{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/u2fC4jr56kqvD6jthxXt/I8cjtjGYfX1MiGSSNIVM/wJ3TlvPEF-2.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import*as i from\"react\";export const richText=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Streamlining Security Operations with Advanced Log Management\"}),/*#__PURE__*/e(\"p\",{children:\"For a company like Snyk, committed to developing fast and staying secure, achieving comprehensive visibility across its infrastructure is paramount. One of Snyk's primary challenges was maintaining complete coverage across its expanding security stack. Panther's flexible ingestion capabilities allowed the team to quickly onboard new log sources.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"\\\"My favorite part about Panther is how fast you can onboard any log source. Even if there's no native integration, I can throw the logs in an S3 bucket, and it will create a schema or parser for them, which is amazing. It takes a few hours, and you have a log source onboarded, in the traditional SIEM world, it would take weeks or months.\u201D \"}),/*#__PURE__*/e(\"p\",{children:\"Filip Stojkovski, Staff Security Engineer\"})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"The Panther team helped to successfully implement custom integrations, including CircleCI logs, a common platform in security stacks that doesn\u2019t enable easy audit log exports. This capability proved essential for maintaining comprehensive security coverage as their infrastructure evolves.\"}),/*#__PURE__*/e(\"h3\",{children:\"Intelligent Alerting and Noise Reduction\"}),/*#__PURE__*/e(\"p\",{children:\"The Snyk team identified alert fatigue as a critical challenge for their security operations. They needed a strategic approach to separate signal from noise without compromising detection coverage. Using Panther's advanced filtering and detection engineering capabilities, Snykembarked on a comprehensive alert optimization project to transform their operations.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:'\"Managing all the detections and alert triage was one of the first projects I did with Panther. We had too many detections and too many alerts. We needed to figure out which alerts were actionable, so we went through them, applying the correct filters to trigger only on specific patterns. By figuring out the baseline of what\\'s normal versus abnormal behavior, we reduced our alert volume by around 70%.\" '}),/*#__PURE__*/e(\"p\",{children:\"Filip Stojkovski, Staff Security Engineer\"})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"The team leveraged Panther's correlation capabilities to chain multiple events, creating more sophisticated detection mechanisms that reduced false positives while maintaining high-fidelity threat detection. This approach proved particularly effective for identifying potentially malicious activities across their cloud infrastructure.\"}),/*#__PURE__*/e(\"h3\",{children:\"Enhanced Protection Through Custom Detection Engineering\"}),/*#__PURE__*/e(\"p\",{children:\"Snyk's security team established a comprehensive framework for detection engineering, ensuring thorough protection of their crown jewels and critical assets. Their approach includes:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Verification of sufficient logging coverage for critical assets\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Development of meaningful, actionable detections\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Creation of detailed runbooks for investigation procedures\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Implementation of automation for enrichment and response\"})})]}),/*#__PURE__*/e(\"p\",{children:\"The security team's technical expertise and Panther's Python-based detection capabilities enabled them to build sophisticated detection mechanisms tailored to their specific needs. This approach allows them to maintain high-security standards while efficiently managing resources within a smaller team.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:'\"With the integration of Python, I could build detections from day one. The huge repository of pre-built detections Panther has is quite helpful.\" '}),/*#__PURE__*/e(\"p\",{children:\"Filip Stojkovski, Staff Security Engineer\"})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"As Snyk continues to grow and evolve, Panther's scalability and flexibility ensure their security operations can adapt and expand accordingly, maintaining comprehensive coverage while keeping operational overhead minimal.\"})]});export const richText1=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Achieving and maintaining comprehensive (up to 100%) coverage of their infrastructure and security stack logs\"})});export const richText2=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Battling excessive noise from high alert volumes, leading to reduced team efficiency\"})});export const richText3=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Maintaining protection of critical assets and crown jewels\"})});export const richText4=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Implemented rapid log source onboarding with flexible data ingestion capabilities\"})});export const richText5=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Deployed correlation rules and intelligent filtering to reduce alert noise\"})});export const richText6=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Established a comprehensive monitoring framework with custom detection engineering\"})});export const richText7=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Achieved rapid ongoing integration of new log sources within hours instead of weeks and is positioned to scale for continuing support\"})});export const richText8=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Reduced alert volume by 70% through intelligent tuning and correlation\"})});export const richText9=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Enhanced and maintained protection of critical assets with customized Python-based detections\"})});export const richText10=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Securing their Cloud\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The team migrated its hosting to AWS and, as a result, took greater responsibility for its security. Migrating to AWS necessitated a flexible security tool that matched their scale and budget needs and integrated quickly with AWS. Panther, a cloud-native solution built entirely on AWS, allowed them to centralize security operations in one platform and manage their production environment with complete visibility. Panther\u2019s scalable and flexible Lambda-based architecture simplified data onboarding with OOTB integrations for AWS services.\"}),/*#__PURE__*/e(\"p\",{children:\"Migrating hosting to AWS and deploying Panther empowered Spring Health to take ownership of its security posture without overextending their budget. The ability to quickly ingest and analyze logs from any source means the team can quickly adapt to changing needs.\\xa0\"}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/t(\"p\",{children:[\"\u201CWe've brought so much more security data into Panther than we were able to on the previous platform. \",/*#__PURE__*/e(\"strong\",{children:\"Now, we feel like we have the freedom to throw literally anything we want into Panther \"}),\"and be confident that it is searchable and usable and that we'll be able to parse it correctly. That was another challenge with the previous platform. If the logs were not automatically parsed, doing a custom parser was incredibly difficult. We had to hunt down somebody from engineering who knew how to write a schema because their support team would not even help us.\u201D Cory Roop, Senior Manager of Security\\xa0\"]})}),/*#__PURE__*/e(\"h3\",{children:\"Accelerating Investigations\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Spring Health, the leading global mental health solution for employers and health plans, needed to find a new security solution. Their prior tool lacked extended data retention, which meant the security team depended on native logs outside their tools for investigations. This created investigation inefficiencies, often requiring hours of manual effort to piece together data from multiple log sources. The engineering team frequently flagged potential security issues, letting the security team know rather than vice versa.\"}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/e(\"p\",{children:\"\u201CThere are certain event types that require us to query three or four services to investigate, and it was very cumbersome. It used to take a couple of hours to verify an activity, but now it only takes a few minutes in Panther.\u201D Cory Roop, Senior Manager of Security\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"With Panther, Spring Health adopted a data-lake-backed SIEM with 12 months of included hot storage. This extended retention eliminated blind spots and sped up investigations. While the prior solution used a limited query language for searches, Panther\u2019s intuitive interface enabled the team to search their logs without requiring advanced SQL skills.\"}),/*#__PURE__*/e(\"p\",{children:\"Armed with all their data in easy-to-access storage, Spring Health significantly reduced their mean time to resolution (MTTR). What previously took hours to investigate now takes only minutes. For example, correlating activity across Okta, AWS CloudTrail, and CloudWatch logs\u2014once a painstaking process\u2014is now seamless.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Monitoring in Real-Time\"}),/*#__PURE__*/e(\"p\",{children:\"Their previous solution lacked OOTB detection capabilities and used limiting scheduled query monitoring. These types of SIEM obstacles can increase the mean time to detection (MTTD) and create reactive instead of proactive security workflows.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Using Panther\u2019s real-time monitoring capabilities and leveraging flexible Python detections enabled the Spring Health team to up-level their threat monitoring. Panther\u2019s detection-as-code model allowed the team to automate testing, validation, and deployment of detections. This flexibility enabled them to create custom rules tailored to their business needs, like identifying record access anomalies or monitoring WAF rate-limiting events.\"}),/*#__PURE__*/e(\"p\",{children:\"Having access to real-time insights transformed Spring Health\u2019s approach to threat detection. The team now identifies threats before the engineering team notices anomalies, flipping the narrative from reactive to proactive. The ability to quickly tune and refine detections has also reduced false positive rates and improved the team\u2019s confidence in their alerts.\"}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/e(\"p\",{children:\"\u201CWe've been able to write detections that fit business use cases that would not be available out of the box with any platform in a reasonably short amount of time.\u201D Cory Roop, Senior Manager of Security\\xa0\"})})]});export const richText11=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Migrating hosting to AWS, creating a need for more security visibility\"})});export const richText12=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Facing lengthy and manual investigations with inconsistent data retention in the prior security tool\\xa0\"})});export const richText13=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Experiencing slow detection times with the prior tool\u2019s limited query language and lack of real-time monitoring\\xa0\"})});export const richText14=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Implemented Panther - an AWS-native security solution to secure their production environment\"})});export const richText15=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Leveraged 12 months of data retention and faster query speeds in Panther\u2019s data-lake-backed solution\"})});export const richText16=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Implemented real-time threat monitoring with OOTB rules and custom Python detections\\xa0\"})});export const richText17=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Ownership of their production security at a predictable cost for high-volume cloud logs\"})});export const richText18=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Significantly faster investigations and a reduction in MTTR\\xa0\"})});export const richText19=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Improvement in MTTD - proactive alerting to engineering\\xa0\"})});export const richText20=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"Panther is an adaptive SIEM. It\u2019s not like other solutions, where you dump logs in, and they just sit there forever. With Panther, we get to adapt based on what we see in the logs. We get to derive more information from Panther that helps us adapt our detections to be more effective.\"}),/*#__PURE__*/e(\"p\",{children:\"Donald Scherer, Director of Security\"})]}),/*#__PURE__*/e(\"h3\",{children:\"Budget-Friendly Data Ingestion\"}),/*#__PURE__*/e(\"p\",{children:\"Tealium, a leader in data orchestration, faced challenges with its previous SIEM solution.\\xa0 The prior tool had limitations to its ingestion and analysis features. This led to the security team lacking complete visibility into Tealium's environment, creating potential blind spots that could leave them vulnerable to undetected threats.\"}),/*#__PURE__*/e(\"p\",{children:\"One of the reasons Tealium selected Panther was its auto-scaling and cost-effective data ingestion. With Panther\u2019s scalable architecture, Tealium could bring more logs into its SIEM environment without an excessive price increase.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"By switching to Panther, Tealium achieved a 9x increase in data ingestion, gaining broader visibility into its threat landscape. This significant increase in coverage allowed the security team to analyze and respond to a far more comprehensive range of security events than was possible previously. The increase in data ingestion strengthened Tealium\u2019s security posture and allowed the team to proactively make data-driven decisions to protect their environment.\"}),/*#__PURE__*/e(\"h3\",{children:\"Shifting From Rearview to Real-Time\"}),/*#__PURE__*/e(\"p\",{children:\"Before migrating to Panther, Tealium\u2019s prior solution relied on a system that ran scheduled queries instead of real-time analysis, delaying threat detection. These delayed detections created a \u201Crearview\u201D approach to security, making the security team reactive rather than proactive. This could have left Tealium potentially exposed to undetected, time-sensitive incidents.\"}),/*#__PURE__*/e(\"p\",{children:\"Panther\u2019s real-time detection capabilities enable Tealium to implement dynamic, immediate alerting. With rules and logic running in real-time, they can detect potential threats as they occur rather than after the fact. This change allows the team to apply real-time detection rules to analyze incoming data for potential security threats like breaches, failed logins, or anomalous user behavior.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The shift to real-time detection reduced false positive alerts by up to 70%. This reduction allows the team to focus on meaningful alerts without spending hours filtering out noise, decreasing alert fatigue and enabling them to prioritize and address critical security concerns faster and more effectively.\"}),/*#__PURE__*/e(\"p\",{children:\"Unlocking the Ability to Identify Targeted \u201CNeedle in a Haystack\u201D Events\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"As soon as we were on the platform and able to start writing in code that we were familiar with, it was easy to start customizing detections. There are a lot of great examples already written in the documentation, and that jumpstarted us. With the included detections, we were 80% of the way there. Then all we needed to do was apply what we knew about what we are looking for.\"}),/*#__PURE__*/e(\"p\",{children:\"Jason, Security Engineer\"})]}),/*#__PURE__*/e(\"p\",{children:\"Tealium\u2019s previous security tool lacked the precision and customization capabilities to identify particular \u201Cneedle-in-the-haystack\u201D events\u2014rare yet critical security signals hidden within a high volume of other data. For example, Tealium wanted to identify unusual login attempts on their IDP system that originated from unfamiliar IPs. Advanced detections like this were difficult or impossible to run on the previous platform, limiting the team\u2019s ability to detect specific targeted threats.\"}),/*#__PURE__*/e(\"p\",{children:\"Panther provides Tealium with correlation capabilities, allowing the team to create custom detections tailored to their unique needs. This flexibility empowers Tealium to design detection logic specific to their security environment, including monitoring unique events like failed logins from unusual locations and role-switching behaviors across cloud accounts. The correlation capabilities allow them to build complex, multi-layered detections to pinpoint risky activities otherwise lost within the more extensive data set. With Panther, Tealium\u2019s security team can deploy highly tuned detections to pick up on targeted events that their previous solution would have missed.\"}),/*#__PURE__*/e(\"h3\",{children:\"Moving Forward with Panther\"}),/*#__PURE__*/e(\"p\",{children:\"By migrating away from an inflexible and high-cost solution, Tealium\u2019s security team can now confidently and proactively protect its environment. With real-time detection and advanced correlation capabilities, the team has transformed its approach, monitoring more of its security data, gaining invaluable insights into potential threats, and addressing them before they escalate.\"})]});export const richText21=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"The previous solution\u2019s high costs capped data ingestion and limited visibility into security logs, creating blind spots to undetected threats\"})});export const richText22=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Only having access to scheduled queries put everything in their rearview and slowed down MTTD\"})});export const richText23=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"A lack of flexible detection logic and correlations in their prior solution made finding their targeted \u201Cneedles in the haystack\u201D difficult\"})});export const richText24=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Auto-scaling, cost-effective data ingestion\"})});export const richText25=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Real-time detection rules\"})});export const richText26=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Python-based detections with built-in correlation capabilities\"})});export const richText27=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Increased data ingested by 9X, expanding visibility into the environment\"})});export const richText28=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Reduced false positive alert volume in some severity classifications by as much as 70%\"})});export const richText29=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Deployed highly targeted, customized detections that monitor for niche but significant events, like a failed login on an IDP system that is also from an unknown IP vs. a prolific IP\"})});export const richText30=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"Panther hits that sweet spot of being a tool and having all these useful features, but it\u2019s also a framework. It\u2019s the framework piece that gets underserved by every other tool I have tried, and that\u2019s what makes it genuinely different.\"}),/*#__PURE__*/e(\"p\",{children:\"Jeremy Mill, Varo\u2019s Senior Manager of Security Engineering\"})]}),/*#__PURE__*/e(\"h3\",{children:\"Outdated Existing Tech Stack Couldn\u2019t Deliver\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The Varo security team needed help with their existing security tech: an ELK stack that took up too much time from the team without high-quality alert output. It demanded considerable overhead maintenance, and as an outdated solution, it lacked the comprehensive functionality of a proper SIEM platform, leading to a lot of manual effort. This led to their hunt for a modern SIEM to deploy that could reduce the burden of ongoing maintenance and liberate valuable security engineering time to focus on threat detection and response.\\xa0\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"I want to focus on what we do, and we secure the bank. We don\u2019t run or manage the SIEM, so if we can have somebody else run the SIEM and focus on that for us, then that is the right decision every time.\"}),/*#__PURE__*/e(\"p\",{children:\"Jeremy Mill, Varo\u2019s Senior Manager of Security Engineering\"})]}),/*#__PURE__*/e(\"p\",{children:\"During a comprehensive SIEM search, Varo reviewed their existing tech stack against offerings like Panther and Datadog. The Varo team found that Datadog couldn\u2019t meet their needs for flexible data ingestion or their budget, and lacked core SIEM functionality. They ultimately opted to purchase and deploy Panther as their modern SIEM solution.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther\u2019s SaaS deployment requiring no overhead maintenance, Varo's security team could redirect their focus towards more critical tasks, particularly detection and response activities. By opting for a managed SIEM and freeing up engineering resources, Varo could better allocate their talents and expertise toward safeguarding their systems and data.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Evolving to Everything-as-Code\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Jeremy Mill, Varo\u2019s Director of Security Engineering, wanted to transition as much as possible towards an infrastructure-as-code approach. In his search for a new security solution, he knew that everything-as-code was a priority and found alignment between his vision for his team and Panther\u2019s Detection-as-Code based solution.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Their existing solution didn\u2019t deliver the level of flexibility they needed in a SIEM. The built-in alerting functionality was limited and lacked key features like dynamic alert severities, detection enrichment, and alert management. By choosing to adopt a Detection-as-Code approach with their SIEM solution, the Varo team has been able to drastically improve their security operations.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The team leverages many out-of-the-box Panther detections tuned with Python code edits or rule filters to customize their detection engine to their security environment\u2019s needs. They also heavily use Panther\u2019s enrichment features, delivering key context to alerts for speedier response times. Through detection tuning and enrichment, they\u2019ve improved their false-positive alert rate and enabled security team members to focus their efforts on high-value signals and avoid burnout.\\xa0\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"Work-life balance and avoiding burnout is really, really important to me. That way when something real does happen, our team can prioritize it. Every alert should have an action, and if that action is a false-positive assessment, then we can tune it immediately. Otherwise, we would have a lot of fatigue.\"}),/*#__PURE__*/e(\"p\",{children:\"Jeremy Mill, Varo\u2019s Senior Manager of Security Engineering\"})]}),/*#__PURE__*/e(\"h3\",{children:\"Centralizing Data and Alert Management\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"One of the driving forces for finding a new security solution was to improve the visibility and consolidation of Varo\u2019s security data into one platform. It was important for the team to find a solution that delivered easy data ingestion and centralized alerting into one platform. Panther\u2019s native capabilities to ingest high-priority log sources like Okta, GSuite, and AWS enabled Varo to quickly onboard their critical data and leverage out-of-the-box detections for immediate value.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"In addition to using Panther\u2019s native integrations for log ingestion, Varo also uses Panther\u2019s flexible capabilities for ingesting custom data sources.\\xa0\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"We have one job that takes in a very legacy data source and we can fire that off to our Panther webhook within the JSON schema we have defined and now it\u2019s in Panther and it\u2019s searchable. Doing that in other security tools would be a nightmare and in Panther, it isn\u2019t.\"}),/*#__PURE__*/e(\"p\",{children:\"Jeremy Mill, Varo\u2019s Senior Manager of Security Engineering\"})]}),/*#__PURE__*/e(\"p\",{children:\"By consolidating their key log sources, Varo gained comprehensive insight into their security landscape, allowing for more effective monitoring and threat detection across their cloud-native operations. This centralized approach streamlined their security operations and gave the security team a holistic view of potential threats and vulnerabilities. As a result, Varo bolstered its security posture, enhancing its ability to identify and respond to possible security incidents proactively. Adopting a unified platform for security data and alert management not only strengthened Varo's defenses against cyber threats but also increased operational efficiency by simplifying the management of their security infrastructure.\\xa0\"})]});export const richText31=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Existing security solutions required time-intensive overhead maintenance and lacked comprehensive SIEM functionality\"})});export const richText32=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Desire to migrate to infrastructure as code approach with flexibility baked in, like dynamic alerting, enrichment, and enhanced search capabilities \"})});export const richText33=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Urgent need to fortify security infrastructure, specifically cloud-native operations\"})});export const richText34=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Deployed a fully managed SaaS solution requiring no engineering hours to maintain\"})});export const richText35=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Adopted a Detection-as-Code approach to their security workflows\"})});export const richText36=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Onboarded critical log sources like Okta, GSuite, and AWS to their new SIEM\"})});export const richText37=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Freed up security engineering time to focus on detection and response instead of maintaining the SIEM solution\"})});export const richText38=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Increased threat detection efficiency and agility in responding to threats\"})});export const richText39=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Centralized security data visibility and alert management in one platform for improved security posture\"})});export const richText40=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Wolt, a subsidiary of DoorDash, is a fast-growing Finnish technology company best known for its local commerce platform. Their security team was using a SIEM solution that didn\u2019t offer as much flexibility as they needed, especially regarding their data ingestion, detection deployment, and alert management workflows. Driven by the desire to move to an \u201Ceverything-as-code\u201D approach, the security team chose Panther as their new security solution.\\xa0\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"With Panther there is a certain kind of transparency in having everything as code. There\u2019s no smoke screen or hall of mirrors thing going on where something is happening behind the scenes and you have no idea what it is. It is all extremely clear and well documented. There is this fuzziness when it comes to many, many security tools, and when it comes to Panther I have been happy to find none of that.\"}),/*#__PURE__*/e(\"p\",{children:\"Anssi Matti HeliN, Wolt Security Operations Lead\"})]}),/*#__PURE__*/e(\"h3\",{children:\"Wolt\u2019s Preference for Everything-as-Code\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The primary motivation to adopt detection-as-code was the team\u2019s desire to integrate security operations seamlessly into their existing development workflows. By shifting to detection-as-code, Wolt could leverage the same development practices and tools their engineering teams were already familiar with. This approach enables consistent version control, automated testing, and streamlined collaboration among security and development teams.\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"Making changes with the integrated testing in Panther Analysis Tool makes it possible to be much more fearless with the changes. I don\u2019t need to wonder if this will break something, because I know if it will break something before I even deploy it.\"}),/*#__PURE__*/e(\"p\",{children:\"Anssi Matti HeliN, Wolt Security Operations Lead\"})]}),/*#__PURE__*/e(\"p\",{children:\"Wolt implemented detection-as-code using Panther\u2019s integration with version control systems like Git, allowing security engineers to write, test, and review detection rules like any other piece of code. Code reviews and pull requests ensured security rules were thoroughly vetted, improving their quality and accuracy. The Wolt security team uses continuous integration and continuous deployment (CI/CD) pipelines to automatically test and deploy their detections. This automation reduces the manual effort required for managing detections and ensures that changes are deployed rapidly and reliably.\"}),/*#__PURE__*/e(\"p\",{children:\"Python-based detection-as-code has enabled the Wolt team to both tune out-of-the-box detections and create their own. They created one global filter function and an import function to easily tune their Okta detections and customize the existing rule set to better suit their needs, an experience Anssi Matti described as \u201Cdead simple and very straightforward.\u201D\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Integrating security directly into the development lifecycle, coupled with the automation and collaboration benefits, resulted in an overall more robust and agile security posture, positioning Wolt to better protect its customers and assets.\"}),/*#__PURE__*/e(\"h3\",{children:\"Flexible, Managed Data Pipelines\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Wolt\u2019s security team faced the common challenge of effectively managing and analyzing vast amounts of data generated by their growing infrastructure. Legacy SIEMs, like the one they were using, task the end users with managing their data pipelines and integrations themselves. When the integrations broke, and they sometimes did, their team had to spend engineering hours resolving those issues. Recognizing these limitations, Wolt sought a solution that could scale their growth and would not require engineering hours to manage.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Panther\u2019s flexible and scalable cloud-based architecture lets Wolt easily ingest its critical data sources. With native out-of-the-box integrations and support for data transports like S3, Wolt\u2019s engineers no longer need to dedicate time to managing their data pipelines. They could easily start ingesting crucial security logs, like GitHub, AWS, and MongoDB Atlas. For especially high-volume log sources, they employ Panther\u2019s out-of-the-box filtering capabilities to ensure they only ingest their security-relevant data.\\xa0\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"We really value the ease of onboarding our very diverse set of services that we use. External services, hosted services, managed services, all of them. And having all of those logs in the same place with the unified detection model and the unified fields.\"}),/*#__PURE__*/e(\"p\",{children:\"Anssi Matti Helin, Wolt Security Operations Lead\"})]}),/*#__PURE__*/e(\"p\",{children:\"With a unified view of all their security logs, Wolt\u2019s security team could detect and respond to threats more quickly and accurately. The real-time ingestion and analysis capabilities allow for the immediate identification of suspicious activities. The increased visibility also gave the security team a holistic view of their environment, leading to more informed decision-making and strategic planning.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Improved Alert Response & Investigation Workflows\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The Wolt security team needed a solution to streamline alert management and provide comprehensive tools for efficient investigations. With their previous solution, alert investigation and remediation were more manual efforts. They implemented Panther\u2019s Slack bot to act on and resolve alerts more seamlessly. The boomerang feature lets users prompt other Slack users for information about an alert, like confirmation about activity involving their account. Using the Slack bot means that the security team doesn\u2019t need to open the Panther console to resolve an alert, and supports quick remediation even when collaborating with less technical team members.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"While a technical team like Wolt could build their own Slack bot, Anssi Matti, the Security Operations Lead, is glad that they don\u2019t have to spend their dedicated security resources creating and maintaining something themselves.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Because Panther normalizes data upon ingestion and employs a unified data model, queries in Panther\u2019s data lake backend are fast. During an investigation for an example like a potential insider threat, the unified data model makes it simple to search for a user\u2019s identifier, like an email address across all of their logs at once.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The data lake\u2019s support for complex searches and correlations across their ingested data enables Wolt to uncover hidden threats and anomalies that might have been missed with less sophisticated tools. This deeper visibility provides insights into potential vulnerabilities and attack vectors, allowing for proactive threat mitigation.\"})]});export const richText41=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Inflexible detections from the existing solution\u2019s rigid logic lead to challenges with scale and performance\"})});export const richText42=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Significant maintenance overhead with engineering addressing failed pipeline integrations, resulting in limited visibility\"})});export const richText43=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Disjointed remediation workflows from manual, one-way alert integrations \"})});export const richText44=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Adopted an everything-as-code approach to their detection and response process \"})});export const richText45=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Streamlined data onboarding with Panther\u2019s support for data transports like S3 and robust native integrations\"})});export const richText46=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Started managing alerts more effectively with the Panther Slack Bot\"})});export const richText47=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"High efficacy, rigorously tested detections deployed with version control for improved collaboration and threat detection\"})});export const richText48=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Consistent visibility into the security ecosystem and less overhead maintenance spent managing data pipeline configurations \"})});export const richText49=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Smoother, faster alert remediation with the boomerang alert management feature, especially when collaborating with less technical users \"})});export const richText50=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Eric Jolly, GoFundMe\u2019s Security Operations Lead, knew that it was time for a new solution. Relying on previous tools in their stack, the team was facing visibility limitations and challenges including defining custom detections and creating new alerts. Eric heard about Panther from another engineer on the team and he was immediately drawn in by the out-of-the-box value Panther delivered with pre-written detections, easy data onboarding, and powerful data lake search features.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Illuminating GoFundMe\u2019s Security Environment\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Working with a decentralized security event management solution had previously led to fragmented data sets that created difficulty in detecting and responding to threats. Eric felt like their current solution was more of an infrastructure tool than a security tool and that it was missing key security workflows they needed to better monitor their logs and action alerts. The first priority with a new solution was to immediately improve their visibility into their infrastructure and security event logs.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"By onboarding their key data sources into Panther, GoFundMe quickly improved its security posture by gaining comprehensive visibility in one platform. Panther\u2019s native integrations with their key sources and budget friendly, ingestion-based pricing made it straightforward to start onboarding their most important event logs.\\xa0\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"There\u2019s already been multiple times where we've made use of logs that we would not have had access to if we did not move on to Panther and start onboarding all of these sources.\"}),/*#__PURE__*/e(\"p\",{children:\"Eric Jolly, Security Operations Lead\"})]}),/*#__PURE__*/e(\"h3\",{children:\"Enhancing Alert Workflows with Accountability and Efficiency\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"GoFundMe's previous alert workflow relied heavily on manual input with analysts having to manually run searches and investigate alerts. This approach made it challenging to effectively manage the growing number of security alerts.\\xa0 By implementing Panther, the team\u2019s alert workflows became more streamlined, enabling them to easily assign, track, and resolve incidents. The platform's alert queue and assignment features improved accountability and ensured that security incidents were addressed promptly.\"}),/*#__PURE__*/e(\"p\",{children:\"Leveraging Panther\u2019s comprehensive search features like the summary views delivered faster investigations when responding to alerts. Having all of their security events in a normalized data lake now means that they can more easily find the data they\u2019re looking for.\\xa0\\xa0\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"Search has been really useful for generating a set of data. When I have something in mind, I can build it easily and get something back pretty quickly when I\u2019m investigating an alert.\"}),/*#__PURE__*/e(\"p\",{children:\"Eric Jolly, Security Operations Lead\"})]}),/*#__PURE__*/e(\"p\",{children:\"GoFundMe's new, streamlined alert and incident response workflows improved the security team\u2019s operational efficiency and productivity. The platform's automated alert assignment and tracking features reduced manual effort and enabled the security team to prioritize and resolve incidents more efficiently.\"}),/*#__PURE__*/e(\"h3\",{children:\"Leveraging Advanced Detection Capabilities to Reduce False Positives\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"One of the main challenges GoFundMe was facing before deploying Panther was the limited detection capabilities of their existing tools. Their previous solution required them to build everything from scratch, resulting in a significant time investment. Panther's advanced detection capabilities, including both Python-based custom detections and out-of-the-box Detection Packs, helped GoFundMe to quickly improve their threat detection accuracy and reduce false positive alerts. For critical data sources, the Detection Packs were especially valuable in providing immediate threat coverage. Features like rule filters in Panther enable the team to easily tune and iterate on out-of-the-box detections, creating a cycle of continuous improvement.\\xa0\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"One of the big advantages with Panther is having a library of built in rules, and the fact that new ones are coming out pretty frequently. It takes that burden off of us to create our own. Whereas in our previous tools, that's entirely up to us to create those rules and those alerts, and that is a significant time requirement.\"}),/*#__PURE__*/e(\"p\",{children:\"Eric Jolly, Security Operations Lead\\xa0\"})]}),/*#__PURE__*/e(\"p\",{children:\"Using Panther's advanced detection capabilities and customization options, GoFundMe successfully reduced the number of false positive alerts in their queues. Leveraging the ability to apply no-code rule filters the security team can easily customize Panther\u2019s pre-written detections to meet their environment\u2019s unique needs and keep false positive alerts low. The GoFundMe team also makes heavy use of Enrichment, utilizing custom Lookup Tables to add key context to their detections, cutting down investigation times and false positive alerts even further.\\xa0\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"Panther has matured our workflows in a lot of ways. In terms of threat detection and alerting it\u2019s allowed us to standardize, and it\u2019s even helped with SOC2 in some ways. Panther has helped us in investigations that became incidents; it\u2019s a great tool for investigating those vulnerabilities. It\u2019s been beneficial to us in so many ways.\"}),/*#__PURE__*/e(\"p\",{children:\"Eric jolly , Security Operations Lead\"})]})]});export const richText51=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Lacking visibility into their key security logs like CloudTrail and GCP\"})});export const richText52=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Using decentralized alert workflows and manual processes\"})});export const richText53=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Relying on limited detection capabilities and challenges in rule customization\"})});export const richText54=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Ingesting all critical security event logs into Panther\"})});export const richText55=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Streamlining alert workflows with alert queues, statuses, and assignments\"})});export const richText56=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Tuning out-of-the-box detections with rule filters and Python edits\"})});export const richText57=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Centralized security event visibility that sped up investigations and response times\"})});export const richText58=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Enabling greater accountability in alert response workflows, driving up resolution rates\"})});export const richText59=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Reduced false positive alerts with improved alert accuracy and customized detections\"})});export const richText60=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Zapier\u2019s choice to deploy and implement Panther saves them an estimated $400,000 annually through offset tooling and incident response costs. Panther\u2019s out-of-the-box data integrations and detection rules, ease of ingestion and affordable pricing model, and customizable Python detections make it an ideal solution for modern security teams seeking streamlined cloud-based solutions with robust detection and response capabilities.\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"That old approach of having the entire team of entry-level people just triaging alerts all day doesn't really scale with the way that cloud environments work. You need to be more deliberate about how you approach detection engineering.\"}),/*#__PURE__*/e(\"p\",{children:\"Michael Kuchera, Zapier\u2019s Security Incident Response Leader\"})]}),/*#__PURE__*/e(\"p\",{children:\"Michael Kuchera, Zapier\u2019s Security Incident Response Leader, was brought in and tasked with building a new Detection and Response team. Their leadership team knew that it was time to take their security to the next level and find a solution that consolidated their security events into one system for centralized visibility and delivered flexibility to easily create custom detections to monitor for potential threats in their environment. Michael\u2019s search for a modern SIEM led him to Panther, where he found a solution that matched his team\u2019s needs. If Panther didn\u2019t exist, Michael admits that they likely would have needed to build something similar themselves since they couldn\u2019t find another solution offering the same level of customization at a scalable cost.\\xa0\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"Given that the security team in general was pretty small, there were a couple of key things that we needed that were non-negotiable. One was a hosted modern, scalable solution that didn't take somebody's full-time job administering. We also wanted something that made ingesting cloud logs easy. Panther is built as a cloud solution, so it came with that ease of use.\"}),/*#__PURE__*/e(\"p\",{children:\"Michael Kuchera, Zapier\u2019s Security Incident Response Leader\"})]}),/*#__PURE__*/e(\"h3\",{children:\"Centralizing Security Event Logging\\xa0\\xa0\\xa0\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"At the outset, Zapier\u2019s security logs were mixed in with a legacy infrastructure logging tool, making it challenging to gain a comprehensive view of the company's security posture. Given a combination of unsupported log sources and high costs to ingest, only about 20% of their security events were being logged into the existing tooling, leading to gaps in visibility and threat coverage. This lack of centralization also resulted in inefficiencies in incident detection and response, as the security team had to manually sift through disparate data sources to identify potential threats. As a result, Zapier recognized the need for a solution that could streamline event management and provide a unified platform for monitoring and responding to security incidents.\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, Zapier was able to easily centralize security event management and correlation. Panther\u2019s out of the box data ingestion integrations with commonly used SaaS products especially made onboarding their data simple for Zapier. Their first six critical data sources were onboarded on day two- in about half the time they estimate it would have taken on a legacy SIEM product.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's scalability and budget-friendly pricing ensure that Zapier can adapt to evolving security needs without experiencing performance bottlenecks. As the company expands its infrastructure and adds new services, Panther can seamlessly accommodate the increased workload and data volume without overhead maintenance or skyrocketing costs like legacy SIEMs often require. With Panther\u2019s ease of data ingestion and pricing model, they\u2019ve increased their visibility from 20% of their security logs to 70% with plans to achieve 100% in the near future.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Engineering First Detection & Response\"}),/*#__PURE__*/e(\"p\",{children:\"Zapier\u2019s existing security program was making use of a legacy infrastructure tool that wasn\u2019t suited to their security-specific use cases. They were limited to basic event threshold detections but knew that they needed a tool that supported advanced detection use cases to achieve comprehensive threat coverage across all of their log sources. Their prior tool didn\u2019t provide pre-written detection or enable effective custom detections, meaning they couldn\u2019t get alerts for known security concerns in their environment.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"While there are a number of SIEMs on the market that deliver advanced detection capabilities, Panther stood out for its use of Python-based detections. With Panther, Michael didn\u2019t need to limit his Detection & Response hiring to engineers with tool-specific knowledge already in place or invest heavily in education and onboarding with tool-specific training. Adopting Python-based detections allowed the security team to leverage their existing engineering skills to develop sophisticated detection rules.\"}),/*#__PURE__*/e(\"p\",{children:\"The Zapier security team creates new detection rules based on gap analyses across their environment. Utilizing a combination of Panther\u2019s out-of-the-box rules and their own custom detections, Zapier has achieved comprehensive threat coverage, improved response times, and reduced false positive alerts. The platform's advanced analysis capabilities allowed the security team to identify genuine security threats more accurately, minimizing the occurrence of false alarms.\"}),/*#__PURE__*/e(\"h3\",{children:\"Establishing a Detection & Response Team\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"To establish an effective Detection & Response team, Michael needed to find the right solution to centralize their security workflows. When Michael started his search for the right tool for their team, Panther stood out due to its modern, cloud-native architecture, ease of use, and its support for Python-based detection logic, aligning perfectly with the team's existing engineering skills.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The urgency to find a solution was driven especially by the lack of visibility and aggregation of security-related events, especially from critical sources like Okta, Google, Slack, and Zoom. The team was limited by this lack of employee data for their internal security. With the shift away from traditional in-office working environments and on-prem services, employee data like this is critical for security teams to monitor.\\xa0\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"Your identities and what your people do are how you interface with the world. And so you need to have your security perimeter at the identity level. And if you don't have visibility at your identity level, then you don't have basic security for a cloud setup.\"}),/*#__PURE__*/e(\"p\",{children:\"Michael Kuchera, Zapier\u2019s Security Incident Response Leader\"})]}),/*#__PURE__*/e(\"p\",{children:\"Their security team has successfully used Panther in proactive detection and incident response, like in instances where the platform helped catch potential threats like server-side request forgeries in AWS and analyze historical role assumptions from AWS admins.\"})]});export const richText61=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Lacking centralized security event logging, monitoring, and correlation\"})});export const richText62=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Missing capabilities for advanced detection creation and management\"})});export const richText63=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Building out a detection and Response team from the ground up\"})});export const richText64=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Centralizing security event visibility with out-of-the-box data ingestion and normalization\"})});export const richText65=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Embracing Python-based detections-as-code for rule creation and management\"})});export const richText66=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Deploying a scalable, cloud-based SIEM with no tool-specific coding knowledge required\"})});export const richText67=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Increased security log monitoring from 20% of security data to 70%\"})});export const richText68=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Reduced false positive alert rates and improved response times\"})});export const richText69=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Enabled and established an effective Detections & Response team\"})});export const richText70=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Benchling develops software that powers the biotechnology industry. The company has experienced rapid growth in the last several years. Given the critical nature of their industry, security is a top focus. During their search for a Detection Platform they needed to remain compliant and meet their customers' high security standards in addition to finding a tool that enables them to apply standard software engineering practices to their detection writing processes.\"}),/*#__PURE__*/e(\"p\",{children:\"Given their tech stack and customer requirements, Benchling was looking for a Detection Platform that would grant them total ownership of their data in their own environment and keep costs linear and predictable despite rapidly growing cloud infrastructure log volumes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Embracing Code-Driven SecOps\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"Our detection and response team cannot be responding to hundreds of alerts a day, there\u2019s just no possible way. So for that reason, we needed a detection engine that\u2019s reliable and unit-testable.\"}),/*#__PURE__*/e(\"p\",{children:\"Brian Maloney, Engineering Manager\"})]}),/*#__PURE__*/e(\"p\",{children:\"Benchling needed a robust Detection program that would scale alongside their growth. Benchling wanted to have a program in place, and found alignment with Panther\u2019s platform for code-driven security operations.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"In order to meet these goals, Benchling built a security team responsible for writing reliable detections, minimizing alert volumes, and ensuring the detection engine's consistency through unit testing. Panther\u2019s support for writing detections-as-code with CI/CD proved crucial for Benchling. The ability to use Python, write unit tests, and automate processes enhanced detection performance and reliability. Benchling\u2019s engineering first approach to security pairs perfectly with Panther\u2019s Code-Driven detection engine. Using CI/CD to deploy detections, the Benchling team is confident in both the efficacy of their rules to catch true positives while tuning out noisy false positives.\"}),/*#__PURE__*/e(\"h3\",{children:\"Crafting Complex Detection Logic in Python\"}),/*#__PURE__*/e(\"p\",{children:\"Benchling takes advantage of Panther to write powerful, environment-specific detections. Detections in Panther are written in Python - a highly expressable and widely adopted language. The combination of Python and the security data lake makes it easy to craft robust detections that call on efficiently stored and organized data. At Benchling, there was nuanced malicious behavior the team wanted to detect. The behavior had multiple indicators and required calculation and correlation across disparate variables to alert correctly. Using a combination of batch-styled SQL queries to build dynamic baselines for certain behaviors and Python to process results, Benchling was able to correlate data from multiple heterogeneous datasets to create a custom detection tailored for Benchling's specific use case.\"}),/*#__PURE__*/e(\"h3\",{children:\"Meeting Unique Data Needs\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"With Panther Cloud Connected, not only do we run Panther on our own AWS infrastructure, but we also run it on our own Snowflake, which allows us to continue to uphold the highest standards for our customers.\"}),/*#__PURE__*/e(\"p\",{children:\"Brian Maloney, Engineering Manager\"})]}),/*#__PURE__*/e(\"p\",{children:\"Given their industry, it is important to Benchling that they own all of their data on their own infrastructure. Built with serverless architecture, Panther\u2019s Cloud Connected deployment option fits both Benchling\u2019s budget and infrastructure needs perfectly. Leveraging Panther Cloud Connected, Benchling was able to double their data ingest without breaking their budget, ensuring every single security-relevant event can be monitored. Benchling needed a SIEM that would work with their custom data processing workflows and support their unique processes. Panther seamlessly integrated with Benchling's data workflow. Their Panther deployment and data workflows ensure they maintain ownership of their data at all times, strengthening Benchling\u2019s security posture while making use of Panther\u2019s powerful detection engine.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, using a world-class data warehouse like Snowflake unlocks analytics capabilities that are simply not present in other SIEM software.\\xa0 Benchling\u2019s highly-skilled detection engineers can easily use Snowflake in conjunction with other data analysis tools using the same tools for querying and analysis that data scientists use.\\xa0 By bringing extensibility to both detection logic and analysis capabilities, Panther provides a truly open platform for deriving actionable Security intelligence from raw log data.\"}),/*#__PURE__*/e(\"p\",{children:\"At the end of the day, Panther is enabling a highly technical team to maximize their time spent on writing and optimizing detections for their unique environment.\\xa0\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"Panther is freeing up our engineers' time to do what they do well, which is writing detections and responding to novel threats. Without the ease of use combined with scalability we get from Panther, the Benchling Security Operations program would not be as mature as we are today.\"}),/*#__PURE__*/e(\"p\",{children:\"William Phillips, Head of Security Operations\"})]})]});export const richText71=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Integrating with Benchling\u2019s tech stack and existing data processing and infrastructure needs\"})});export const richText72=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Scalable programmatic approach to Security Detection development that allows detections to be change-managed via GitOps\"})});export const richText73=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Delivering extensible detections (using external APIs and data sources) is a challenge with many products on the market\"})});export const richText74=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Leveraging a code-driven detection engine enabled the security team to write reliable, tested detections\"})});export const richText75=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Using a general programming language like Python allows detection logic to access anything with an API, such as their own cloud infrastructure and partner SaaS\"})});export const richText76=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Deploying Panther Cloud Connected - Built with serverless architecture, Panther\u2019s Cloud Connected deployment option fit Benchling\u2019s unique infrastructure and data needs perfectly\"})});export const richText77=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Timely and effective detection deployment with true CI/CD resulted in high fidelity detections\"})});export const richText78=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Simple Detection maintainability as program grew to meet the needs of the business\"})});export const richText79=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Quickly iterated and deployed critical detections as part of response actions\"})});export const richText80=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"JupiterOne, a cloud-native security company, is a leader in security asset management. Their tool focuses on providing added context on the relationships between assets. Its ability to dynamically enrich data and provide focused details to security events enhances security team incident response capabilities.\"}),/*#__PURE__*/e(\"p\",{children:\"As JupiterOne grew their security operations, they recognized the importance of having a SIEM to gain insights into high-risk, critical actions within their systems. With events occurring across their tech stack, it was critical to centralize visibility into their logs in one place for monitoring. The decision to adopt Panther stemmed from JupiterOne\u2019s alignment with Panther\u2019s cloud-native and engineering first approach to detections-as-code.\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"We worked with one of Panther\u2019s amazing engineers, Nate, and he helped us configure the Terraform to fit our needs. Ever since then it has just simply worked. We haven\u2019t had to tweak it. We haven\u2019t had to modify it. Haven\u2019t had bug fixes or anything like that. It just works.\"}),/*#__PURE__*/e(\"p\",{children:\"Kenneth Kaye, Security Automation Architect\"})]}),/*#__PURE__*/e(\"h3\",{children:\"Deploying Code Driven SecOps\"}),/*#__PURE__*/e(\"p\",{children:\"The team knew they would face frustration with generic out-of-the-box detections provided by traditional SIEMs. These detections often result in false positives, flooding the system with unactionable alerts. These poor alerts not only consume valuable time but also hinder the ability to promptly identify genuine security incidents.\"}),/*#__PURE__*/e(\"p\",{children:\"Adopting the detections as code approach allowed the security team to customize, test, and fine-tune detections according to their specific environment. By leveraging Python, they gained the flexibility to update and fine tune detections rapidly, reducing the noise generated by traditional SIEMs and ensuring that alerts were tailored to their unique use cases.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"When JupiterOne found the disconnect of cloned detections from upstream updates in the Panther Analysis Tool burdensome, Panther responded to this feedback by adding a feature that allows users to customize Panther-provided detections while retaining customer-applied customizations. This has resulted in better uptime, less maintenance, and specialized detections for JupiterOne\u2019s specific needs.\"}),/*#__PURE__*/e(\"p\",{children:\"The team experienced a noted lack of false positives, enabling them to focus their attention on high fidelity alerts and legitimate security concerns. The ability to code detections provided a level of precision and customization that traditional SIEMs lack, resulting in a more efficient and accurate security monitoring process.\"}),/*#__PURE__*/e(\"h3\",{children:\"Building for the Cloud\"}),/*#__PURE__*/e(\"p\",{children:\"JupiterOne, being a cloud-native company, didn\u2019t want to consider SIEM solutions that lacked necessary cloud-native features. Legacy SIEMs are not designed to effectively monitor and secure dynamic cloud environments, posing a significant challenge for modern security teams like JupiterOne.\"}),/*#__PURE__*/e(\"p\",{children:\"Panther's cloud-native architecture addressed this challenge head-on. Specifically tailored for cloud environments, Panther provided the scalability, flexibility, and agility required to effectively monitor assets and events in their dynamic infrastructure.\"}),/*#__PURE__*/e(\"p\",{children:\"Panther seamlessly integrated with their systems, ensuring that their security monitoring was aligned with the broader organization's cloud-first approach.\"}),/*#__PURE__*/e(\"h3\",{children:\"Growing SecOps Coverage with a Small Team\"}),/*#__PURE__*/e(\"p\",{children:\"Being a small security team, JupiterOne wanted to avoid difficulties with constantly tuning their SIEM . With traditional SIEMs, the rule tuning process is time-consuming, and the team may have struggled to keep up with the demands of an ever-evolving threat landscape.\"}),/*#__PURE__*/e(\"p\",{children:\"Embracing detections as code not only addressed the challenge of generic detections, but also allowed engineering to get more deeply involved in the tuning process. This collaborative approach empowered the team to leverage Python for honing and managing detections efficiently across team members.\"}),/*#__PURE__*/e(\"p\",{children:\"The collaborative effort across the JupiterOne team paired with the adoption of detections as code ensured that the SIEM was finely tuned to their environment, enhancing its overall effectiveness.\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"More teams are going to have to go towards engineering first, they\u2019re going to have to. The environment is changing and the nature of security engineering and security operations are changing. It\u2019s scaling to the point where you can\u2019t hire enough people anymore to do all the work, you have to get smarter about it and engineer for security.\"}),/*#__PURE__*/e(\"p\",{children:\"Kenneth Kaye, Security Automation Architect\"})]})]});export const richText81=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"False Positives from Generic Detections: Many SIEMs provided generic detections that result in false positives and are often not tuned to a specific environment\"})});export const richText82=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Lack of Cloud-Native Features: Legacy SIEMs lacked the cloud-native capabilities required to address the challenges specific to a cloud-centric infrastructure\"})});export const richText83=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Limited Team Resources: With a lean team, the tech stack needs to support effortless scalability without requiring additional headcount\"})});export const richText84=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Detections as Code: The ability to code and configure detections in Python allowed the security team to easily tailor alerts to their environment\"})});export const richText85=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Cloud-Native Architecture: Panther's cloud-native approach aligned seamlessly with their infrastructure, providing the flexibility and scalability needed for monitoring a dynamic environment\"})});export const richText86=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Accessible Features like Rule Filters: The addition of rule filters and code-free features in Panther allowed for more fine-tuned control over detections across the team\u2019s skill levels, enhancing the full team's ability to prioritize and act on security alerts\"})});export const richText87=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Reduced False Positives: Detections as Code empowered the team to refine alerts, reducing false positives and delivering actionable insights\"})});export const richText88=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Improved Cloud-Native Monitoring: Panther's cloud-native architecture addressed the specific challenges posed by their infrastructure, ensuring effective monitoring without unnecessary noise\"})});export const richText89=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Enhanced Collaboration: The ability to involve the broader team in tuning and managing detections enhanced collaboration for the security team\"})});export const richText90=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Since 2008, Asana, a leading work management platform for organizations, has embraced a mission of enabling teams to work together effortlessly. With millions of users across industries collaborating on its platform, Asana must protect a large, diverse collection of data for its customers, including those within highly regulated sectors such as healthcare. To meet these challenges as quickly and cost-effectively as possible, Asana chose to embrace scalability and automation through engineering-based approaches.\"}),/*#__PURE__*/e(\"p\",{children:\"Jackie Bow, Head of Detection and Response at Asana, recognized that traditional detection workflows using a traditional SIEM wouldn't scale for Asana's complex needs. \\\"I have been in security analysis roles before, and I knew that trying to solve detection and response challenges in the traditional ways of black-box SIEM detection and heavy use of manual analyst labor would not match Asana's engineering-first culture or lead to a scalable, sustainable team,\\\" Bow said. \\\"We're an engineering-driven company, and I wanted to solve the challenges we were facing in an automated way using code and engineering principles.\\\" This approach led Bow and Asana to explore Panther.\"}),/*#__PURE__*/e(\"h3\",{children:\"Building a Team Focused on Detection-as-Code\\xa0\"}),/*#__PURE__*/e(\"p\",{children:'For most detection and response teams using legacy SIEMs, security analysts get a barrage of alerts without the context needed to investigate threats effectively. The root cause of this stems from tools that have preset detections that aren\u2019t tailored to the environments they\u2019re used in, and alerts that lack context necessary for those triaging them. \"The reality in many SOCs is that there are just too many alerts to work through, and it results in poor return on investment on actual threats being detected,\" Bow said.\\xa0'}),/*#__PURE__*/e(\"p\",{children:'Bow\\'s team sought a solution that would facilitate engineering-centric detection workflows that aligned with her team\\'s philosophy. \"We used to have a lot of siloes that made detection and response workflows challenging. It was hard to collaborate. With a dedicated Detection and Response function and the tooling that supports it, we\\'ve improved our ability to detect and respond to incidents faster,\" Jackie said. \"Panther allows us to offer detection-as-a-service to other stakeholder teams. We can work with them to create custom detections that suit their specific needs, and we have the ability to manage 100% of them as code.\"\\xa0'}),/*#__PURE__*/e(\"h3\",{children:\"Accelerating Detection and Response at Scale with Panther\"}),/*#__PURE__*/e(\"p\",{children:'Asana had been using the open-source log analysis project, StreamAlert, for several years, and Bow\\'s team found it increasingly difficult to maintain the software as they scaled. \"Despite the fact that we love open source, we were using StreamAlert for detections, and as we grew, and the StreamAlert open source project became unmaintained, it was harder to manage,\" said Bow. \"We liked how StreamAlert fit into our CI/CD pipelines and overall architecture, but the maintenance costs and the operational overhead became untenable. We were hitting a performance ceiling and needed a more powerful system that could handle the scale of our infrastructure.\"'}),/*#__PURE__*/e(\"p\",{children:\"With the adoption of Panther, Asana no longer needed to worry about performance or scale. Panther's cloud-native SaaS architecture allowed Asana to leverage the full power of the cloud to seamlessly scale up and down as needed, ensuring that their detection infrastructure could handle the demands of its growing platform. \\\"Our customers expect the best from us, and that's what we built our team and system to deliver. Our cloud surface is large, so Panther's ability to process and analyze all of that data seamlessly has cut down the time it takes us to detect suspicious activity.\\\"\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Asana Looks Forward to 100% Threat Map Coverage\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"The Asana Detection and Response team set its compass towards the ambitious goal of 100% threat map coverage. To achieve this, the team must rely on automation and dynamic systems to deal with constantly changing and growing log sources and data volumes.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:'With other SIEMs, Asana would be forced to choose between incurring exorbitant costs or not analyzing its most critical data. Fortunately, Panther solves both challenges through its ability to manage detection-as-code and limit cost at scale. \"Our entire approach was based on avoiding hiring an army of analysts and contractors because we believe we can do better less expensively with well-designed systems,\" Bow said. \"For this to make sense, we also needed a SIEM that we could scale up to our level of demand in a more cost-effective way than the legacy players. We could see a world of getting to our 100% threat surface coverage goal with Panther that would have cost considerably more with a collection of off-the-shelf tools from other vendors.\"'}),/*#__PURE__*/e(\"p\",{children:\"As the Asana Detection and Response team continues to grow, Bow is excited for the future of building even more automation across the organization and using detections to deliver additional workflow value to teams. \\\"As other security teams, including product security and internal tooling, understand our capabilities better, we're starting to see them ask for things outside of what you'd expect detections to be limited to,\\\" Bow said. \\\"It's really cool to see the applications of what we're doing help to make people's jobs easier. It makes it exciting to keep building together.\\\"\"})]});export const richText91=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Scaling a detection and response program that has full visibility and control over detections and tooling\"})});export const richText92=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Maintaining the ability to process large amounts of security data\"})});export const richText93=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Onboarding a variety of stakeholders and use cases\"})});export const richText94=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Automating detection and response workflows to support industry compliance\"})});export const richText95=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Delivering detection infrastructure-as-a-service to product engineering teams\"})});export const richText96=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Dynamically scaling with rapidly growing log volume for cloud workloads\"})});export const richText97=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Eliminated introduction of manual tasks through use of intelligent log analysis\"})});export const richText98=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Increased threat map coverage using detection-as-code\"})});export const richText99=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Reduced projected SIEM total cost of ownership (TCO)\"})});export const richText100=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Jumio: A Leader in Identity Verification\"}),/*#__PURE__*/t(\"p\",{children:[\"Jumio is an identity verification company that validates customers for mobile and web transactions. Leveraging advanced technology including automation, biometrics, AI/machine learning, liveness detection and no-code orchestration with hundreds of data sources, Jumio helps organizations fight fraud and financial crime, onboard good customers faster and meet regulatory compliance including KYC and AML. Jumio has secured more than one billion transactions across a range of industries, including financial services, gaming, travel, and healthcare.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"Prior to looking for a SIEM solution, Jumio paid a managed service provider. The team was disappointed in the opaque nature of the service and wanted to bring control over their security monitoring in-house. To do so, \",/*#__PURE__*/e(\"strong\",{children:\"Mo Imran, Jumio\u2019s Head of Threat Detection and Response\"}),\" wanted a security analytics platform that could handle their diverse and voluminous data sources, enable them to write flexible and powerful detection logic, and store their data in a structured way to enable fast queries. Jumio chose Panther as their cloud-native SIEM solution to meet these needs and improve their security operations.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Easy Data Onboarding with Native Integrations & Infer Schema Functionality\"}),/*#__PURE__*/t(\"p\",{children:[\"One of the main challenges that Imran faced with traditional SIEM tools was getting data into the platform, especially from custom or non-standard log sources. Typically, they had to work with the vendor, which took weeks, if not months, to figure out all the schemas and formats. With Panther, Jumio was able to onboard all of their data sources in less than a week, thanks to native integrations with common cloud and SaaS applications. For their Windows logs and other custom data sources, Jumio leveraged Panther's infer schema functionality, which can \u201Cread\u201D sample logs from any source and create a custom schema for it. This \",/*#__PURE__*/e(\"strong\",{children:\"enabled Jumio to ingest log sources into Panther without waiting for vendor support or manual configuration\"}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"Flexible Detection Logic in Python\"}),/*#__PURE__*/e(\"p\",{children:\"Another challenge that Jumio faced with traditional SIEM tools was writing and tuning detection logic that was meaningful and relevant for their environment. Out-of-the-box logic was often basic and noisy, generating too many false positives and wasting time and resources. It was also difficult to write new or customize existing logic in most SIEMs, which used vendor-specific or proprietary languages that were hard to learn and maintain.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, Jumio was able to write highly customizable detections using Python, a widely adopted and versatile language that enabled them to write lean and efficient code. Python also gave them the ability to enrich detections with external data sources, query other log sources, cache and timestamp events, and perform simple baselining and trend analysis. This enabled Jumio to optimize how meaningful each alert they generated was, reducing noise and improving accuracy.\"}),/*#__PURE__*/e(\"p\",{children:\"One example of a detection that Jumio was particularly proud of was a rule for spear phishing attacks. The multi-part rule cached an IP address for baselining, checked for activity from the same account from two different IPs, while also applying some of the out-of-the-box brute force logic. This rule helped Jumio detect and prevent more sophisticated phishing attempts.\"}),/*#__PURE__*/e(\"h3\",{children:\"Structured Data Stored in Security Data Lake\"}),/*#__PURE__*/e(\"p\",{children:\"A third challenge that Jumio faced with traditional SIEM tools was querying unstructured data across large volumes of logs. In other tools, correlating data over terabytes for a query could take 15 minutes or more, making investigations slow and cumbersome. With Panther, Jumio was able to bring in verbose data streams and store them in a structured security data lake powered by Snowflake, a cloud data platform that enables fast and scalable queries over massive data sets. Panther also normalized indicators of compromise (IOCs) across all log sources as data was ingested, making it easier to query across structured data based on attributes like usernames, emails, IPs, and more. This helped Jumio tell the full story during an incident and perform thorough investigations in minutes.\"}),/*#__PURE__*/e(\"h3\",{children:\"Top-Notch Support from Panther Team\"}),/*#__PURE__*/e(\"p\",{children:'In addition to the technical capabilities of Panther, Jumio also appreciated the support they received from the Panther team throughout their deployment and usage of the platform. \"The support has been a breath of fresh air,\" Imran noted. \"When there is an issue, I have complete confidence you all are on it.\" Jumio also valued the feedback loop with Panther, which allowed them to share their suggestions and requests for new features or improvements.\\xa0'}),/*#__PURE__*/e(\"h3\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"By choosing Panther as their cloud-native SIEM solution, Jumio was able to streamline their data onboarding process, write flexible and powerful detection logic in Python, store their data in a structured security data lake powered by Snowflake, and receive top-notch support from the Panther team. Panther helped Jumio improve their security operations and achieve their security goals with speed, scale, and flexibility.\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"Panther is a great choice for security teams that want to take control of their data and detections,\"}),/*#__PURE__*/e(\"p\",{children:\"Mo Imran, Head of Threat Detection and Response, Jumio\"})]})]});export const richText101=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Many tools make it difficult to ingest diverse or custom data sources\"})});export const richText102=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Out-of-the-box detection logic is traditionally noisy and hard to edit\"})});export const richText103=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Vast amounts of unstructured data leads to extremely slow query times\"})});export const richText104=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Easy data onboarding with native integrations & infer schema functionality\"})});export const richText105=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Flexible, powerful detection logic in Python enables granular detections\"})});export const richText106=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Structured data stored in Security Data Lake efficiently increases retention and accelerates queries\"})});export const richText107=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Panther\u2019s cloud-native architecture enables the security team to focus on security, not tool maintenance\"})});export const richText108=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"By leveraging environment-specific logic, Jumio has drastically increased alert fidelity\"})});export const richText109=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"The Most Trusted Crypto Exchange\"}),/*#__PURE__*/e(\"p\",{children:\"Bitstamp is the world\u2019s longest-standing cryptocurrency exchange, having provided safe, secure, and reliable access to crypto since 2011. With a proven track record and mature approach to the industry, Bitstamp provides a secure and transparent trading venue to over five million individuals and is the preferred choice for a range of institutional clients seeking a trusted partner to participate in crypto markets. Bitstamp is a sector leader in both security and compliance, with 51 licenses and registrations secured with financial regulators across the globe.\"}),/*#__PURE__*/e(\"p\",{children:\"As the world\u2019s most trusted cryptocurrency exchange, security is paramount for Bitstamp. The permanence of transactions in the crypto space leaves no room for error. Due to the decentralized nature of cryptocurrencies, a hack of assets will likely remain anonymous and final. Moreover, financial institutions are held to a strict regulatory standard and organizations must maintain proper security measures. Audits require extensive visibility across infrastructure and application data. Structuring a security program within such stringent requirements is already a challenge, but the difficulty is exacerbated when trying to secure a dynamic cloud environment.\"}),/*#__PURE__*/e(\"h3\",{children:\"Trying To Secure a Dynamic Cloud Environment\"}),/*#__PURE__*/e(\"p\",{children:\"When he joined Bitstamp, Jan Urbanc, Head of Security Operations, already had scars from trying to implement SIEM solutions in previous roles. Traditional tools were often incapable of handling voluminous and diverse log sets, detection logic was written in a complicated vendor-specific language, and testing and updating detection logic was a pain. Frustrated by the engineering hours required for set-up, overhead, and maintenance with many solutions on the market, he wanted to bring something new to Bitstamp.\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"With traditional tooling, getting a new detection to production took hours of engineering time. With Panther, it's seconds or minutes,\"}),/*#__PURE__*/e(\"p\",{children:\"Jan Urbanc, Head of Security Operations, Bitstamp\"})]}),/*#__PURE__*/e(\"h3\",{children:\"Flexible Ingestion and Customizable Out-Of-The-Box Detections with Panther\"}),/*#__PURE__*/e(\"p\",{children:\"When faced with purchasing a SIEM solution at Bitstamp, the security team had several key reasons for choosing Panther.\"}),/*#__PURE__*/e(\"h3\",{children:\"Flexible & Cost-Effective Log Ingestion\"}),/*#__PURE__*/e(\"p\",{children:\"The pricing of many SIEM tools forces security teams to pick and choose logs they\u2019ll ingest - leading to a lack of visibility. With Panther, Bitstamp is able to efficiently ingest all the logs they need, including nontraditional or custom log sources \u2013 it removes the need to prioritize which data is important. \u201CYou cannot possibly find a product that could take 1TB of data a day at a similar price point,\u201D Jan said. \u201CThat alone sidelines the majority of vendors.\u201D\"}),/*#__PURE__*/e(\"p\",{children:\"Moreover, having faced serious security incidents, Jan knows the importance of context. \u201CWhen an incident occurs, it\u2019s often one random log source that\u2019s going to provide the information you need,\u201D Jan noted. He\u2019s been in active incidents where he needed to bolster the limited information that was placed in the SIEM. He\u2019s tracked down random logs, and tried to organize and make sense of them in real time - a very stressful exercise when the clock is ticking.\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther\u2019s flexible custom schemas and architecture built on a security data lake, it\u2019s much simpler to ingest, structure, and query a wide variety of logs so they\u2019re ready for urgent situations. Bitstamp has some standard logs like AWS CloudTrail and M365, but they also have organization-specific application and audit log types aka \u2018skeleton in the closet\u2019 logs. \u201CWe\u2019re so thankful for the infer schema functionality.\u201D Jan said, \u201CThe flexibility to throw any log source into Panther was a critical reason we chose the tool.\u201D\"}),/*#__PURE__*/e(\"h3\",{children:\"Detections in Python, Querying in SQL\"}),/*#__PURE__*/e(\"p\",{children:\"For Bitstamp, a SIEM tool should use widely-adopted languages for detection and query logic. \u201CA big issue I have with a number of SIEMs is their insistence on using some confusing vendor-specific language for detections,\u201D Jan noted. In Panther, detections are written in Python - enabling engineers of all types to work in the tool.\"}),/*#__PURE__*/e(\"p\",{children:\"Panther does provide a variety of out-of-the-box detections. \u201CThe AWS detections and policies that come with Panther are hyper-valuable,\u201D Jan said. However, the Python language enables interesting use cases for customization and enrichment. \u201CPython gives us flexibility to do a lot of things in a detection: data manipulation, quick queries, quick GET requests to APIs of interest - all of which enrich the detection.\u201D\"}),/*#__PURE__*/e(\"p\",{children:\"Moreover, Panther uses SQL for investigations. Given SQL\u2019s longstanding history as a querying language, many engineers have experience writing it, and there is also robust documentation and support for it. \u201CSQL has been around for decades, it\u2019s easy to make efficient use of it.\u201D Jan said, \u201CWhen it comes to vendor-specific languages, they tend to be convoluted - making things difficult in the moment and adding complexity when it\u2019s important to be fast and succinct.\u201D\"}),/*#__PURE__*/e(\"h3\",{children:\"Detection-as-Code\"}),/*#__PURE__*/e(\"p\",{children:\"Panther enables customers to easily maintain, test, and update their detections via Detection-as-Code. For companies that want to optimize their detection workflows, Detection-as-Code helps them apply software development principles to detection logic. Bitstamp \u201Cis not in a business where we can allow changes to detection logic that would break production,\u201D noted Jan. \u201CEverything that impacts production is in a git repo and gets deployed in a CI/CD pipeline.\u201D\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, Bitstamp can easily version control their detections and open up detection logic for review before it enters production. It is also simple to test detections via mechanisms like unit testing or data replay. By implementing these features, Bitstamp sustainably manages changes to ensure detections deployed to production are ready.\"}),/*#__PURE__*/e(\"p\",{children:\"A helpful benefit of strong version control and change management is compliance. \u201CWe are a highly regulated exchange, and we strive for audit logs for everything we do,\u201D said Jan. Detection-as-Code practices leave a record of changes, giving the Bitstamp team a robust log trail relevant for any audit.\"}),/*#__PURE__*/e(\"h3\",{children:\"With Unparalleled Support, Bitstamp Tunes, Tests, and Deploys Detections Seamlessly\"}),/*#__PURE__*/e(\"p\",{children:\"While Bitstamp originally chose Panther for technical capabilities, now that they\u2019re up and running, they continue to be impressed by Panther\u2019s dedication to supporting the operation of security teams. \u201CWe\u2019ve been impressed by the team at Panther, they\u2019re people from the security world looking to empower others in the security world,\u201D Jan said. \u201CThe support has been really amazing - Panther is definitely customer obsessed.\u201D\"}),/*#__PURE__*/e(\"p\",{children:\"When reflecting on the success of Bitstamp\u2019s Panther deployment, Jan gave two metrics: ratio of true positives to false positives and engineering hours to deploy a new detection to production. For the first metric, Panther enables Bitstamp to craft custom logic in Python and tune detections for their specific environment. By making it easy to refine detection logic, Panther helps Bitstamp consistently improve their true positive to false positive ratio.\"}),/*#__PURE__*/e(\"p\",{children:\"For the deployment metric to be optimized, many components need to be in place - the team needs to be able to update the logic, test it and review it before it can be deployed into production. \u201CWith traditional tooling, getting a new detection to production took hours and hours of engineering time. With Panther, deployment takes seconds.\u201D\"})]});export const richText110=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Overhead and maintenance of many SIEM solutions on the market\"})});export const richText111=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Difficulty of testing and updating detection logic in vendor-specific languages\"})});export const richText112=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Inability to ingest voluminous and diverse log sources\"})});export const richText113=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Flexible custom schemas and architecture built on security data lake\"})});export const richText114=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Python for detections and SQL for queries makes code writing simpler\"})});export const richText115=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Detection-as-Code practices to both improve detection testing and accelerate detection deployment\"})});export const richText116=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Eased compliance burden with strong audit trail of detection version control and history\"})});export const richText117=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Achieved cost-effective solution for ingesting high-volume logs into security data lake\"})});export const richText118=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Reduced overall TCO of SIEM solution by coupling better ingestion with Detection-as-Code\"})});export const richText119=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"FloQast is an accounting software company based in Los Angeles, California. The business streamlines accounting workflows so their customers can complete critical accounting processes faster and more efficiently.\"}),/*#__PURE__*/e(\"p\",{children:\"Technically, FloQast is a cloud-native organization with no on-premise hardware. The organization\u2019s infrastructure footprint in Amazon Web Services (AWS) was rapidly expanding - leading to a drastic increase in security-relevant logs. Its security team needed a modern Security Information and Event Management (SIEM) that was easy to manage and could scale alongside AWS. However, the team found that traditional SIEM solutions relied on proprietary coding languages and inefficient data ingestion - making progress difficult.\"}),/*#__PURE__*/e(\"h3\",{children:\"The Challenge\"}),/*#__PURE__*/e(\"h3\",{children:\"Unreliable data ingestion\"}),/*#__PURE__*/e(\"p\",{children:\"FloQast\u2019s threat detection solution lacked centralized logging, and the team relied on disparate systems, each individually integrated with Slack, to do alerting for them. FloQast lacked a central solution to allow them to make changes that would benefit their entire security stack.\"}),/*#__PURE__*/e(\"h3\",{children:\"Limited detection capabilities\"}),/*#__PURE__*/e(\"p\",{children:\"Using a proprietary language to code detections hindered FloQast\u2019s security team. Adapting to vendor-specific code and tooling was not as applicable across other functions and security teams. They were seeking a solution to allow them to easily hire people who could write detections in a widely accessible language.\"}),/*#__PURE__*/e(\"h3\",{children:\"Adversity with detection testing\"}),/*#__PURE__*/e(\"p\",{children:\"Writing detections without a practical way to test them was becoming a significant frustration for the FloQast security team. Whenever a detection was tweaked, they were forced to wait until that event reoccurred to determine its accuracy.\"}),/*#__PURE__*/e(\"h3\",{children:\"The Solution\"}),/*#__PURE__*/e(\"h4\",{children:\"Increased data ingestion and retention\"}),/*#__PURE__*/e(\"p\",{children:\"After deploying Panther, FloQast was able to ingest approximately ten times the amount of data compared to their legacy platform. Plus, types of logs that could be ingested expanded dramatically, as the team no longer needed to create custom ingestions for applications with no native integration. With Okta logs, for example, Panther provides a built-in integration to ingest and normalize key \u201Cindicator of compromise\u201D fields, along with built-in detections to enable effective alerting on specific behaviors. Finally, the team was able to remove restrictions on data retention significantly after deploying Panther.\"}),/*#__PURE__*/e(\"h4\",{children:\"Robust out-of-the-box detection for AWS and modern technology stack\"}),/*#__PURE__*/e(\"p\",{children:\"When getting started, FloQast was able to turn on a variety of detections immediately. The pre-built logic for AWS environments and other common SaaS tools made it easier to hit the ground running with Panther.\"}),/*#__PURE__*/e(\"h4\",{children:\"Ability to grow the team and train staff quickly\"}),/*#__PURE__*/e(\"p\",{children:\"Panther opened the door for FloQast to access a broader talent pool given how widely SQL and Python are used across security and other functions. Even FloQast colleagues from other teams (such as application security) now have the toolset to investigate independently without engaging the Detection & Response team.\"}),/*#__PURE__*/e(\"h4\",{children:\"Powerful and flexible detection-as-code\"}),/*#__PURE__*/e(\"p\",{children:\"By leveraging the universal coding power of Python, FloQast grew confident that as their detection requirements increased in complexity, Panther would be up to the task. With Panther, FloQast could not only use the out-of-the-box detections but also easily translate pre-written detections from other platforms.\"}),/*#__PURE__*/e(\"h3\",{children:\"The Result\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther, FloQast is well-positioned to continue optimizing its detection and response process. With easy-to-learn detection writing (Python) and query functionality (SQL) for everyone on the security team, the Detection & Response team has more time to focus on their role in maintaining the company\u2019s security posture.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Panther has enabled FloQast to:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ingest ten times more data from a wider list of data sources\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Significantly reduce restrictions on data retention\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Craft powerful and flexible detections with Python\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Analyze logs as they are ingested and leverage more context for alerts\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Improve the flexibility and scalability of their detection and response processes\"})})]}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"The ability to customize detections really quickly and easily and then test them with the Panther analysis tool makes life a lot easier.\"}),/*#__PURE__*/e(\"p\",{children:\"Page Glave, Security Engineer, FloQast\"})]})]});export const richText120=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"A lack of centralized visibility into their systems made threat monitoring difficult\"})});export const richText121=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Legacy solutions required specialized knowledge to write and deploy new detection rules\"})});export const richText122=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"The absence of testing and controls in their detection development pipeline slowed down progress \"})});export const richText123=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Native support for data sources and centralized logging enhanced visibility \"})});export const richText124=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Detections-as-code and OOTB rules with version control and easy testing\"})});export const richText125=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Python based detections expanded hiring options to rapidly grow the team \"})});export const richText126=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Ingesting and monitoring 10x more data than with their legacy solution\"})});export const richText127=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Enhanced threat monitoring improved security posture and threat coverage\"})});export const richText128=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Removed silos between teams to improve collaboration and speed up investigations \"})});export const richText129=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Intercom is a SaaS company that offers an all-in-one customer communications platform that helps businesses build stronger customer relationships. Intercom was founded in 2011, has grown to over 900 employees, serves over 25,000 paying customers and is a six-time Forbes Cloud 100 honouree. Intercom\u2019s threat detection team is geographically dispersed between Chicago, London, and Dublin.\"}),/*#__PURE__*/e(\"h3\",{children:\"The Challenge\"}),/*#__PURE__*/e(\"p\",{children:\"Intercom\u2019s threat detection hurdles began with the need to monitor and detect threats in AWS accounts. Initially, they chose StreamAlert because it was engineer friendly and they could write their own detection rules. However, they outgrew StreamAlert soon after. As the business matured, they started processing a substantial amount of log data from numerous data sources, and the operational burden of managing StreamAlert took an unnecessary toll on the team. While evaluating Panther, they reviewed Splunk, Sumologic, and DataDog, but felt none fit their needs. \u201CWe found that other vendors couldn\u2019t fit our team\u2019s profile,\u201D said Jacopo Scrinzi, Intercom\u2019s Staff Security Engineer. \u201CWe like having version control, peer reviews for detections and needed a solution that embraced security as code.\u201D\"}),/*#__PURE__*/e(\"p\",{children:\"From a security perspective, as Intercom is built on top of AWS, the team wanted to have world-class integration with critical services like AWS CloudTrail. The vendor they chose also needed to support a wide array of AWS logs with pre-built data models and schemas to onboard AWS quickly. Lastly, they wanted support for all other relevant log sources, like identity and endpoint data, to consolidate all their threat detection efforts into a single platform.\"}),/*#__PURE__*/e(\"h3\",{children:\"Choosing Panther\"}),/*#__PURE__*/e(\"p\",{children:\"Intercom\u2019s security team liked Panther\u2019s cloud-native approach, which enabled them to exclusively focus on monitoring infrastructure and write effective detections while minimizing the management overhead. More importantly, Panther offered many of StreamAlert\u2019s core features \u2014 making the transition smoother.\"}),/*#__PURE__*/e(\"p\",{children:\"They loved Panther\u2019s approach to creating and managing detections with detection-as-code. Panther enabled Intercom\u2019s security team to set up peer reviews, version controls, and test alerts before pushing detections into production. Further, they could integrate Panther with their CI/CD tool to automate the detection lifecycle. Overall with detection-as-code, Intercom was able to tackle new and emerging threats twice as fast as previously. Intercom\u2019s security team has a motto: Every alert must add value and they live by it. First, they modify Panther\u2019s detection rules written in Python and add exceptions or changes to ensure it fits their environment. Second, they test their detections with data replay where applicable.\"}),/*#__PURE__*/e(\"p\",{children:\"Third, they ship detections without a destination to monitor alerts and tweak them based on real-world responses. Finally, they use many capabilities available within Panther to prevent alert duplication and ensure these alerts don\u2019t cause any fatigue.\"}),/*#__PURE__*/e(\"p\",{children:\"Given their high-value alerts, Intercom generally puts emphasis on two kinds of investigations. First, where an action by a user looks suspicious but lacks context; and second, where an actor taking an action is unknown and more data is needed to pinpoint the user. They kickstart their investigation using Panther\u2019s Indicator search, which enables them to scan IoCs such as usernames, IPs, and ARNs across log sources within seconds \u2014 saving hundreds of hours in investigation and query time and providing timely responses.\"}),/*#__PURE__*/e(\"h3\",{children:\"Panther's Benefits\"}),/*#__PURE__*/e(\"h3\",{children:\"Faster Threat Detection\"}),/*#__PURE__*/e(\"p\",{children:\"With detection-as-code, Intercom\u2019s team can easily manage detection changes and deploy new ones faster and more automated.\"}),/*#__PURE__*/e(\"h3\",{children:\"Reduce Noise and Alert Fatigue\"}),/*#__PURE__*/e(\"p\",{children:\"With a well-defined process and valuable context to enable faster investigation, Intercom has been able to reduce noise and alert fatigue.\"}),/*#__PURE__*/e(\"h3\",{children:\"Give Time Back to the Investigation Team\"}),/*#__PURE__*/e(\"p\",{children:\"With features like Panther\u2019s Indicator Search, Intercom has reduced time spent investigating suspicious activities by 90%. By correlating IOCs across data sources, security analysts can detect malicious activity early in the attack sequence to prevent further escalation.\"}),/*#__PURE__*/e(\"h3\",{children:\"Foster a Collaborative Spirit\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther\u2019s approach to detection building, Intercom\u2019s team has been able to bring other teams such as IT onboard to write their own detections for services, empowering them to do more.\"}),/*#__PURE__*/e(\"h3\",{children:\"Results: Saving time and moving faster\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther\u2019s ease of use and user-friendly interface, Intercom is already pulling in other teams that weren\u2019t as familiar with SIEM tools. With more teams on board, Intercom\u2019s threat detection team can remain agile, respond faster and get more accomplished.\"}),/*#__PURE__*/t(\"blockquote\",{children:[/*#__PURE__*/e(\"p\",{children:\"We love Panther. One of the key reasons we chose Panther is the time saved for our team. We can focus on what is unique to us; detections that allow us to monitor our environment, and having the infrastructure to do the monitoring.\"}),/*#__PURE__*/e(\"p\",{children:\"Jacopo Scrinzi, Staff Security Engineer, Intercom\"})]})]});export const richText130=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Their current solution, StreamAlert, couldn\u2019t support their growing data ingestion needs \"})});export const richText131=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Legacy SIEMs didn\u2019t provide the security as code approach that the team wanted to leverage \"})});export const richText132=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Needed a world class integration with critical AWS services like CloudTrail \"})});export const richText133=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"A cloud-native SIEM without the need for overhead maintenance or management\"})});export const richText134=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Detections-as-code and CI/CD workflows enabled version control, thorough testing, and easy customizations for rules\"})});export const richText135=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Expedited investigations that leverage SQL and Indicator search \"})});export const richText136=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"The team can tackle new and emerging threats twice as fast as previously\"})});export const richText137=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Reduced noise and alert fatigue for the team \"})});export const richText138=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"90% reduction in time spent on investigations \"})});export const richText139=/*#__PURE__*/t(i.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Cedar is revolutionizing healthcare technology & patient experience. Cedar combines healthcare, tech, and design to create a seamless financial experience for every patient. Cedar serves more than 10 million patients per year and works with 33 client partners around the United States.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Cedar collects, processes, and stores healthcare and financial information for its customers and partners. The Cedar security team needed to unify data, enhance security monitoring, accelerate business decision-making, and document activities to meet strict compliance mandates.\"}),/*#__PURE__*/e(\"h3\",{children:\"The Challenge\"}),/*#__PURE__*/e(\"h3\",{children:\"Too much data from too many places\"}),/*#__PURE__*/e(\"p\",{children:\"Cedar\u2019s security team relied on a combination of traditional SIEM solutions and open-source software to monitor its services, applications, and security controls. However, these failed to support the volume of log data generated from disparate cloud sources and were unable to map back to Cedar\u2019s unique business needs for security, leading to poor performance and incomplete visibility.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Inability to scale with business\"}),/*#__PURE__*/e(\"p\",{children:\"As Cedar rapidly grew and evolved, it adopted many new applications and cloud services. Across the organization Google Workspace (formerly GSuite) became a key collaboration tool, but each team used it differently. The increased IT complexity increased the risk of data breaches and noncompliance.\"}),/*#__PURE__*/e(\"h3\",{children:\"Scattered storage and diverse data formats\"}),/*#__PURE__*/e(\"p\",{children:\"Cedar lacked a centralized source of cloud data, increasing the costs associated with monitoring security and responding to audit requests. The team sought a solution to future-proof its security program that could standardize data formats and act as a single source of record for investigations.\"}),/*#__PURE__*/e(\"h3\",{children:\"The Solution: Detections-as-Code\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Gaining real-time visibility into security risk changes\"}),/*#__PURE__*/e(\"p\",{children:\"Cedar leverages Panther Data Models to create universal detections that apply across multiple log types to generate custom logs. Cedar configured their AWS CloudTrail to send data to Panther, established an alerting threshold, and pushed alerts to their Slack channel for faster review.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Leveraging Infrastructure-as-code to scale security\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Cedar deployed Panther as Infrastructure-as-code (IaS) to build its logging infrastructure while also reducing the overhead associated with collecting new data from their cloud. By using serverless functions like SQS, S3, and Lambda, Cedar\u2019s security team can ingest and unify new data across multiple cloud accounts and regions.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Creating a security alerting prioritization process\"}),/*#__PURE__*/e(\"p\",{children:\"By using Panther to build alerts with Python, Cedar\u2019s team created a repeatable and easy-to-maintain process that enabled consistency across divergent cloud resources. When the security team creates a new detection, a branch from the repository is pushed to source control, and a pull request is opened. When the merge occurs, Cedar\u2019s new detections are automatically pushed to Panther for consistent and reliable deployments.\\xa0\\xa0\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Applying CI/CD to security and compliance\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Using Panther, Cedar can easily build new rules that allow them to continuously iterate their security program. The Panther platform enables Cedar to easily integrate detection management into its CI/CD pipeline for an automated, hands-off approach to deploying new alerts.\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"Enhancing controls with detection-as-code\"}),/*#__PURE__*/e(\"p\",{children:\"Cedar\u2019s team customizes alerts, sets baseline behaviors, and utilizes popular security libraries for enhanced monitoring, detection, and response. The team now manages all of their detections as code in a GitHub repository and uses source control to conduct code review and versioning. Because all of their alert logic is written in Python, the Cedar team can quickly understand the alerts generated, providing better visibility into patterns and greater control over alerting.\\xa0\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:\"The Results: A Small But Mighty Security Team\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"With Panther\u2019s ability to create a unified view of people, processes, and technology, Cedar\u2019s security team created an automated, systematic, repeatable, predictable, and shareable approach to security that improves their overall security posture.\"})]});export const richText140=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Disparate data storage created a lack of centralized visibility \"})});export const richText141=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Inconsistent data formatting slowed down security response \"})});export const richText142=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Rapid company growth strained IT and security resources \"})});export const richText143=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Centralized data ingestion and formatting in Panther using serverless functions like SQS, S3, and Lambda \"})});export const richText144=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Adopted detections-as-code and CI/CD workflows to enhance controls and threat coverage \"})});export const richText145=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Leveraged data models to create universal detections that alert on security risks across multiple log types \"})});export const richText146=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Streamlined and prioritized alerts that reduce false positives and analyst fatigue \"})});export const richText147=/*#__PURE__*/e(i.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"A scalable, future-proofed security program that can grow alongside the team\u2019s needs \"})});\nexport const __FramerMetadata__ = {\"exports\":{\"richText61\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText98\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText137\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText108\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText74\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText65\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText112\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText91\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText90\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText39\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText56\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText68\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText80\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText53\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText94\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText24\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText95\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText132\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText28\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText85\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText123\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText107\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText104\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText127\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText72\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText27\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText99\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText118\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText113\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText100\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText103\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText64\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText87\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText138\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText55\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText140\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText144\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText96\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText34\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText101\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText82\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText47\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText79\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText93\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText119\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText141\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText35\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText135\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText57\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText117\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText115\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText88\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText134\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText128\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText97\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText73\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText62\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText110\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText69\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText33\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText50\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText25\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText71\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText31\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText106\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText29\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText133\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText46\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText111\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText122\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText58\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText125\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText116\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText45\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText84\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText143\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText59\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText23\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText67\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText120\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText89\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText131\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText43\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText78\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText54\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText142\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText38\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText114\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText77\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText147\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText102\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText70\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText83\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText52\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText81\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText76\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText126\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText136\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText48\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText146\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText44\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText32\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText63\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText105\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText130\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText66\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText124\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText145\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText121\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText109\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText51\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText26\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText42\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText129\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText86\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText92\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText75\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText30\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText41\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText60\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText36\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText139\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText37\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText49\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText40\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText22\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "oFAAiF,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,+DAA+D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iWAAiW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,4VAAwV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ySAAoS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4WAA4W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,wZAAyZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iVAAiV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0DAA0D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wLAAwL,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gTAAgT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,qJAAqJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+NAA+N,CAAC,CAAC,CAAC,CAAC,EAAeC,EAAuBD,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,+GAA+G,CAAC,CAAC,CAAC,EAAeE,EAAuBF,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,CAAC,CAAC,EAAeG,EAAuBH,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,EAAeI,EAAuBJ,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,CAAC,CAAC,EAAeK,EAAuBL,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,CAAC,CAAC,EAAeM,EAAuBN,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,oFAAoF,CAAC,CAAC,CAAC,EAAeO,EAAuBP,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,uIAAuI,CAAC,CAAC,CAAC,EAAeQ,EAAuBR,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAeS,EAAuBT,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,+FAA+F,CAAC,CAAC,CAAC,EAAeU,EAAwBZ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oiBAA+hB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6QAA6Q,CAAC,EAAeA,EAAE,aAAa,CAAC,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAAsHE,EAAE,SAAS,CAAC,SAAS,yFAAyF,CAAC,EAAE,maAA8Z,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+gBAA+gB,CAAC,EAAeA,EAAE,aAAa,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,0RAAgR,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qWAAgW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+UAAqU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wPAAwP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qcAA2b,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uXAA6W,CAAC,EAAeA,EAAE,aAAa,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAS,0NAAgN,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAwBX,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAeY,EAAwBZ,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,CAAC,CAAC,EAAea,EAAwBb,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0HAAqH,CAAC,CAAC,CAAC,EAAec,EAAwBd,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8FAA8F,CAAC,CAAC,CAAC,EAAee,EAAwBf,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,2GAAsG,CAAC,CAAC,CAAC,EAAegB,EAAwBhB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,CAAC,CAAC,EAAeiB,EAAwBjB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,CAAC,CAAC,EAAekB,EAAwBlB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAemB,EAAwBnB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAeoB,EAAwBtB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,mSAA8R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oVAAoV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAA4O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qdAAgd,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qYAAsX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sZAAiZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oTAAoT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oFAA0E,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,2XAA2X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ygBAAgf,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2qBAAsqB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mYAA8X,CAAC,CAAC,CAAC,CAAC,EAAeqB,EAAwBrB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,qJAAgJ,CAAC,CAAC,CAAC,EAAesB,EAAwBtB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,+FAA+F,CAAC,CAAC,CAAC,EAAeuB,EAAwBvB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,uJAA6I,CAAC,CAAC,CAAC,EAAewB,EAAwBxB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAeyB,EAAwBzB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAe0B,EAAwB1B,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAe2B,EAAwB3B,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0EAA0E,CAAC,CAAC,CAAC,EAAe4B,EAAwB5B,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,wFAAwF,CAAC,CAAC,CAAC,EAAe6B,EAAwB7B,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,uLAAuL,CAAC,CAAC,CAAC,EAAe8B,EAAwBhC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,6PAA8O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iEAA4D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0hBAA0hB,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,iNAA4M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iEAA4D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kWAA6V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+WAA0W,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wVAA8U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8YAAyY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qfAAse,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,mTAAmT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iEAA4D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qfAA2e,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uKAA6J,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,8RAA+Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iEAA4D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0tBAA0tB,CAAC,CAAC,CAAC,CAAC,EAAe+B,EAAwB/B,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,sHAAsH,CAAC,CAAC,CAAC,EAAegC,EAAwBhC,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,CAAC,CAAC,EAAeiC,EAAwBjC,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,CAAC,CAAC,EAAekC,EAAwBlC,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,CAAC,CAAC,EAAemC,EAAwBnC,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAeoC,EAAwBpC,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,CAAC,CAAC,EAAeqC,EAAwBrC,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,CAAC,CAAC,EAAesC,EAAwBtC,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,CAAC,CAAC,EAAeuC,EAAwBvC,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,CAAC,CAAC,EAAewC,EAAwB1C,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,odAAqc,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,2ZAAsZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,icAA4b,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,+PAA0P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8lBAAylB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wXAA8W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mPAAmP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6hBAAwhB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+hBAAghB,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,iQAAiQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+ZAA0Z,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uDAAuD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gqBAAspB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+OAA0O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2VAAiV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qVAAgV,CAAC,CAAC,CAAC,CAAC,EAAeyC,EAAwBzC,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,mHAA8G,CAAC,CAAC,CAAC,EAAe0C,EAAwB1C,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,4HAA4H,CAAC,CAAC,CAAC,EAAe2C,EAAwB3C,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,EAAe4C,EAAwB5C,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,CAAC,CAAC,EAAe6C,EAAwB7C,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,oHAA+G,CAAC,CAAC,CAAC,EAAe8C,GAAwB9C,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,CAAC,CAAC,EAAe+C,GAAwB/C,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,2HAA2H,CAAC,CAAC,CAAC,EAAegD,GAAwBhD,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,CAAC,CAAC,EAAeiD,GAAwBjD,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0IAA0I,CAAC,CAAC,CAAC,EAAekD,GAAwBpD,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2eAAse,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+fAA+f,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gVAA2U,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,wLAAmL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kEAAkE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ogBAA+f,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6RAAmR,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,8LAAyL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wTAAmT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0EAA0E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8uBAA8uB,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,0UAA0U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6jBAAmjB,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,sWAAkV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemD,GAAwBnD,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAeoD,GAAwBpD,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAeqD,GAAwBrD,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,gFAAgF,CAAC,CAAC,CAAC,EAAesD,GAAwBtD,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAeuD,GAAwBvD,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,EAAewD,GAAwBxD,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,CAAC,CAAC,EAAeyD,GAAwBzD,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,CAAC,CAAC,EAAe0D,GAAwB1D,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,CAAC,CAAC,EAAe2D,GAAwB3D,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,CAAC,CAAC,EAAe4D,GAAwB9D,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2bAAib,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,6OAA6O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kEAA6D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8xBAAqwB,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,gXAAgX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kEAA6D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,swBAAiwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2YAAsY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wjBAA8iB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iiBAA6gB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kgBAA6f,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8dAAyd,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8YAA8Y,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kbAAkb,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,qQAAqQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kEAA6D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wQAAwQ,CAAC,CAAC,CAAC,CAAC,EAAe6D,GAAwB7D,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAe8D,GAAwB9D,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,CAAC,CAAC,EAAe+D,GAAwB/D,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAegE,GAAwBhE,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,CAAC,CAAC,EAAeiE,GAAwBjE,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,CAAC,CAAC,EAAekE,GAAwBlE,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,wFAAwF,CAAC,CAAC,CAAC,EAAemE,GAAwBnE,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,EAAeoE,GAAwBpE,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeqE,GAAwBrE,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAesE,GAAwBxE,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qdAAqd,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+QAA+Q,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,+MAAqM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAAwN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+rBAAgrB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0yBAA0yB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,iNAAiN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,y0BAAqzB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qhBAAghB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wKAAwK,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,0RAA0R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuE,GAAwBvE,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,oGAA+F,CAAC,CAAC,CAAC,EAAewE,GAAwBxE,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,CAAC,CAAC,EAAeyE,GAAwBzE,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,CAAC,CAAC,EAAe0E,GAAwB1E,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,CAAC,CAAC,EAAe2E,GAAwB3E,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,iKAAiK,CAAC,CAAC,CAAC,EAAe4E,GAAwB5E,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8LAAoL,CAAC,CAAC,CAAC,EAAe6E,GAAwB7E,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,gGAAgG,CAAC,CAAC,CAAC,EAAe8E,GAAwB9E,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,oFAAoF,CAAC,CAAC,CAAC,EAAe+E,GAAwB/E,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAegF,GAAwBlF,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wTAAwT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0cAAgc,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,ySAAqR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+UAA+U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oXAAoX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oZAA+Y,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4UAA4U,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0SAAqS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mQAAmQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+QAA+Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4SAA4S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sMAAsM,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,sWAAuV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiF,GAAwBjF,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,kKAAkK,CAAC,CAAC,CAAC,EAAekF,GAAwBlF,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,gKAAgK,CAAC,CAAC,CAAC,EAAemF,GAAwBnF,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yIAAyI,CAAC,CAAC,CAAC,EAAeoF,GAAwBpF,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,mJAAmJ,CAAC,CAAC,CAAC,EAAeqF,GAAwBrF,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,gMAAgM,CAAC,CAAC,CAAC,EAAesF,GAAwBtF,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,2QAAsQ,CAAC,CAAC,CAAC,EAAeuF,GAAwBvF,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8IAA8I,CAAC,CAAC,CAAC,EAAewF,GAAwBxF,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,gMAAgM,CAAC,CAAC,CAAC,EAAeyF,GAAwBzF,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,gJAAgJ,CAAC,CAAC,CAAC,EAAe0F,GAAwB5F,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sgBAAsgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qqBAAyqB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2hBAAihB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+nBAAkoB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2DAA2D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ipBAAkpB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+kBAAilB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ovBAAovB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wkBAA4kB,CAAC,CAAC,CAAC,CAAC,EAAe2F,GAAwB3F,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,2GAA2G,CAAC,CAAC,CAAC,EAAe4F,GAAwB5F,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAe6F,GAAwB7F,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,EAAe8F,GAAwB9F,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,CAAC,CAAC,EAAe+F,GAAwB/F,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAegG,GAAwBhG,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAeiG,GAAwBjG,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,CAAC,CAAC,EAAekG,GAAwBlG,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,EAAemG,GAAwBnG,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,EAAeoG,GAAyBtG,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wiBAAqjBE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6NAA0OA,EAAE,SAAS,CAAC,SAAS,8DAAyD,CAAC,EAAE,oVAAoV,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4EAA4E,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qoBAAwoBE,EAAE,SAAS,CAAC,SAAS,6GAA6G,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+bAA+b,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8dAA8d,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sXAAsX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wxBAAwxB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2cAA2c,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,waAAwa,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeqG,GAAyBrG,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,EAAesG,GAAyBtG,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAeuG,GAAyBvG,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,EAAewG,GAAyBxG,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,CAAC,CAAC,EAAeyG,GAAyBzG,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0EAA0E,CAAC,CAAC,CAAC,EAAe0G,GAAyB1G,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,CAAC,CAAC,EAAe2G,GAAyB3G,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,+GAA0G,CAAC,CAAC,CAAC,EAAe4G,GAAyB5G,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,CAAC,CAAC,EAAe6G,GAAyB/G,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2jBAAsjB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6pBAAwpB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ogBAAogB,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,wIAAwI,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4EAA4E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kfAAod,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8eAAgd,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ukBAAqhB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wVAA8U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wbAAoa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0fAAud,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qeAAid,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0VAA0V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0TAAgT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qFAAqF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qdAA6a,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gdAA2c,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gWAAsV,CAAC,CAAC,CAAC,CAAC,EAAe8G,GAAyB9G,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAe+G,GAAyB/G,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,CAAC,CAAC,EAAegH,GAAyBhH,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeiH,GAAyBjH,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,EAAekH,GAAyBlH,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,EAAemH,GAAyBnH,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,mGAAmG,CAAC,CAAC,CAAC,EAAeoH,GAAyBpH,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,CAAC,CAAC,EAAeqH,GAAyBrH,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,CAAC,CAAC,EAAesH,GAAyBtH,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,CAAC,CAAC,EAAeuH,GAAyBzH,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sNAAsN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,shBAAihB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kSAA6R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mUAA8T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,snBAA4mB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qEAAqE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6TAA6T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yTAAyT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+UAA0U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,0IAA0I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewH,GAAyBxH,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,CAAC,CAAC,EAAeyH,GAAyBzH,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,CAAC,CAAC,EAAe0H,GAAyB1H,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,mGAAmG,CAAC,CAAC,CAAC,EAAe2H,GAAyB3H,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8EAA8E,CAAC,CAAC,CAAC,EAAe4H,GAAyB5H,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAe6H,GAAyB7H,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,EAAe8H,GAAyB9H,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAe+H,GAAyB/H,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0EAA0E,CAAC,CAAC,CAAC,EAAegI,GAAyBhI,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,CAAC,CAAC,EAAeiI,GAAyBnI,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2YAAsY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,20BAAmyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8cAA8c,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2UAAuT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8uBAA0tB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mQAA8P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,whBAA8gB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iIAA4H,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sRAAiR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wMAA8L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oRAAqQ,CAAC,EAAeF,EAAE,aAAa,CAAC,SAAS,CAAcE,EAAE,IAAI,CAAC,SAAS,yOAAyO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekI,GAAyBlI,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,gGAA2F,CAAC,CAAC,CAAC,EAAemI,GAAyBnI,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,kGAA6F,CAAC,CAAC,CAAC,EAAeoI,GAAyBpI,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8EAA8E,CAAC,CAAC,CAAC,EAAeqI,GAAyBrI,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,CAAC,CAAC,EAAesI,GAAyBtI,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,CAAC,CAAC,EAAeuI,GAAyBvI,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAewI,GAAyBxI,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0EAA0E,CAAC,CAAC,CAAC,EAAeyI,GAAyBzI,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAe0I,GAAyB1I,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAe2I,GAAyB7I,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mSAAmS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wRAAwR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mZAAyY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2SAA2S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0SAA0S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oSAAoS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oVAA+U,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kcAAwb,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uRAAuR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4eAAue,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mQAAyP,CAAC,CAAC,CAAC,CAAC,EAAe4I,GAAyB5I,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAe6I,GAAyB7I,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAe8I,GAAyB9I,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAe+I,GAAyB/I,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,2GAA2G,CAAC,CAAC,CAAC,EAAegJ,GAAyBhJ,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,CAAC,CAAC,EAAeiJ,GAAyBjJ,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,CAAC,CAAC,EAAekJ,GAAyBlJ,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,qFAAqF,CAAC,CAAC,CAAC,EAAemJ,GAAyBnJ,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,4FAAuF,CAAC,CAAC,CAAC,EACxo/GoJ,GAAqB,CAAC,QAAU,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,YAAc,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "richText16", "richText17", "richText18", "richText19", "richText20", "richText21", "richText22", "richText23", "richText24", "richText25", "richText26", "richText27", "richText28", "richText29", "richText30", "richText31", "richText32", "richText33", "richText34", "richText35", "richText36", "richText37", "richText38", "richText39", "richText40", "richText41", "richText42", "richText43", "richText44", "richText45", "richText46", "richText47", "richText48", "richText49", "richText50", "richText51", "richText52", "richText53", "richText54", "richText55", "richText56", "richText57", "richText58", "richText59", "richText60", "richText61", "richText62", "richText63", "richText64", "richText65", "richText66", "richText67", "richText68", "richText69", "richText70", "richText71", "richText72", "richText73", "richText74", "richText75", "richText76", "richText77", "richText78", "richText79", "richText80", "richText81", "richText82", "richText83", "richText84", "richText85", "richText86", "richText87", "richText88", "richText89", "richText90", "richText91", "richText92", "richText93", "richText94", "richText95", "richText96", "richText97", "richText98", "richText99", "richText100", "richText101", "richText102", "richText103", "richText104", "richText105", "richText106", "richText107", "richText108", "richText109", "richText110", "richText111", "richText112", "richText113", "richText114", "richText115", "richText116", "richText117", "richText118", "richText119", "richText120", "richText121", "richText122", "richText123", "richText124", "richText125", "richText126", "richText127", "richText128", "richText129", "richText130", "richText131", "richText132", "richText133", "richText134", "richText135", "richText136", "richText137", "richText138", "richText139", "richText140", "richText141", "richText142", "richText143", "richText144", "richText145", "richText146", "richText147", "__FramerMetadata__"]
}
