the contact information provided. Upon your request to terminate your account, we will deactivate or delete your account and information from our active databases. However, we may retain some information in our files to prevent fraud, troubleshoot problems, assist with any investigations, enforce our legal terms and/or comply with applicable legal requirements. If you have questions or comments about your privacy rights, you may email us at privacy@redamp.io. #### 9. CONTROLS FOR DO-NOT-TRACK FEATURES Most web browsers and some mobile operating systems and mobile applications include a Do-Not-Track (\"DNT\") feature or setting you can activate to signal your privacy preference not to have data about your online browsing activities monitored and collected. At this stage no uniform technology standard for recognizing and implementing DNT signals has been finalized. As such, we do not currently respond to DNT browser signals or any other mechanism that automatically communicates your choice not to be tracked online. If a standard for online tracking is adopted that we must follow in the future, we will inform you about that practice in a revised version of this privacy notice. #### 10. DO CALIFORNIA RESIDENTS HAVE SPECIFIC PRIVACY RIGHTS? ***In Short:***  Yes, if you are a resident of California, you are granted specific rights regarding access to your personal information. California Civil Code Section 1798.83, also known as the \"Shine The Light\" law, permits our users who are California residents to request and obtain from us, once a year and free of charge, information about categories of personal information (if any) we disclosed to third parties for direct marketing purposes and the names and addresses of all third parties with which we shared personal information in the immediately preceding calendar year. If you are a California resident and would like to make such a request, please submit your request in writing to us using the contact information provided below. If you are under 18 years of age, reside in California, and have a registered account with the Services, you have the right to request removal of unwanted data that you publicly post on the Services. To request removal of such data, please contact us using the contact information provided below, and include the email address associated with your account and a statement that you reside in California. We will make sure the data is not publicly displayed on the Services, but please be aware that the data may not be completely or comprehensively removed from all our systems (e.g. backups, etc.). #### 11. DO WE MAKE UPDATES TO THIS NOTICE? ***In Short:***  Yes, we will update this notice as necessary to stay compliant with relevant laws. We may update this privacy notice from time to time. The updated version will be indicated by an updated \"Revised\" date and the updated version will be effective as soon as it is accessible. If we make material changes to this privacy notice, we may notify you either by prominently posting a notice of such changes or by directly sending you a notification. We encourage you to review this privacy notice frequently to be informed of how we are protecting your information. #### 12. HOW CAN YOU CONTACT US ABOUT THIS NOTICE? If you have questions or comments about this notice, you may email us at privacy@redamp.io: REDAMP SECURITY s.r.o. Palackého třída 879/84 612 00 Brno Czech Republic #### 13. HOW CAN YOU REVIEW, UPDATE, OR DELETE THE DATA WE COLLECT FROM YOU? Based on the applicable laws of your country, you may have the right to request access to the personal information we collect from you, change that information, or delete it in some circumstances. To request to review, update, or delete your personal information, please visit: [https://redamp.io/contact](https://redamp.io/contact) . We will respond to your request within 30 days. c:T9d6,## Redamp.io Website Privacy Policy I hereby provide my consent to the company REDAMP SECURITY s.r.o., ID: 29304211 (hereinafter also referred to as the Company or Administrator) to collect and process the following personal data in accordance with the Regulation (EU) 2016/679 on Personal Data Protection (hereinafter referred to only as the “GDPR”): - Address and identification data (name, surname, titles, date of birth, permanent residence address) - Contact data (phone number, e-mail) - Curriculum vitae, motivational letter - Other information (for example, information acquired during interviews or any other information provided by the applicant) Within the recruitment section, the Company may process Personal Data on the basis of its legitimate interest (even without any consent) for a period of 6 months. The Administrator intends to process my Personal Data for the purpose of recruitment for other future work positions or for a direct replacement of recruited applicant, for a longer period of time. This consent is provided for a period of 3 years. This consent may be prolonged. Within the contact section, the Company may process Personal Data on the basis of its legitimate interest (even without any consent) for a period of 6 months. This consent may be prolonged. I hereby provide my explicit consent to the processing stated above. I may withdraw my consent at any time, for example, by sending an e-mail or correspondence to the Company: - Address for physical service: REDAMP SECURITY s.r.o., Palackého třída 879/84, 612 00 Brno, CZ - E-mail: privacy@redamp.io Processing of Personal Data is performed only by the Administrator. However, Personal Data may also be processed by external Processors for the Administrator: - Software providers. - Any other providers and entities/individuals cooperating with the Administrator in the area of sales, accounting, and law. I take into account that I have the following rights on the basis of the act on Personal Data Protection: - Withdraw consent at any time. - Request information from the Administrator about what Personal Data they process. - Submit a complaint against processing. - Request access to such data from the Administrator and update or correct it. - Request erasure of such Personal Data from the Administrator. - In the event of doubts about the observance of obligations related to the processing of Personal Data, to contact the Administrator or [The Office for Personal Data Protection](https://www.uoou.cz).6:["$","html",null,{"lang":"en","data-theme":"redampio","className":"scroll-smooth bg-black __variable_5c20f6 __variable_af7b73 __variable_c9cbed ","children":[["$","head",null,{"children":[["$","meta",null,{"name":"apple-itunes-app","content":"app-id=6450367130"}],["$","script",null,{"defer":true,"data-domain":"redamp.io","src":"https://stats.redamp.io/js/script.js"}]]}],["$","$L9",null,{"gaId":"G-0KZNJ5NX6Z"}],["$","body",null,{"className":"bg-black text-white","children":["$","$La",null,{"locale":"en","messages":{"about_us_page":{"description":"REDAMP SECURITY is aprivate company based in the heart of Europe. We have been active in IT for more than 10 years, during which we have gathered experience that we apply in both customer and our own projects in cybersecurity. We are ateam of IT professionals with experience in addressing cybersecurity challenges for global brands. Our software solutions help protect customers around the world. Even though we are not directly visible, we protect you every day.","title":"We are ateam of IT professionals"},"benefits":{"5_weeks_holiday":"5 weeks holiday","flexible_working_hours":"Flexible working hours","free_refreshments_and_meal_vouchers":"Free refreshments and meal vouchers","further_education":"Further education","international_working_environment":"International working environment","multisport_card_and_teambuildings":"Multisport card and teambuildings","title":"Why work for us"},"button":{"accept_all_cookies":"Accept All Cookies","accept_essential_cookies":"Accept Only Essential Cookies","close":"Close","contact_sales":"Contact sales","contact_us":"Contact us","details":"Details","download_apps":"Download apps","get_in_touch":"Get in touch","get_pro_plan":"Get Pro plan","more_about_us":"More about us","next":"Next","previous":"Previous","references":"References","request_demo":"Request demo","request_pro_plan":"Request Pro plan","send_message":"Send message","start_free_plan":"Start with Free plan","view_open_positions":"Go to Open Positions"},"career_page":{"bring_ideas":"Bring in your own ideas","bring_ideas_description":"While many thrive in the structured environment of large international corporations, we find joy and fulfillment in being part of asmall team making abig impact. Here, your ideas don't just count - they have the potential to benefit millions worldwide.","subtitle":"Join our journey to innovation and excellence.","title":"We're looking for new talent","your_next_level":"Experience your next level","your_next_level_description":"Don't worry, you don't need to know everything from the very beginning. We'll work on tasks closely together. And we're greatly looking forward to seeing your contributions to the global cyber security scene. Of course, none of this can be adequately described fully here in text; it has to be experienced! Join our team! You definitely won't regret it!"},"companies_section":{"title":"We build long-term business relationships"},"contact_details":{"card":{"company_details":"Company details","emails":"E-mails","office":"Office","phone":"Phone"},"title":"Contact details"},"contact_form":{"description":"Feel free to reach out for example about:","list":{"demos":"Product demos","feedback":"Feedback or suggestions","partnership":"Partnership opportunities","sales_inquiry":"Sales inquiries","support":"Support questions"},"thank_you":"Thank you for sending your message!","title":"Contact Us"},"cookie_banner":{"description":"By using essential cookies we are able to ensure proper website operation. Tracking cookies helps us to understand how you interact with website.","read_privacy_policy":"For more information, please read our privacy policy.","title":"We use cookies"},"counter":{"business_partners":"business partners","completed_projects":"completed projects","in_house_professionals":"in-house professionals","long_lasting_projects":"long-lasting projects","office_cpu_cores":"office CPU-cores","supported_languages":"supported languages","years_of_experience":"years of experience"},"download_apps":{"description":"Enhance your digital safety effortlessly with our mobile app. Available for both Android and iOS. It's your first step towards amore secure digital presence.","title":"Start protecting your data and devices"},"features":{"feature1_description":"With our mobile and desktop applications, you can secure all your devices and networks against cyber threats. Be protected whether you are at work, at home, or on the go.","feature1_subtitle":"Protecting Your Devices Against Cyber Threats","feature1_title":"Impenetrable Shield of Your Devices","feature2_description":"We automatically verify the security of any network your devices connect to. We check various network settings such as VPN, Proxy, and DNS, as well as verify traffic filtering capabilities and the configuration of your network firewall to ensure your connection is always secure.","feature2_subtitle":"Ensuring Network Security on Connected Networks","feature2_title":"Guardian of Your Network","feature3_description":"Always have your devices updated and stay safe. Our apps monitor your OS version and alert you when updates are available, keeping your device secure against new threats.","feature3_subtitle":"Keeping Your Devices Up-to-Date","feature3_title":"Alert System for OS Updates","feature4_description":"We ensure the physical security of your devices by verifying the use of screen locks such as access codes, Touch ID, Face ID, and more. Potential thieves will thus have no chance of accessing your data.","feature4_subtitle":"Ensuring Devices Deny Access to Potential Thieves","feature4_title":"Preventing Misuse in Case of Theft","feature5_description":"On Android devices, we check if any installed apps are trying to collect your personal data. For both platforms, Android and iOS, we offer the option to perform adeep scan of any app.","feature5_subtitle":"We monitor spyware apps","feature5_title":"Monitoring Invasive Apps","feature6_description":"Daily, we check if any data linked to your email address has leaked online. In case of aleak, we immediately notify you.","feature6_subtitle":"Informing You About Your Data Leaks","feature6_title":"Guarding Against Data Leaks","feature7_description":"We are not an MDM solution, which means we do not access your private data. Your security and privacy are our top priorities.","feature7_subtitle":"Your personal data, kept personal","feature7_title":"Without Infringing on Your Privacy","feature8_description":"Have acomprehensive overview of all your devices and networks, their security, and potential threats. All clearly and simply from aweb application.","feature8_subtitle":"Keep track of your devices","feature8_title":"Overview of Your Devices","feature9_description":"We will regularly inform your users about threats via push notifications sent to their devices.","feature9_subtitle":"Informing your employees about threats","feature9_title":"Informing About Threats","feature10_description":"Your employees can pose ahigh security risk. We take care of effective training and implementation of security measures, helping you avoid potential data leaks or system breaches.","feature10_subtitle":"Educating your employees about security principles","feature10_title":"Educating About Security","title":"How Redamp.io Protects"},"footer":{"about_us":"About us","all_rights_reserved":"All rights reserved.","company":"Company","company_id":"Company ID","help_contact":"Help & Contact","our_journey_values":"Our journey & values","privacy_policy":"Privacy Policy","projects":"Projects","redamp_history":"REDAMP history","redamp_io":"Redamp.io","vat_id":"VAT ID","your_safety":"Your safety"},"form":{"agree_processing":"Iagree to the","company_name_optional":"Your company name (optional)","message":"Message","personal_data":"processing of personal data","phone":"Phone (optional)","sending_request":"Sending request","subject":"Subject","validation":{"company":"Your company","email":"Please fill in avalid e-mail address.","full_name":"Please fill in your full name.","GDPR":"You have to agree with processing of your personal data.","message_length":"Message for us should be longer than 5 letters.","subject_required":"Please fill in amessage subject."},"your_email":"Your email","your_full_name":"Your full name"},"history":{"2007_subtitle":"The Big Bang","2007_text":"The beginning of everything: our first contracts, long-term customers, and all the enthusiasm that comes with it!","2008_subtitle":"The first employee","2008_text":"As the number of requests from customers began to steeply rise, the number of employees naturally had to increase as well.","2012_subtitle":"Infrastrucure & Web","2012_text":"ICT & MEDIA, s.r.o. = ICT and WEB related orders shaped our daily business. We decided to found anew company, reflecting these two spheres in its name.","2013_subtitle":"Security for online traffic","2013_text":"Due to our excellent knowledge of the Internet, we started to participate in security research and data processing projects for security products which protect customers online.","2016_subtitle":"Security²","2016_text":"After proving ourselves in several long-term security projects, we received the opportunity to develop very interesting and complex security products with our partners.","2019_subtitle":"REDAMP","2019_text":"Anew brand has been born! While we are still formally under ICT & MEDIA, our new projects in the field of cyber security development, analysis, and data processing now belong to REDAMP.","2020_subtitle":"REDAMP SECURITY","2020_text":"Our company was renamed to fully reflect our focus. Welcome REDAMP SECURITY. We are driven by further challenges in the field of cyber security.","2021_subtitle":"REDAMP DEVICE SECURITY","2021_text":"We introduce our own innovative cyber security platform for assessing endpoint risks, such as mobiles, laptops, and IoT. We strive to make risks clearly visible, easily understandable, and easily manageable for you.","2022_subtitle":"Preparing for something big","2022_text":"We are working hard to bring aunique solution to the market that will enable companies to detect and mitigate security risks.","2023_subtitle":"Redamp.io","2023_text":"The Redamp.io platform launched! Our own platform for cyber security solutions, designed specifically for detecting and mitigating risks for small and medium-sized businesses, is up and running.","title":"Our history"},"landing_page":{"explore_strengths":"Explore the Strengths of Redamp.io","intro":"We'll protect your devices, data, privacy, and network.

Setup in under 15 minutes, with no hidden costs.","no_credit_card":"No credit card required","no_mdm":"No MDM.","title":"Simplified Protection for Computers, Mobile Devices, Networks, and Cloud"},"locale_switcher":{"cs":"Čeština","de":"Deutsch","en":"English"},"management":{"dominik_malcik_description":"Dominik is the founder and CEO of REDAMP SECURITY. He has more than 10 years of experience in managerial positions in cybersecurity companies and previously served as the managing director at CYAN Research & Development (online security) and Anovis CZ (network security). Dominik studied computer security and earned aPhD from the Brno University of Technology. Cybersecurity is his life's mission.","dominik_malcik_name":"Ing. Dominik Malčík PhD.","dominik_malcik_role":"Founder / CEO","eva_strnadova_description":"Head of Back Office","eva_strnadova_name":"Eva Strnadová, DiS.","eva_strnadova_role":"Head of Back Office","jan_gardian_description":"Head of OPS","jan_gardian_name":"Ing. Jan Gardian","jan_gardian_role":"Head of OPS","olena_kinash_description":"Head of Data Analysis","olena_kinash_name":"Bc. Olena Kinash","olena_kinash_role":"Head of Data Analysis","ondrej_dolezal_description":"Head of Development","ondrej_dolezal_name":"Ing. Ondřej Doležal","ondrej_dolezal_role":"Head of Development","our_journey":"Our journey","our_journey_description":"REDAMP SECURITY is built on years of experience gained while working in the field of cyber security, leading to organic growth of the company. What started with one person has evolved into abusiness with more than 35 professionals. REDAMP SECURITY is aprivate company based in the heart of the EU and is ready to provide any cyber security services in compliance with all European regulations. Although we have already had more than 10 great years, we believe there is even more to come in the future.","our_values":"Our values","our_values_description":"One of the key values at REDAMP SECURITY is to become an exceptional partner for each of our clients. While it may sound like acliché, we truly live by this at REDAMP. Our clients and partners can always rely on us being there for them and acting responsibly under any circumstances. Good reputation is one of the most important assets in cyber security, and that's exactly what we are building - through trustworthy and long-term relationships.","team_description":"The leadership of our team consists of computer enthusiasts who contribute to astrong corporate culture and provide our clients with the highest quality work. We do business differently, with empathy and understanding of customer needs. It's something we are very proud of!","title":"Management"},"metadata":{"description":"Intuitive protection for computers, mobile devices, networks, and the cloud. We ensure the security of your devices, protect your data and privacy, and strengthen your network protection. Easily set up everything in 15 minutes – transparently, without hidden fees, without cybersecurity specialists."},"navigation":{"about_us":"About us","career":"Career","company":"Company","contact":"Contact","features":"Features","knowledge_base":"Knowledge base","pricing":"Pricing","references":"References","roadmap":"Roadmap","services":"Services","sign_in":"Sign in"},"our_team":{"introduction":"We are ateam of IT professionals solving cyber security challenges for global brands. Our software solutions help to protect customers from around the world. Although we are not directly visible, we meet you online every day! The work with passion, joy, and interest are all about delivering the best.","quote":"Nowadays, we are witnessing increasing demand in cyber security that goes hand in hand with more extensive use of technology in all aspects of our everyday lives. More and more applications are moved to the world of IT, making wide variety of features available immediately from your pocket. With this power, there comes also the huge responsibility.","title":"Our team"},"placeholder":{"subject":"e.g., Request for Information"},"plan":{"enterprise":{"deployment_list":"Cloud-based, Self-hosted","deployment_title":"Deployment possibilities","description":"Designed for large-scale deployments. Tailored security solution with custom integration options.","general_list":"White-label","general_title":"General","key_features_list":"Access to all APIs, SDK for Android, SDK for iOS, Mobile App for Android, Mobile App for iOS, Web console, Risk evaluation service, Soon SDK for Windows, Soon SDK for macOS","key_features_title":"Key features","note":"Possible further customizations","previous_list":"Everything in \"Pro\" plan","previous_title":"Previous features","suitable_list":"MSPs, MSSPs, Mobile operators, Insurance groups, ISPs","suitable_title":"Suitable for","title":"Enterprise","unit":"Contact us for pricing"},"free":{"description":"Try Redamp.io now.","general_list":"Up to 5 devices","general_title":"General","mobile_list":"Mobile platform evaluation, OS settings evaluation, Network security evaluation, Data leak checks, Installed apps analysis (Android only), Requested apps analysis, Automatic background scans, Security ratings & solutions","mobile_title":"Android / iOS apps","title":"Free","unit":"per device/month","web_list":"Risk score dashboard, Device management, Network management, Privacy protection overview, Threat management, Risk mitigation solutions, Communication platform, User management","web_title":"Web console"},"pro":{"description":"Unlimited protection with Redamp.io.","general_list":"Unlimited number of devices, Soon Network scanner, Soon IoT evaluation","general_title":"Pro features","previous_list":"Everything in \"Free\" plan","previous_title":"Previous features","title":"Pro","unit":"per device/month"},"whats_included":"What's included"},"planned_feature":{"advanced_network_scoring_description":"Scanning of external security of the corporate network with afocus on detecting the state of the firewall, open ports, and services running towards the internet.","advanced_network_scoring_title":"Advanced Network Scoring","advanced_privacy_evaluation_description":"Evaluation of privacy protection based on used services and their policies for personal data protection using artificial intelligence.","advanced_privacy_evaluation_title":"Advanced Privacy Evaluation","extended_education_module_description":"Interactive gamified educational module with the option to define your own questions aimed at educating employees about the basics of internet security.","extended_education_module_title":"Extended Education Module","linux_desktop_app_description":"Creation of an app for Linux, allowing protection for all your desktop devices.","linux_desktop_app_title":"Linux Desktop App","macos_desktop_app_description":"Creation of an app for macOS, allowing protection for all your Apple devices.","macos_desktop_app_title":"macOS Desktop App","multilingual_support_description":"Adding support for German and Czech languages to make using our app easier for native speakers from the Czech Republic and German-speaking countries.","multilingual_support_title":"Multilingual Support","network_elements_scanning_description":"Deep network scan identifying all devices connected to the network such as IoT, SmartTV, or printers to uncover potentially vulnerable or undesirable devices.","network_elements_scanning_title":"Device detection on the network","region_specific_threat_alerts_description":"Stay informed about current vishing (fraudulent phone calls) and smishing (fraudulent SMS) campaigns in your country.","region_specific_threat_alerts_title":"Regional threat alerts","safe_surfing_description":"Robust online protection with network filtering enabled, blocking phishing, tracking, spam, or advertising servers using DNS-over-VPN technology.","safe_surfing_title":"Safe Surfing","seamless_integration_description":"Effortless integration with Google Workspace, AzureAD, Office365, and more.","seamless_integration_title":"Seamless Integration","windows_desktop_app_description":"Creating aWindows app that will protect all your desktop devices as well.","windows_desktop_app_title":"Windows Desktop App"},"planned_page":{"description":"Explore planned features aimed at further enhancing the security of your devices and network.","history":"History","title":"Roadmap"},"positions":{"table":{"location":"Location","type":"Type"},"title":"Open Positions"},"pricing":{"description":"With our free trial period, you can secure your devices within 15 minutes.","title":"Choose Your Plan"},"privacy_policy_page":{"service":"$b","title":"Privacy Policy","website":"$c"},"pro_plan_request":{"description":"Request Pro plan access. We'll contact you soon!","error_description":"Your message can't be submitted right now. Please try it again later.","error_title":"We are sorry.","response_notice":"We will get back to you as soon as possible.","thank_you":"Thank you for submitting your request!"},"references_page":{"title":"Our Track Record"},"services":{"data_analysis_text":"Intelligent tools need data to make the right decisions. Even human analysts make their decisions based on data. We strive to understand your data, process it, and present it appropriately to help you achieve your goals in the best possible way.","data_analysis_title":"Data Analysis & Processing","databases_text":"In addition to standard database design, our specialists can perform database profiling to identify potential problem areas and design errors, as well as finding the optimal database cluster settings for your specific needs.","databases_title":"Databases","infra_dev_operations_text":"Every project runs on an architecture created and managed by our OPS specialists. The entire planned infrastructure can be designed for seamless operation with software and data that will be processed for you. We provide solutions in the areas of backup, monitoring, and change/event management processes.","infra_dev_operations_title":"Infra & Dev Operations","sw_development_text":"Our main focus is on developing backend services. However, you can also take advantage of our capabilities in programming in Swift (iOS), Kotlin/JetPack (Android), and ReactJS (Web). All our projects are managed by our project team using agile development to ensure quality in ashort time.","sw_development_title":"SW Development","title":"What we can do for you"},"testimonials":{"adi_reschenhofer_company":"CFO, CYBER TRAP","adi_reschenhofer_text":"Redamp.io sets ahigh bar in the cybersecurity industry with their expertise, quality, and reliability. Their adept team discovers and mitigates cyber threats proactively, demonstrating an exceptional understanding of the evolving digital landscape. Redamp’s commitment to securing digital experiences is truly inspiring.","albert_fragner_company":"Managing Director, AXXXELERATE","albert_fragner_text":"We as AXXXELERATE appreciate working together with REDAMP SECURITY as along-term partner especially for IT Security related topics. Highly skilled and motivated engineers combined with astrong focus on execution time fit absolutely into our requirements.","markus_cserna_company":"CTO, cyan security","markus_cserna_text":"cyan is working with REDAMP and the team in Brno closely for years on multiple research projects around cyber security. The expertise from REDAMP has helped us to stay focused on the ever changing threat landscape with quick reaction times and flexible adaption to new technology.","markus_guttenberg_company":"CEO, Anovis","markus_guttenberg_text":"Our partnership with Redamp.io has been instrumental in fortifying our cybersecurity posture. Their proactive approach to identifying and neutralizing digital vulnerabilities is unparalleled. Redamp's team exudes professionalism and adeep understanding of the ever-evolving cyber landscape, making them an indispensable ally.","thomas_hoffmann_company":"Founder and Member of the Board of RadarServices","thomas_hoffmann_text":"I’ve had the pleasure to work with Dominik and his team over years. It is ahighly professional team, top experienced and reality driven. Moreover, the knowledge driven preparations for our joint projects delivered on time - ready to implement - results in perfection. For me aclear recommendation.","title":"Our customers say"},"text":{"done":"Done","in_progress":"Developing","interested":"Interested?","key_figures":"Key figures","more_info":"More information","q1_months":"January, February, and March","q2_months":"April, May, and June","q3_months":"July, August, and September","q3-4_months":"July–December","q4_months":"October, November, and December","soon":"Soon","throughout_year_months":"Throughout the year","want_to_cooperate":"Do you want to cooperate?"},"why_us":{"defined_technology_text":"We use aclearly defined technology stack that we understand. It is not our goal to be Chuck Norris in every segment, but to be professionals in what we do.","defined_technology_title":"Defined technology","fast_delivery_text":"We help you in situations when you are under time pressure. Agile methodology and our well-organized team guarantee fast and high-quality delivery.","fast_delivery_title":"Fast delivery","high_standards_text":"In delivering our projects, we adhere to industrial standards of high quality. Among other things, our solutions are sustainably maintainable in real operation.","high_standards_title":"High standards","on_premise_cloud_text":"It depends on your preferences how you want to operate the delivered solution. We can help you with the deployment and operation of the entire architecture.","on_premise_cloud_title":"On-premise & Cloud","reliability_text":"Our customers can always rely on us doing the best and behaving correctly, in every situation. Reliability is one of the most important values engraved deeply in the company constitution.","reliability_title":"Reliability","title":"Why work with us","turnkey_solution_text":"We are happy to take on the entire project from Ato Z. Designing optimal infrastructure and software that perfectly complement each other is our passion.","turnkey_solution_title":"Turnkey solution"}},"children":[["$","header",null,{"className":"group sticky top-0 z-50 border-b border-neutral-800 bg-neutral-900/75 backdrop-blur-lg","children":["$","$Ld",null,{}]}],["$","main",null,{"children":["$","$L3",null,{"parallelRouterKey":"children","segmentPath":["children","$4","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","notFoundStyles":"$undefined","styles":null}]}],[["$","footer",null,{"className":"footer mx-auto max-w-screen-xl px-8 py-16","children":[["$","nav",null,{"children":[["$","header",null,{"className":"footer-title opacity-100","children":"Help & Contact"}],["$","div",null,{"className":"flex items-center justify-center gap-2","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-phone size-4","children":[["$","path","foiqr5",{"d":"M22 16.92v3a2 2 0 0 1-2.18 2 19.79 19.79 0 0 1-8.63-3.07 19.5 19.5 0 0 1-6-6 19.79 19.79 0 0 1-3.07-8.67A2 2 0 0 1 4.11 2h3a2 2 0 0 1 2 1.72 12.84 12.84 0 0 0 .7 2.81 2 2 0 0 1-.45 2.11L8.09 9.91a16 16 0 0 0 6 6l1.27-1.27a2 2 0 0 1 2.11-.45 12.84 12.84 0 0 0 2.81.7A2 2 0 0 1 22 16.92z"}],"$undefined"]}],["$","a",null,{"className":"link-hover link text-neutral-400","href":"tel:+420511110184","children":"+420 511 110 184"}]]}],["$","div",null,{"className":"flex items-center justify-center gap-2","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-mail size-4","children":[["$","rect","18n3k1",{"width":"20","height":"16","x":"2","y":"4","rx":"2"}],["$","path","1ocrg3",{"d":"m22 7-8.97 5.7a1.94 1.94 0 0 1-2.06 0L2 7"}],"$undefined"]}],["$","a",null,{"className":"link-hover link text-neutral-400","href":"mailto:hello@redamp.io","children":"hello@redamp.io"}]]}]]}],["$","nav",null,{"children":[["$","header",null,{"className":"footer-title opacity-100","children":"Your safety"}],"$Le","$Lf","$L10"]}],["$","nav",null,{"children":[["$","header",null,{"className":"footer-title opacity-100","children":"About us"}],"$L11","$L12","$L13"]}],["$","aside",null,{"className":"space-y-2","children":[["$","p",null,{"className":"font-medium","children":"REDAMP SECURITY s.r.o."}],["$","p",null,{"className":"text-neutral-400","children":["Palackého třída 879/84",["$","br",null,{}],"612 00 Brno, CZ"]}],["$","p",null,{"className":"text-neutral-400","children":["Company ID",": 29304211",["$","br",null,{}],"VAT ID",": CZ29304211"]}]]}]]}],["$","footer",null,{"className":"footer footer-center p-8 text-neutral-400","children":["$","aside",null,{"children":["$","p",null,{"children":["Copyright © ",2024," REDAMP SECURITY s.r.o."," ","All rights reserved."]}]}]}]],["$","$L14",null,{}]]}]}]]}] 16:T14ea,M12.504 0c-.155 0-.315.008-.48.021-4.226.333-3.105 4.807-3.17 6.298-.076 1.092-.3 1.953-1.05 3.02-.885 1.051-2.127 2.75-2.716 4.521-.278.832-.41 1.684-.287 2.489a.424.424 0 00-.11.135c-.26.268-.45.6-.663.839-.199.199-.485.267-.797.4-.313.136-.658.269-.864.68-.09.189-.136.394-.132.602 0 .199.027.4.055.536.058.399.116.728.04.97-.249.68-.28 1.145-.106 1.484.174.334.535.47.94.601.81.2 1.91.135 2.774.6.926.466 1.866.67 2.616.47.526-.116.97-.464 1.208-.946.587-.003 1.23-.269 2.26-.334.699-.058 1.574.267 2.577.2.025.134.063.198.114.333l.003.003c.391.778 1.113 1.132 1.884 1.071.771-.06 1.592-.536 2.257-1.306.631-.765 1.683-1.084 2.378-1.503.348-.199.629-.469.649-.853.023-.4-.2-.811-.714-1.376v-.097l-.003-.003c-.17-.2-.25-.535-.338-.926-.085-.401-.182-.786-.492-1.046h-.003c-.059-.054-.123-.067-.188-.135a.357.357 0 00-.19-.064c.431-1.278.264-2.55-.173-3.694-.533-1.41-1.465-2.638-2.175-3.483-.796-1.005-1.576-1.957-1.56-3.368.026-2.152.236-6.133-3.544-6.139zm.529 3.405h.013c.213 0 .396.062.584.198.19.135.33.332.438.533.105.259.158.459.166.724 0-.02.006-.04.006-.06v.105a.086.086 0 01-.004-.021l-.004-.024a1.807 1.807 0 01-.15.706.953.953 0 01-.213.335.71.71 0 00-.088-.042c-.104-.045-.198-.064-.284-.133a1.312 1.312 0 00-.22-.066c.05-.06.146-.133.183-.198.053-.128.082-.264.088-.402v-.02a1.21 1.21 0 00-.061-.4c-.045-.134-.101-.2-.183-.333-.084-.066-.167-.132-.267-.132h-.016c-.093 0-.176.03-.262.132a.8.8 0 00-.205.334 1.18 1.18 0 00-.09.4v.019c.002.089.008.179.02.267-.193-.067-.438-.135-.607-.202a1.635 1.635 0 01-.018-.2v-.02a1.772 1.772 0 01.15-.768c.082-.22.232-.406.43-.533a.985.985 0 01.594-.2zm-2.962.059h.036c.142 0 .27.048.399.135.146.129.264.288.344.465.09.199.14.4.153.667v.004c.007.134.006.2-.002.266v.08c-.03.007-.056.018-.083.024-.152.055-.274.135-.393.2.012-.09.013-.18.003-.267v-.015c-.012-.133-.04-.2-.082-.333a.613.613 0 00-.166-.267.248.248 0 00-.183-.064h-.021c-.071.006-.13.04-.186.132a.552.552 0 00-.12.27.944.944 0 00-.023.33v.015c.012.135.037.2.08.334.046.134.098.2.166.268.01.009.02.018.034.024-.07.057-.117.07-.176.136a.304.304 0 01-.131.068 2.62 2.62 0 01-.275-.402 1.772 1.772 0 01-.155-.667 1.759 1.759 0 01.08-.668 1.43 1.43 0 01.283-.535c.128-.133.26-.2.418-.2zm1.37 1.706c.332 0 .733.065 1.216.399.293.2.523.269 1.052.468h.003c.255.136.405.266.478.399v-.131a.571.571 0 01.016.47c-.123.31-.516.643-1.063.842v.002c-.268.135-.501.333-.775.465-.276.135-.588.292-1.012.267a1.139 1.139 0 01-.448-.067 3.566 3.566 0 01-.322-.198c-.195-.135-.363-.332-.612-.465v-.005h-.005c-.4-.246-.616-.512-.686-.71-.07-.268-.005-.47.193-.6.224-.135.38-.271.483-.336.104-.074.143-.102.176-.131h.002v-.003c.169-.202.436-.47.839-.601.139-.036.294-.065.466-.065zm2.8 2.142c.358 1.417 1.196 3.475 1.735 4.473.286.534.855 1.659 1.102 3.024.156-.005.33.018.513.064.646-1.671-.546-3.467-1.089-3.966-.22-.2-.232-.335-.123-.335.59.534 1.365 1.572 1.646 2.757.13.535.16 1.104.021 1.67.067.028.135.06.205.067 1.032.534 1.413.938 1.23 1.537v-.043c-.06-.003-.12 0-.18 0h-.016c.151-.467-.182-.825-1.065-1.224-.915-.4-1.646-.336-1.77.465-.008.043-.013.066-.018.135-.068.023-.139.053-.209.064-.43.268-.662.669-.793 1.187-.13.533-.17 1.156-.205 1.869v.003c-.02.334-.17.838-.319 1.35-1.5 1.072-3.58 1.538-5.348.334a2.645 2.645 0 00-.402-.533 1.45 1.45 0 00-.275-.333c.182 0 .338-.03.465-.067a.615.615 0 00.314-.334c.108-.267 0-.697-.345-1.163-.345-.467-.931-.995-1.788-1.521-.63-.4-.986-.87-1.15-1.396-.165-.534-.143-1.085-.015-1.645.245-1.07.873-2.11 1.274-2.763.107-.065.037.135-.408.974-.396.751-1.14 2.497-.122 3.854a8.123 8.123 0 01.647-2.876c.564-1.278 1.743-3.504 1.836-5.268.048.036.217.135.289.202.218.133.38.333.59.465.21.201.477.335.876.335.039.003.075.006.11.006.412 0 .73-.134.997-.268.29-.134.52-.334.74-.4h.005c.467-.135.835-.402 1.044-.7zm2.185 8.958c.037.6.343 1.245.882 1.377.588.134 1.434-.333 1.791-.765l.211-.01c.315-.007.577.01.847.268l.003.003c.208.199.305.53.391.876.085.4.154.78.409 1.066.486.527.645.906.636 1.14l.003-.007v.018l-.003-.012c-.015.262-.185.396-.498.595-.63.401-1.746.712-2.457 1.57-.618.737-1.37 1.14-2.036 1.191-.664.053-1.237-.2-1.574-.898l-.005-.003c-.21-.4-.12-1.025.056-1.69.176-.668.428-1.344.463-1.897.037-.714.076-1.335.195-1.814.12-.465.308-.797.641-.984l.045-.022zm-10.814.049h.01c.053 0 .105.005.157.014.376.055.706.333 1.023.752l.91 1.664.003.003c.243.533.754 1.064 1.189 1.637.434.598.77 1.131.729 1.57v.006c-.057.744-.48 1.148-1.125 1.294-.645.135-1.52.002-2.395-.464-.968-.536-2.118-.469-2.857-.602-.369-.066-.61-.2-.723-.4-.11-.2-.113-.602.123-1.23v-.004l.002-.003c.117-.334.03-.752-.027-1.118-.055-.401-.083-.71.043-.94.16-.334.396-.4.69-.533.294-.135.64-.202.915-.47h.002v-.002c.256-.268.445-.601.668-.838.19-.201.38-.336.663-.336zm7.159-9.074c-.435.201-.945.535-1.488.535-.542 0-.97-.267-1.28-.466-.154-.134-.28-.268-.373-.335-.164-.134-.144-.333-.074-.333.109.016.129.134.199.2.096.066.215.2.36.333.292.2.68.467 1.167.467.485 0 1.053-.267 1.398-.466.195-.135.445-.334.648-.467.156-.136.149-.267.279-.267.128.016.034.134-.147.332a8.097 8.097 0 01-.69.468zm-1.082-1.583V5.64c-.006-.02.013-.042.029-.05.074-.043.18-.027.26.004.063 0 .16.067.15.135-.006.049-.085.066-.135.066-.055 0-.092-.043-.141-.068-.052-.018-.146-.008-.163-.065zm-.551 0c-.02.058-.113.049-.166.066-.047.025-.086.068-.14.068-.05 0-.13-.02-.136-.068-.01-.066.088-.133.15-.133.08-.031.184-.047.259-.005.019.009.036.03.03.05v.02h.003z2:[["$","section",null,{"id":"$undefined","className":"relative mx-auto overflow-x-clip bg-black px-4 py-16 sm:px-8 lg:py-24","children":[["$","img",null,{"src":"/images/circle.png","alt":"","draggable":"false","className":"absolute w-[1200px] z-10 select-none opacity-80 blur grayscale right-[-300px] top-0"}],["$","h1",null,{"className":"relative z-10 mx-auto my-8 text-balance text-center text-5xl font-medium lg:w-4/5 lg:text-6xl","children":"Roadmap"}],["$","p",null,{"className":"relative z-10 mx-auto mb-16 max-w-[60ch] text-balance text-center text-lg leading-normal text-neutral-400 lg:mb-16 lg:w-4/5 lg:text-2xl lg:leading-normal","children":"Explore planned features aimed at further enhancing the security of your devices and network."}],[["$","div",null,{"className":"relative z-20 mx-auto mb-24 max-w-screen-xl","children":[["$","h2",null,{"className":"mb-2 text-center font-mono text-4xl font-medium md:ml-8 md:text-left lg:text-5xl","children":"Q3 2024"}],["$","p",null,{"className":"mb-4 text-center text-neutral-400 md:ml-8 md:text-left lg:text-left","children":"July, August, and September"}],["$","hr",null,{"className":"mb-8 border-neutral-700"}],["$","div",null,{"className":"grid gap-4 md:grid-cols-2 lg:grid-cols-3","children":[["$","article","advanced_network_scoring_description",{"className":"relative z-50 rounded-xl border border-neutral-700 bg-gray-750 p-8 text-white shadow-md","children":[false,["$","div",null,{"className":"absolute right-6 top-6 mx-auto flex w-fit items-center justify-center gap-2 rounded-lg border border-yellow-500 bg-yellow-900/50 py-1 pl-4 pr-3 shadow-lg shadow-yellow-500/25","children":[["$","p",null,{"className":"text-sm","children":"Developing"}],["$","span",null,{"className":"relative flex size-2 items-center justify-center","children":[["$","span",null,{"className":"absolute inline-flex h-full w-full animate-ping rounded-full bg-yellow-400 opacity-75"}],["$","span",null,{"className":"relative inline-flex size-1 rounded-full bg-yellow-300"}]]}]]}],["$","header",null,{"className":"mb-2","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-bar-chart2 mb-4 size-8","children":[["$","line","1xfpm4",{"x1":"18","x2":"18","y1":"20","y2":"10"}],["$","line","be30l9",{"x1":"12","x2":"12","y1":"20","y2":"4"}],["$","line","1r4le6",{"x1":"6","x2":"6","y1":"20","y2":"14"}],"$undefined"]}],["$","h2",null,{"className":"mr-2 text-balance text-2xl font-medium","children":"Advanced Network Scoring"}]]}],["$","p",null,{"className":"leading-normal text-neutral-400 md:min-h-[10ex]","children":["Scanning of external security of the corporate network with a",["$","$15","nbsp0",{"children":" "}],"focus on detecting the state of the firewall, open ports, and services running towards the internet."]}]]}],["$","article","extended_education_module_description",{"className":"relative z-50 rounded-xl border border-neutral-700 bg-gray-750 p-8 text-white shadow-md","children":[false,["$","div",null,{"className":"absolute right-6 top-6 mx-auto flex w-fit items-center justify-center gap-2 rounded-lg border border-yellow-500 bg-yellow-900/50 py-1 pl-4 pr-3 shadow-lg shadow-yellow-500/25","children":[["$","p",null,{"className":"text-sm","children":"Developing"}],["$","span",null,{"className":"relative flex size-2 items-center justify-center","children":[["$","span",null,{"className":"absolute inline-flex h-full w-full animate-ping rounded-full bg-yellow-400 opacity-75"}],["$","span",null,{"className":"relative inline-flex size-1 rounded-full bg-yellow-300"}]]}]]}],["$","header",null,{"className":"mb-2","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-book-open mb-4 size-8","children":[["$","path","vv98re",{"d":"M2 3h6a4 4 0 0 1 4 4v14a3 3 0 0 0-3-3H2z"}],["$","path","1cyq3y",{"d":"M22 3h-6a4 4 0 0 0-4 4v14a3 3 0 0 1 3-3h7z"}],"$undefined"]}],["$","h2",null,{"className":"mr-2 text-balance text-2xl font-medium","children":"Extended Education Module"}]]}],["$","p",null,{"className":"leading-normal text-neutral-400 md:min-h-[10ex]","children":"Interactive gamified educational module with the option to define your own questions aimed at educating employees about the basics of internet security."}]]}],["$","article","windows_desktop_app_description",{"className":"relative z-50 rounded-xl border border-neutral-700 bg-gray-750 p-8 text-white shadow-md","children":[false,["$","div",null,{"className":"absolute right-6 top-6 mx-auto flex w-fit items-center justify-center gap-2 rounded-lg border border-yellow-500 bg-yellow-900/50 py-1 pl-4 pr-3 shadow-lg shadow-yellow-500/25","children":[["$","p",null,{"className":"text-sm","children":"Developing"}],["$","span",null,{"className":"relative flex size-2 items-center justify-center","children":[["$","span",null,{"className":"absolute inline-flex h-full w-full animate-ping rounded-full bg-yellow-400 opacity-75"}],["$","span",null,{"className":"relative inline-flex size-1 rounded-full bg-yellow-300"}]]}]]}],["$","header",null,{"className":"mb-2","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"fill":"currentColor","viewBox":"0 0 24 24","className":"mb-4 size-8","children":[["$","title",null,{"children":"Windows"}],["$","path",null,{"d":"M0 3.449L9.75 2.1v9.451H0m10.949-9.602L24 0v11.4H10.949M0 12.6h9.75v9.451L0 20.699M10.949 12.6H24V24l-12.9-1.801"}]]}],["$","h2",null,{"className":"mr-2 text-balance text-2xl font-medium","children":"Windows Desktop App"}]]}],["$","p",null,{"className":"leading-normal text-neutral-400 md:min-h-[10ex]","children":["Creating a",["$","$15","nbsp0",{"children":" "}],"Windows app that will protect all your desktop devices as well."]}]]}]]}]]}],["$","div",null,{"className":"relative z-20 mx-auto mb-24 max-w-screen-xl","children":[["$","h2",null,{"className":"mb-2 text-center font-mono text-4xl font-medium md:ml-8 md:text-left lg:text-5xl","children":"Q4 2024"}],["$","p",null,{"className":"mb-4 text-center text-neutral-400 md:ml-8 md:text-left lg:text-left","children":"October, November, and December"}],["$","hr",null,{"className":"mb-8 border-neutral-700"}],["$","div",null,{"className":"grid gap-4 md:grid-cols-2 lg:grid-cols-3","children":[["$","article","macos_desktop_app_description",{"className":"relative z-50 rounded-xl border border-neutral-700 bg-gray-750 p-8 text-white shadow-md","children":[false,false,["$","header",null,{"className":"mb-2","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"fill":"currentColor","viewBox":"0 0 24 24","className":"mb-4 size-8","children":[["$","title",null,{"children":"Apple"}],["$","path",null,{"d":"M12.152 6.896c-.948 0-2.415-1.078-3.96-1.04-2.04.027-3.91 1.183-4.961 3.014-2.117 3.675-.546 9.103 1.519 12.09 1.013 1.454 2.208 3.09 3.792 3.039 1.52-.065 2.09-.987 3.935-.987 1.831 0 2.35.987 3.96.948 1.637-.026 2.676-1.48 3.676-2.948 1.156-1.688 1.636-3.325 1.662-3.415-.039-.013-3.182-1.221-3.22-4.857-.026-3.04 2.48-4.494 2.597-4.559-1.429-2.09-3.623-2.324-4.39-2.376-2-.156-3.675 1.09-4.61 1.09zM15.53 3.83c.843-1.012 1.4-2.427 1.245-3.83-1.207.052-2.662.805-3.532 1.818-.78.896-1.454 2.338-1.273 3.714 1.338.104 2.715-.688 3.559-1.701"}]]}],["$","h2",null,{"className":"mr-2 text-balance text-2xl font-medium","children":"macOS Desktop App"}]]}],["$","p",null,{"className":"leading-normal text-neutral-400 md:min-h-[10ex]","children":"Creation of an app for macOS, allowing protection for all your Apple devices."}]]}],["$","article","advanced_privacy_evaluation_description",{"className":"relative z-50 rounded-xl border border-neutral-700 bg-gray-750 p-8 text-white shadow-md","children":[false,false,["$","header",null,{"className":"mb-2","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-user-check mb-4 size-8","children":[["$","path","1yyitq",{"d":"M16 21v-2a4 4 0 0 0-4-4H6a4 4 0 0 0-4 4v2"}],["$","circle","nufk8",{"cx":"9","cy":"7","r":"4"}],["$","polyline","1pwet4",{"points":"16 11 18 13 22 9"}],"$undefined"]}],["$","h2",null,{"className":"mr-2 text-balance text-2xl font-medium","children":"Advanced Privacy Evaluation"}]]}],["$","p",null,{"className":"leading-normal text-neutral-400 md:min-h-[10ex]","children":"Evaluation of privacy protection based on used services and their policies for personal data protection using artificial intelligence."}]]}]]}]]}],["$","div",null,{"className":"relative z-20 mx-auto mb-24 max-w-screen-xl","children":[["$","h2",null,{"className":"mb-2 text-center font-mono text-4xl font-medium md:ml-8 md:text-left lg:text-5xl","children":"2025"}],["$","p",null,{"className":"mb-4 text-center text-neutral-400 md:ml-8 md:text-left lg:text-left","children":"Throughout the year"}],["$","hr",null,{"className":"mb-8 border-neutral-700"}],["$","div",null,{"className":"grid gap-4 md:grid-cols-2 lg:grid-cols-3","children":[["$","article","seamless_integration_description",{"className":"relative z-50 rounded-xl border border-neutral-700 bg-gray-750 p-8 text-white shadow-md","children":[false,false,["$","header",null,{"className":"mb-2","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-plug mb-4 size-8","children":[["$","path","1ega77",{"d":"M12 22v-5"}],["$","path","14iosj",{"d":"M9 8V2"}],["$","path","18g5xt",{"d":"M15 8V2"}],["$","path","osxo6l",{"d":"M18 8v5a4 4 0 0 1-4 4h-4a4 4 0 0 1-4-4V8Z"}],"$undefined"]}],["$","h2",null,{"className":"mr-2 text-balance text-2xl font-medium","children":"Seamless Integration"}]]}],["$","p",null,{"className":"leading-normal text-neutral-400 md:min-h-[10ex]","children":"Effortless integration with Google Workspace, AzureAD, Office365, and more."}]]}],["$","article","network_elements_scanning_description",{"className":"relative z-50 rounded-xl border border-neutral-700 bg-gray-750 p-8 text-white shadow-md","children":[false,false,["$","header",null,{"className":"mb-2","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-router mb-4 size-8","children":[["$","rect","w68u3i",{"width":"20","height":"8","x":"2","y":"14","rx":"2"}],["$","path","19vcac",{"d":"M6.01 18H6"}],["$","path","uamcmx",{"d":"M10.01 18H10"}],["$","path","qjz1xs",{"d":"M15 10v4"}],["$","path","1rif40",{"d":"M17.84 7.17a4 4 0 0 0-5.66 0"}],["$","path","6a5xfq",{"d":"M20.66 4.34a8 8 0 0 0-11.31 0"}],"$undefined"]}],["$","h2",null,{"className":"mr-2 text-balance text-2xl font-medium","children":"Device detection on the network"}]]}],["$","p",null,{"className":"leading-normal text-neutral-400 md:min-h-[10ex]","children":"Deep network scan identifying all devices connected to the network such as IoT, SmartTV, or printers to uncover potentially vulnerable or undesirable devices."}]]}],["$","article","linux_desktop_app_description",{"className":"relative z-50 rounded-xl border border-neutral-700 bg-gray-750 p-8 text-white shadow-md","children":[false,false,["$","header",null,{"className":"mb-2","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"fill":"currentColor","viewBox":"0 0 24 24","className":"mb-4 size-8","children":[["$","title",null,{"children":"Linux"}],["$","path",null,{"d":"$16"}]]}],["$","h2",null,{"className":"mr-2 text-balance text-2xl font-medium","children":"Linux Desktop App"}]]}],["$","p",null,{"className":"leading-normal text-neutral-400 md:min-h-[10ex]","children":"Creation of an app for Linux, allowing protection for all your desktop devices."}]]}]]}]]}]],["$","img",null,{"src":"/images/circle.png","alt":"","draggable":"false","className":"absolute w-[1200px] z-10 select-none opacity-80 blur grayscale bottom-0 left-[-300px]"}],["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-history relative z-20 mx-auto mt-32 size-16 text-neutral-400","children":[["$","path","1357e3",{"d":"M3 12a9 9 0 1 0 9-9 9.75 9.75 0 0 0-6.74 2.74L3 8"}],["$","path","1xhq8a",{"d":"M3 3v5h5"}],["$","path","1fdv2h",{"d":"M12 7v5l4 2"}],"$undefined"]}],["$","hr",null,{"className":"mx-auto my-4 w-16 border-gray-500"}],["$","h2",null,{"className":"relative z-10 mx-auto mb-16 text-center text-5xl font-medium lg:w-4/5 lg:text-6xl","children":"History"}],[["$","div",null,{"className":"relative z-20 mx-auto mb-24 max-w-screen-xl","children":[["$","h2",null,{"className":"mb-2 text-center font-mono text-4xl font-medium md:ml-8 md:text-left lg:text-5xl","children":"Q2 2024"}],["$","p",null,{"className":"mb-4 text-center text-neutral-400 md:ml-8 md:text-left lg:text-left","children":"April, May, and June"}],["$","hr",null,{"className":"mb-8 border-neutral-700"}],["$","div",null,{"className":"grid gap-4 md:grid-cols-2 lg:grid-cols-3","children":[["$","article","region_specific_threat_alerts_description",{"className":"relative z-50 rounded-xl border p-8 text-white shadow-md border-green-500 bg-green-900/30","children":[["$","div",null,{"className":"shadow- absolute right-6 top-6 mx-auto flex w-fit items-center justify-center gap-1 rounded-lg border border-green-500 bg-green-900/50 py-1 pl-4 pr-3 shadow-lg shadow-green-500/25","children":[["$","p",null,{"className":"text-sm","children":"Done"}],["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-check size-4 text-green-500","children":[["$","path","1gmf2c",{"d":"M20 6 9 17l-5-5"}],"$undefined"]}]]}],false,["$","header",null,{"className":"mb-2","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-alert-circle mb-4 size-8","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","line","1pkeuh",{"x1":"12","x2":"12","y1":"8","y2":"12"}],["$","line","4dfq90",{"x1":"12","x2":"12.01","y1":"16","y2":"16"}],"$undefined"]}],["$","h2",null,{"className":"mr-2 text-balance text-2xl font-medium","children":"Regional threat alerts"}]]}],["$","p",null,{"className":"leading-normal text-neutral-400 md:min-h-[10ex]","children":"Stay informed about current vishing (fraudulent phone calls) and smishing (fraudulent SMS) campaigns in your country."}]]}]]}]]}],["$","div",null,{"className":"relative z-20 mx-auto mb-24 max-w-screen-xl","children":[["$","h2",null,{"className":"mb-2 text-center font-mono text-4xl font-medium md:ml-8 md:text-left lg:text-5xl","children":"Q1 2024"}],["$","p",null,{"className":"mb-4 text-center text-neutral-400 md:ml-8 md:text-left lg:text-left","children":"January, February, and March"}],["$","hr",null,{"className":"mb-8 border-neutral-700"}],["$","div",null,{"className":"grid gap-4 md:grid-cols-2 lg:grid-cols-3","children":[["$","article","multilingual_support_description",{"className":"relative z-50 rounded-xl border p-8 text-white shadow-md border-green-500 bg-green-900/30","children":[["$","div",null,{"className":"shadow- absolute right-6 top-6 mx-auto flex w-fit items-center justify-center gap-1 rounded-lg border border-green-500 bg-green-900/50 py-1 pl-4 pr-3 shadow-lg shadow-green-500/25","children":[["$","p",null,{"className":"text-sm","children":"Done"}],["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-check size-4 text-green-500","children":[["$","path","1gmf2c",{"d":"M20 6 9 17l-5-5"}],"$undefined"]}]]}],false,["$","header",null,{"className":"mb-2","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-globe mb-4 size-8","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","13o1zl",{"d":"M12 2a14.5 14.5 0 0 0 0 20 14.5 14.5 0 0 0 0-20"}],["$","path","9i4pu4",{"d":"M2 12h20"}],"$undefined"]}],["$","h2",null,{"className":"mr-2 text-balance text-2xl font-medium","children":"Multilingual Support"}]]}],["$","p",null,{"className":"leading-normal text-neutral-400 md:min-h-[10ex]","children":"Adding support for German and Czech languages to make using our app easier for native speakers from the Czech Republic and German-speaking countries."}]]}],["$","article","safe_surfing_description",{"className":"relative z-50 rounded-xl border p-8 text-white shadow-md border-green-500 bg-green-900/30","children":[["$","div",null,{"className":"shadow- absolute right-6 top-6 mx-auto flex w-fit items-center justify-center gap-1 rounded-lg border border-green-500 bg-green-900/50 py-1 pl-4 pr-3 shadow-lg shadow-green-500/25","children":[["$","p",null,{"className":"text-sm","children":"Done"}],["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-check size-4 text-green-500","children":[["$","path","1gmf2c",{"d":"M20 6 9 17l-5-5"}],"$undefined"]}]]}],false,["$","header",null,{"className":"mb-2","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield-check mb-4 size-8","children":[["$","path","1irkt0",{"d":"M12 22s8-4 8-10V5l-8-3-8 3v7c0 6 8 10 8 10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","h2",null,{"className":"mr-2 text-balance text-2xl font-medium","children":"Safe Surfing"}]]}],["$","p",null,{"className":"leading-normal text-neutral-400 md:min-h-[10ex]","children":"Robust online protection with network filtering enabled, blocking phishing, tracking, spam, or advertising servers using DNS-over-VPN technology."}]]}]]}]]}]]]}],["$","section",null,{"id":"$undefined","className":"relative mx-auto overflow-x-clip bg-black px-4 py-16 sm:px-8 lg:py-24","children":"$undefined"}]] 8:[["$","meta","0",{"name":"viewport","content":"width=device-width, initial-scale=1"}],["$","meta","1",{"name":"theme-color","content":"#121212"}],["$","meta","2",{"charSet":"utf-8"}],["$","title","3",{"children":"Roadmap | Redamp.io"}],["$","meta","4",{"name":"description","content":"Intuitive protection for computers, mobile devices, networks, and the cloud. We ensure the security of your devices, protect your data and privacy, and strengthen your network protection. Easily set up everything in 15 minutes – transparently, without hidden fees, without cybersecurity specialists."}],["$","link","5",{"rel":"manifest","href":"/manifest.webmanifest","crossOrigin":"use-credentials"}],["$","meta","6",{"property":"og:title","content":"Roadmap | Redamp.io"}],["$","meta","7",{"property":"og:description","content":"Intuitive protection for computers, mobile devices, networks, and the cloud. We ensure the security of your devices, protect your data and privacy, and strengthen your network protection. Easily set up everything in 15 minutes – transparently, without hidden fees, without cybersecurity specialists."}],["$","meta","8",{"property":"og:url","content":"https://www.redamp.io/en/roadmap/"}],["$","meta","9",{"property":"og:site_name","content":"Redamp.io"}],["$","meta","10",{"property":"og:locale","content":"en_US"}],["$","meta","11",{"property":"og:image:type","content":"image/jpeg"}],["$","meta","12",{"property":"og:image","content":"https://www.redamp.io/images/opengraph-image.jpg"}],["$","meta","13",{"property":"og:image:width","content":"2560"}],["$","meta","14",{"property":"og:image:height","content":"1280"}],["$","meta","15",{"property":"og:type","content":"website"}],["$","meta","16",{"name":"twitter:card","content":"summary_large_image"}],["$","meta","17",{"name":"twitter:title","content":"Roadmap | Redamp.io"}],["$","meta","18",{"name":"twitter:description","content":"Intuitive protection for computers, mobile devices, networks, and the cloud. We ensure the security of your devices, protect your data and privacy, and strengthen your network protection. Easily set up everything in 15 minutes – transparently, without hidden fees, without cybersecurity specialists."}],["$","meta","19",{"name":"twitter:image:type","content":"image/jpeg"}],["$","meta","20",{"name":"twitter:image","content":"https://www.redamp.io/images/opengraph-image.jpg"}],["$","meta","21",{"name":"twitter:image:width","content":"2560"}],["$","meta","22",{"name":"twitter:image:height","content":"1280"}],["$","link","23",{"rel":"icon","href":"/favicon.ico","type":"image/x-icon","sizes":"48x48"}],["$","link","24",{"rel":"icon","href":"/icon.svg?3ff2567279b7f630","type":"image/svg+xml","sizes":"any"}],["$","link","25",{"rel":"icon","href":"/icon1.png?434a0c7a315e806a","type":"image/png","sizes":"16x16"}],["$","link","26",{"rel":"icon","href":"/icon2.png?c7b60e55b47d3bc7","type":"image/png","sizes":"32x32"}],["$","link","27",{"rel":"icon","href":"/icon3.png?034b27deee75db68","type":"image/png","sizes":"192x192"}],["$","link","28",{"rel":"icon","href":"/icon4.png?98f9896a28d86d46","type":"image/png","sizes":"512x512"}],["$","link","29",{"rel":"apple-touch-icon","href":"/apple-icon.png?2ab5fbffcde1f59f","type":"image/png","sizes":"180x180"}],["$","meta","30",{"name":"next-size-adjust"}]] 1:null 17:I[8584,["413","static/chunks/413-c5012b4a9dd73ea1.js","980","static/chunks/980-ec60b031432d3fb6.js","61","static/chunks/app/%5Blocale%5D/page-4e37704420a907f2.js"],"default"] e:["$","$L17",null,{"locale":"en","localePrefixMode":"always","prefix":"/en","scroll":true,"href":"/","className":"link-hover link text-neutral-400","children":"Redamp.io"}] f:["$","$L17",null,{"locale":"en","localePrefixMode":"always","prefix":"/en","scroll":true,"href":"https://kb.redamp.io","className":"link-hover link flex items-center justify-center gap-1 text-neutral-400","target":"_blank","children":["Knowledge base",["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-external-link size-4","children":[["$","path","1q9fwt",{"d":"M15 3h6v6"}],["$","path","gplh6r",{"d":"M10 14 21 3"}],["$","path","a6xqqp",{"d":"M18 13v6a2 2 0 0 1-2 2H5a2 2 0 0 1-2-2V8a2 2 0 0 1 2-2h6"}],"$undefined"]}]]}] 10:["$","$L17",null,{"locale":"en","localePrefixMode":"always","prefix":"/en","scroll":true,"href":"/privacy-policy","className":"link-hover link text-neutral-400","children":"Privacy Policy"}] 11:["$","$L17",null,{"locale":"en","localePrefixMode":"always","prefix":"/en","scroll":true,"href":"/about#our-values","className":"link-hover link text-neutral-400","children":"Our journey & values"}] 12:["$","$L17",null,{"locale":"en","localePrefixMode":"always","prefix":"/en","scroll":true,"href":"/about#REDAMP-history","className":"link-hover link text-neutral-400","children":"REDAMP history"}] 13:["$","$L17",null,{"locale":"en","localePrefixMode":"always","prefix":"/en","scroll":true,"href":"/projects","className":"link-hover link text-neutral-400","children":"Projects"}]