{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/x0eWNs4bGtFLBwoYi5C8/EauGYYCUkZo5KKQEG5dK/QsZaADSSZ-2.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{Link as n}from\"framer\";import{motion as i}from\"framer-motion\";import*as a from\"react\";export const richText=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"h3\",{children:[/*#__PURE__*/e(\"em\",{children:\"New capability enables secure, real-time data streaming from legacy OT systems to modern analytics platforms\u2014driving uptime, AI-readiness, and operational resilience.\"}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AUSTIN, Texas \u2013 July 15, 2025\"}),\" \u2013 \",/*#__PURE__*/e(n,{href:\"https://dispel.com/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel\"})}),\", the leader in Secure Remote Access (SRA) for Operational Technology (OT), \",/*#__PURE__*/e(n,{href:\"https://www.newswire.com/news/dispel-launches-industrial-data-streaming-to-power-ai-productivity-22609056\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"today announced the launch\"})}),\" of Industrial Data Streaming, a new capability built into the \",/*#__PURE__*/e(n,{href:\"https://dispel.com/products/dispel-zero-trust-engine\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel Zero Trust Engine\"})}),\" platform. The release marks a major advancement in secure, real-time data transfer for industrial environments\u2014bridging the gap between legacy systems and modern AI-driven operations, while accelerating OT efficiency, resilience, and insight at scale.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"Industrial teams in manufacturing, energy, utilities, and OEM sectors generate massive volumes of data from sensors, HMIs, control systems, and machines. But without a secure, scalable way to stream that data in real time, predictive maintenance (PdM) stalls, patching slows, and AI initiatives remain siloed.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"Dispel\u2019s Industrial Data Streaming solves this challenge\u2014enabling real-time transfer of logs and sensor data, supporting secure patching, proactive maintenance, supply chain optimization, and continuous operational insights across distributed industrial environments. This leads to greater operational efficiency and faster time-to-value across distributed environments.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\u201COperational efficiency and productivity are powered by secure access to real-time data,\u201D said Ethan Schmertzler, Co-CEO of Dispel. \u201CWe designed Industrial Data Streaming to help organizations cut downtime, standardize operations, and turn AI potential into real-world results.\u201D\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Industrial Data Streaming: Secure, Scalable, Real-Time\"}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"Today\u2019s industrial environments produce vast volumes of data\u2014but most still rely on siloed data, delaying decision-making and limiting AI readiness.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Dispel\u2019s Industrial Data Streaming helps organizations:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Standardize operations\"}),\" \u2013 Unify data across sites for faster rollups and enterprise-wide visibility\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Simplify updates\"}),\" \u2013 Push patches and configurations across fleets securely\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable predictive maintenance\"}),\" \u2013 Stream real-time data to PdM and AI platforms\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scale with ease\"}),\" \u2013 Route data from multiple sources to many destinations\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Accelerate compliance\"}),\" \u2013 Centralize data for easier audits and reporting\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Support any data type\"}),\" \u2013 Format- and protocol-agnostic transport layer\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Modernize legacy systems\"}),\" \u2013 Extend infrastructure life and unlock new value\\xa0\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Today\u2019s industrial organizations are investing heavily in AI and digital transformation initiatives. But without reliable access to real-time OT data, predictive insights and automated updates, backup transfers, and real time calibration\\xa0remain out of reach.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Dispel removes that barrier\u2014streaming secure, actionable data from OT environments to analytics tools, patching systems, and AI platforms in real time.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"Learn more about \",/*#__PURE__*/e(n,{href:\"https://dispel.com/solutions/industrial-data-streaming\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Industrial Data Streaming\"})}),\", or to request a demo today!\"]})]});export const richText1=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Before we ever built an OT\\xa0cybersecurity platform, we learned a lesson about stealth, adaptability, and trust\u2014from a barn owl named Emily. This is the story behind our logo, and how it continues to shape the way we protect industrial environments.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Whoo's the owl?\"})}),/*#__PURE__*/e(\"p\",{children:\"This question comes up more than you\u2019d expect\u2014at industry events, on customer calls, or while chatting with someone in line at airport security:\\xa0\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"\u201CWhat\u2019s with the owl?\u201D\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"Fair question. Most cybersecurity companies go with something aggressive\u2014shields, locks, grids, or abstract symbols.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"We went with a barn owl.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"And the reason is simple: it\u2019s not just a logo. It\u2019s a reminder of how we\u2019ve approached security from the very beginning\u2014and it starts well before Dispel even existed.\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"It Started with Emily\"})}),/*#__PURE__*/e(\"p\",{children:\"When Ethan (Co-CEO) and I were kids, we had the opportunity to spend a summer in Scotland, where we visited a wildlife center that rescues birds of prey. There were falcons and eagles\u2014huge, high-strung animals trained for falconry. Beautiful, but not exactly hands-on for a couple of curious kids.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Then there was Emily, a barn owl that had been raised at the center as an injured owlet.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Unlike the others, Emily wasn\u2019t much for showing off. But she always kept us guessing.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"She\u2019d quietly follow us around the grounds. If she liked you, she\u2019d fly over, cling to your arm, and curl up inside your jacket like it was home.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"She wasn\u2019t loud.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"She wasn\u2019t predictable.\\xa0\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"The Owl That Shaped the Way We Think About Security\"})}),/*#__PURE__*/e(\"p\",{children:\"That memory stuck with us.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"When we later built Dispel, Emily came back to mind\u2014not because we were thinking about branding, but because she had already taught us something vital: Good security moves like she did.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"She was:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Silent\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Hard to detect\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Always adapting\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Never in one place for too long\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Alert\\xa0\"})})]}),/*#__PURE__*/e(\"p\",{children:\"That became our blueprint. Security that works silently in the background. That stays out of the way. That protects without disrupting the people doing the real work.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"It inspired our foundation: Moving Target Defense, built into the \",/*#__PURE__*/e(n,{href:\"https://dispel.com/products/dispel-zero-trust-engine\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel Zero Trust Engine\"})}),\". Instead of static systems adding barriers and waiting for threats, our platform continuously shifts remote access points and network pathways.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"Attack surfaces don\u2019t sit still.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"Adversaries can\u2019t rely on patterns.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"And operational teams can work without friction.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"We didn\u2019t want to build security that just sat on the perimeter.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"We wanted motion.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"We wanted unpredictability.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"We wanted cybersecurity that behaves more like Emily\u2014calm, silent, hard to pin down.\\xa0\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"10 Years Later, the Owl Still Guides Us\"})}),/*#__PURE__*/t(\"p\",{children:[\"We didn\u2019t choose a barn owl to be clever or different.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"We chose it because it reflects everything we set out to build.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"In industrial environments, that kind of security matters. Systems can\u2019t afford noise. Operators can\u2019t afford friction.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Security must be present, but never in the way.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Now, as we mark ten years of Dispel, it felt like the right time to share where that thinking came from\u2014not a boardroom, not a pitch deck, but a quiet summer in Scotland\u2026 and a bird who taught us more than we realized at the time.\"})]});export const richText2=/*#__PURE__*/e(a.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[\"Learn how Dispel\u2019s \",/*#__PURE__*/e(n,{href:\"https://dispel.com/solutions/secure-remote-access\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Moving Target Defense\"})}),\" helps remote access with secured silence, not noise.\"]})});export const richText3=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"At the Gartner Security & Risk Management Summit 2025, I spoke with CISOs, OT administrators, and cybersecurity architects working to secure industrial environments. While the big themes of AI, zero trust, and IT risk dominated the sessions, the hallway conversations pointed to a more pressing shift:\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"\u201CWe know what\u2019s in our OT environment. Now how do we act on it?\u201D\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"This shift\u2014from discovery to action\u2014and how secure remote access is redefining the digital transformation journey in OT, was eye-opening. Here\u2019s what I took away from those conversations and how Dispel is helping teams make the leap.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:'1. \"Every site has its own remote access setup. Can we standardize it?\"'})}),/*#__PURE__*/e(\"p\",{children:'At the Summit, I spoke with an OT administrator from a major food manufacturer. He described the challenge of managing remote access across multiple sites\u2014juggling browsers, jump boxes, legacy VPNs, and contractor-specific tools.\\xa0\"Every site has its own nonstandard setup,\" he told me. \"Standardizing would be a game changer.\"\\xa0'}),/*#__PURE__*/t(\"p\",{children:[\"It\u2019s a familiar story\u2014and one that\u2019s exactly why our \",/*#__PURE__*/e(n,{href:\"https://dispel.com/blog/dispel-announces-industry-s-first-tiered-connection-suite-for-ot-secure-remote-access-at-the-gartner-security-risk-management-summit-2025\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Tiered Connection Suite announcement\"})}),\" resonated so strongly. For OT teams struggling with fragmented access tools, the concept of centralizing connections clicked immediately. \\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Dispel\u2019s Tiered Connection Suite brings it all together\u2014clientless browser sessions, full-featured virtual desktops, and local application access\u2014within a single, secure platform built for OT environments.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Key takeaway:\"}),\" Flexibility for OT teams\\xa0cannot be overstated\u2014they need one unified platform that supports all their tools and use cases.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"2. \u201CVendor A needs a jump box. But what happens when there are 100?\u201D\"})}),/*#__PURE__*/e(\"p\",{children:\"One of the most urgent conversations I had was with a security manager overseeing dozens of manufacturing sites. \u201COur jump host maintenance is out of control,\u201D she told me. \u201CThey\u2019re always out of date. It becomes a balancing act between keeping up and looking the other way on security.\u201D\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"We talked through the reality:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"It starts easy\u2014spin up a virtual machine for Vendor A\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"But a month later, it\u2019s already outdated\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Then Vendor A becomes Vendor A1 through A10 as staff expands\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Now multiply that across 100 sites\\xa0\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Suddenly, you\u2019re managing and patching thousands of jump hosts\u2014each with different users, permissions, and compliance requirements.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"And that\u2019s just scratching the surface. These \",/*#__PURE__*/e(n,{href:\"https://dispel.com/blog/modernizing-ot-secure-remote-access-replacing-rpam-and-jump-servers-in-industrial-environments\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"jump hosts aren\u2019t just high-maintenance\"})}),\"\u2014they\u2019re operationally expensive. With recent licensing changes from VMware and Citrix, teams are paying more for increasingly poor performance. Worse still, these static systems can\u2019t scale elastically, forcing organizations to over-provision for Black Swan access events.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"The true cost of jump hosts includes:\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Constant patching and lifecycle management across hundreds of VMs\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Licensing costs that balloon with vendor growth\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Layered PAM tools just to manage identities per host\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Over-provisioned infrastructure to account for peak vendor surges\\xa0\"})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Dispel eliminates these burdens by:\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Providing cloud-native access that scales up or down dynamically\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Removing the cost and complexity of jump boxes and PAM integrations\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Offering session isolation, MFA, and fine-grained access controls out of the box\\xa0\"})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Key takeaway: \"}),\"Jump hosts were built for a different era of IT-centric thinking but are still frequently used in OT to provide intermediate security.\\xa0There is a better way.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:'3. \"When our OT lead retired, we lost 10 years of knowledge.\"'})}),/*#__PURE__*/e(\"p\",{children:\"At dinner one night, a utility CISO shared a sobering story. Their most experienced OT lead retired, and with him went over a decade of undocumented know-how. The replacement team had no playbooks to follow, just a steep learning curve.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"That\u2019s when session recording came up. More than a compliance checkbox, session recording is a training tool, capturing institutional knowledge in real time.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Dispel delivers value by:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Recording every remote session for auditing and training\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Helping organizations build internal playbooks\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Preserving expertise across vendor and employee turnover\\xa0\"})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Key takeaway:\"}),\" Session recording is about more than security. It\u2019s about continuity.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"4. \u201CWe have the data\u2014we just can\u2019t use it\u201D\"})}),/*#__PURE__*/e(\"p\",{children:\"A controls engineer from a global OEM summed it up perfectly: \u201CWe have the data. But it\u2019s delayed, siloed, or insecure. It\u2019s just not bringing the value we had hoped.\u201D\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"That\\xa0sentiment\\xa0echoed across the Summit. The roadblock wasn\u2019t AI\u2014it was data readiness. Real-time insights, predictive maintenance, and condition monitoring all depend on continuous, trusted access to operational data. But legacy systems weren\u2019t built to share that data easily, let alone securely.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"The algorithms are ready. The problem is the infrastructure.\"}),\"\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Dispel helps bridge that gap by enabling:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Real-time data streaming of operational data from both legacy and modern systems\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Unified data flows that support AI, predictive maintenance (PdM), patching, and compliance\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Format-agnostic compatibility aligned with IEC 62443, NIST 800-82, NIS2, and more\\xa0\"})})]}),/*#__PURE__*/e(\"p\",{children:\"With continuous, secure data flow in place, industrial organizations can:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Standardize operations across multi-site or merged facilities\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Accelerate PdM, AI, and condition-based monitoring at scale\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Improve response times and reduce unplanned downtime\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Build secure data lakes for AI training and long-term insight\\xa0\"})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Key takeaway: \"}),\"AI in OT doesn\u2019t fail because of the models. It fails because of fragmented, insecure data. \",/*#__PURE__*/e(n,{href:\"https://dispel.com/solutions/industrial-data-streaming\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel\u2019s industrial data streaming\"})}),\" makes your data usable\u2014where, when, and how you need it.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:'5. \"OT is a blind spot\u2014and we don\u2019t really know what good looks like.\"'})}),/*#__PURE__*/e(\"p\",{children:\"At a roundtable dinner, a CISO from a major energy provider voiced a concern we hear often: \u201COT is a blind spot. I can\u2019t replace the systems\u2014and even if I could, they\u2019d be legacy again in two years. How am I supposed to secure something that wasn\u2019t designed for connectivity?\u201D\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"That question stuck with me. It\u2019s not about modernizing every piece of equipment. It\u2019s about building a secure environment around them.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"That\u2019s when I shared what I call the \u201Csubmarine model.\u201D Just like in the ocean depths, operators aren\u2019t meant to withstand the full pressure of cybersecurity threats on their own. So, you don\u2019t harden the operator\u2014you build the submarine around them. A secure, dynamic environment that adapts to threats and protects them while they do their job.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Dispel enables this with:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Moving Target Defense SD-WAN, eliminates static pathways, reducing your attack surface.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Layered protections including encryption, session isolation, segmented pathways, integrated threat monitoring, and audit logging\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A secure access shell that updates and patches itself\u2014not the operator\\xa0\"})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Key takeaway\"}),\": You don\u2019t need to overhaul every legacy system to achieve Zero Trust in OT. With \",/*#__PURE__*/e(n,{href:\"https://dispel.com/products/dispel-zero-trust-engine\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"the right platform\"})}),\", you protect your people and assets without disruption\u2014secure by design, efficient by necessity.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Redefining How You Connect to OT \u2014 Industrial's Next Phase in Cybersecurity\"})}),/*#__PURE__*/e(\"p\",{children:\"I\u2019ll close with a conversation I had with an analyst, where we agreed: 2025 is a turning point for OT cybersecurity\u2014the end of knowing, and the beginning of doing.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"Most industrial organizations have now deployed\u2014or are actively evaluating\u2014solutions like \",/*#__PURE__*/e(n,{href:\"https://dispel.com/resources/integrations/nozomi-networks\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Nozomi Networks\"})}),\", Dragos, Armis, and Claroty. These are critical for asset discovery, vulnerability management, and threat detection. They\u2019ve implemented segmentation, endpoint protection, and monitoring.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"But the next step is clear: It\u2019s time to act on that visibility. \\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Dispel represents the execution layer of industrial digital transformation\u2014providing the secure access, control, and responsiveness needed to operationalize cybersecurity and unlock operational efficiency.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Here\u2019s where we fit in:\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"We integrate with \u201Cknowing tools,\u201D the asset visibility and threat detection ecosystem, to enable action.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"We deliver the \u201Cdoing\u201D layer\u2014Zero Trust Remote Access and real-time data streaming that empowers OT teams.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"We help organizations unlock the full value of their OT data and accelerate safe, efficient remote operations.\\xa0\"})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Key takeaway:\"}),\" OT cybersecurity is evolving. The next phase of digital transformation is about redefining how you connect to OT.\\xa0\"]})]});export const richText4=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"h4\",{children:/*#__PURE__*/e(\"strong\",{children:\"Let\u2019s unlock your team's full value.\"})}),/*#__PURE__*/t(\"p\",{children:[\"Schedule a walkthrough of the Dispel Zero Trust Engine to standardize access, cut downtime, and unlock AI-driven operations. \",/*#__PURE__*/e(n,{href:\"https://dispel.com/book\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Book a personalized demo\"})})]})]});export const richText5=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"em\",{children:\"New capabilities deliver an end-to-end solution across all three remote access methods used in industrial operations\u2014enabling a 93% reduction in standard connection times.\"})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"National Harbor, Maryland \u2013 June 9, 2025\"}),\" \u2013 \",/*#__PURE__*/e(n,{href:\"https://dispel.com/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel\"})}),\", the leader in Secure Remote Access (SRA) for Operational Technology (OT), today \",/*#__PURE__*/e(n,{href:\"https://www.newswire.com/news/dispel-announces-industrys-first-tiered-connection-suite-for-ot-secure-22587558\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"announced the launch\"})}),\" of its Tiered Connection Suite at the Gartner Security & Risk Management Summit 2025. This new offering represents a significant step forward in standardizing \",/*#__PURE__*/e(n,{href:\"https://dispel.com/solutions/secure-remote-access\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"OT secure remote access\"})}),\" and simplifying connectivity for industrial organizations.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"Built into the Dispel Zero Trust Engine platform, this connection suite replaces legacy tools with a unified platform that simplifies, accelerates, and secures remote access across industrial environments.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\u201CWe listened closely to our customers\u2014industrial leaders needed operational efficiency, faster response, and immediate ROI,\u201D said Ethan Schmertzler, Co-CEO of Dispel. \u201CWe built a platform to meet them where they are\u2014standardizing access and driving operational value at scale, designed for how OT really works.\u201D\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Most SRA tools fall short of operational needs. Browser-only solutions offer limited 1:1 connectivity, RPAM platforms are an IT solution, while VPNs and jump hosts introduce security and scalability challenges. As a result, manufacturers, utilities, and energy providers often patch together multiple tools to support diverse use cases. This fragmented approach creates complexity, slows operations, and amplifies security and compliance risk.\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"The \",/*#__PURE__*/e(n,{href:\"https://dispel.com/products/dispel-zero-trust-engine\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel Zero Trust Engine\"})}),\" simplifies this complexity with a secure, scalable platform that delivers policy-driven OT remote access\u2014tailored for operators, contractors, and third-party vendors.\\xa0\"]}),/*#__PURE__*/t(\"h3\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Tiered Connection Suite:\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Clientless Browser Connect\"}),\" \u2013 The industry standard for lightweight, secure, and fast access\u2014ideal for quick, task-based sessions.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Virtual Desktop\"}),\" \u2013 A best-in-class, full-featured engineering workstation that delivers the highest security posture and supports multi-site capabilities.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Local Application\"}),\" \u2013 Enables direct access to legacy systems and custom tools, purpose-built for remote environments.\\xa0\"]})})]}),/*#__PURE__*/t(\"h3\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Only Dispel Delivers:\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Elimination of jump servers and VPNs to enhance operational efficiency and security.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Burst capacity to support vendor remote access surges\u2014scaling to 100+ users in minutes.\\xa0\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Ready to standardize your OT secure remote access strategy? Explore the Dispel Zero Trust Engine today at \",/*#__PURE__*/e(n,{href:\"https://dispel.com/products/dispel-zero-trust-engine\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"dispel.com.\"})}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"About the Gartner Security & Risk Management Summit\\xa0\"}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"Gartner analysts will present the latest research and advice for security and risk management leaders at the Gartner Security & Risk Management Summits, taking place June 9-11 in\",/*#__PURE__*/e(n,{href:\"https://www.gartner.com/en/conferences/na/security-risk-management-us\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\" National Harbor, MD\"})}),\", July 23-25 in\",/*#__PURE__*/e(n,{href:\"https://www.gartner.com/en/conferences/apac/security-risk-management-japan\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\" Tokyo\"})}),\", August 5-6 in\",/*#__PURE__*/e(n,{href:\"https://www.gartner.com/en/conferences/la/security-risk-management-brazil\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\" Sao Paulo\"})}),\" and September 22-24 in\",/*#__PURE__*/e(n,{href:\"https://www.gartner.com/en/conferences/emea/security-risk-management-uk\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\" London\"})}),\". Follow news and updates from the conferences on X using \",/*#__PURE__*/e(n,{href:\"https://twitter.com/search?q=%23GartnerSEC&src=typd\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[\"noreferrer\"],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"#GartnerSEC\"})}),\".\",/*#__PURE__*/e(\"strong\",{children:\"\\xa0\"}),\"\\xa0\"]})]});export const richText6=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"h4\",{children:/*#__PURE__*/e(\"em\",{children:\"Mitsubishi Electric and Dispel partnership delivers best-in-class OT secure remote access\u2014enhancing uptime, safety, and performance across global manufacturing.\"})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Vernon Hills, Illinois, June 3, 2025\"}),\" \u2014 Mitsubishi Electric Automation, Inc., a global leader in factory automation, and \",/*#__PURE__*/e(n,{href:\"https://dispel.com/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel\"})}),\", the leader in secure remote access for operational technology (OT), \",/*#__PURE__*/e(n,{href:\"https://www.newswire.com/news/mitsubishi-electric-and-dispel-set-new-standard-in-ot-cybersecurity-22581931\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"today announced\"})}),\" that their solution has been honored with a 2025 Control Engineering \",/*#__PURE__*/e(n,{href:\"https://www.controleng.com/product-of-the-year/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Product of the Year award\"})}),\". The collaboration earned Bronze in the Safety & Cybersecurity category for the \",/*#__PURE__*/e(n,{href:\"https://us.mitsubishielectric.com/fa/en/products/software/remote-access/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel Zero Trust Engine remote access solution\"})}),\", now integrated into Mitsubishi Electric\u2019s factory automation and OT cybersecurity portfolio.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"This recognition marks a significant milestone in the partnership between Mitsubishi Electric and Dispel to provide secure, scalable remote access for critical industrial operations.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"\u201CAt Mitsubishi Electric, innovation in OT security means delivering solutions that empower manufacturers to safely adopt digital transformation,\u201D said Aga Zupancic, Product Manager at Mitsubishi Electric Automation. \u201CBy partnering with Dispel, we are bringing award winning, Zero Trust technology directly into the automation space\u2014giving our customers secure, reliable remote access that enhances productivity without compromising safety.\u201D\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"The award-winning solution offers \",/*#__PURE__*/e(n,{href:\"https://dispel.com/solutions/secure-remote-access\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"OT Secure Remote Access\"})}),\" to monitor, control, and verify remote operations across manufacturing environments. Built to support customers through every stage of the equipment lifecycle\u2014from design to operation and maintenance\u2014the technology helps advance Mitsubishi Electric\u2019s broader mission to enable circular digital engineering and more resilient industrial systems.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"\u201CWe\u2019re honored to be part of Mitsubishi Electric\u2019s vision for secure automation,\u201D said Ian Schmertzler, Co-CEO of Dispel. \u201CThis award represents our shared goal to give industrial teams secure, frictionless remote access so they can focus on uptime, safety, and performance. We\u2019re proud that our platform is helping Mitsubishi Electric deliver that value at scale.\u201D\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Together, Mitsubishi Electric and Dispel are redefining how industrial organizations secure remote operations\u2014delivering cyber-resilient solutions that support productivity, safety, and digital innovation across the manufacturing sector.\\xa0\"})]});export const richText7=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"Explore how Dispel powers \",/*#__PURE__*/e(n,{href:\"https://dispel.com/products/dispel-zero-trust-engine\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"OT secure remote access\"})}),\" for Mitsubishi Electric and factory automation.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"About Mitsubishi Electric Automation, Inc. \"}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"Headquartered in Vernon Hills, Ill., Mitsubishi Electric Automation, Inc. is a U.S. affiliate company of Mitsubishi Electric Corporation. It offers a broad product portfolio including \",/*#__PURE__*/e(n,{href:\"https://us.mitsubishielectric.com/fa/en/products/cnt/programmable-controllers/melsec-iq-r-series/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"programmable automation controllers (PAC)\"})}),\", \",/*#__PURE__*/e(n,{href:\"https://us.mitsubishielectric.com/fa/en/products/cnt/programmable-controllers/melsec-iq-f-series/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"programmable logic controllers (PLC)\"})}),\", \",/*#__PURE__*/e(n,{href:\"https://us.mitsubishielectric.com/fa/en/products/human-machine-interface/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"human machine interfaces (HMI)\"})}),\", \",/*#__PURE__*/e(n,{href:\"https://us.mitsubishielectric.com/fa/en/products/drv/inverters-freqrol/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"variable frequency drives (VFD)\"})}),\", \",/*#__PURE__*/e(n,{href:\"https://us.mitsubishielectric.com/fa/en/products/drv/servos/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"servo amplifiers and motors\"})}),\", \",/*#__PURE__*/e(n,{href:\"https://us.mitsubishielectric.com/fa/en/products/software/visualization/genesis64/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"control software\"})}),\", \",/*#__PURE__*/e(n,{href:\"https://us.mitsubishielectric.com/fa/en/products/cnt/computerized-numerical-controllers/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"computerized numerical controllers (CNC)\"})}),\", \",/*#__PURE__*/e(n,{href:\"https://us.mitsubishielectric.com/fa/en/products/cnt/motion-controllers/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"motion controllers\"})}),\", \",/*#__PURE__*/e(n,{href:\"https://us.mitsubishielectric.com/fa/en/products/rbt/industrial-robots/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"robots\"})}),\" and \",/*#__PURE__*/e(n,{href:\"https://us.mitsubishielectric.com/fa/en/products/lvd/circuit-breakers/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"low-voltage power distribution products\"})}),\". Additional information about Mitsubishi Electric Automation is available at \",/*#__PURE__*/e(n,{href:\"https://us.mitsubishielectric.com/fa/en/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"us.mitsubishielectric.com/fa/en/\"})}),\".\\xa0\"]})]});export const richText8=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"I met the Director of OT from a major manufacturing group at a conference just outside Boston, sitting at a weathered steel table on the hotel patio. They\u2019d just wrapped up a massive roll-up\u2014merging seven facilities under one umbrella. He looked at me, shook his head, and said, \u201CIt\u2019s like trying to conduct an orchestra where every instrument plays in a different key.\u201D\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"With their rollup strategy executed, his team\\xa0inherited a tangle of control systems, legacy equipment, and site-specific processes\u2014along with seven different \",/*#__PURE__*/e(n,{href:\"https://dispel.com/solutions/secure-remote-access\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"remote access technologies\"})}),\". \u201CWe had VPNs and jump servers across some sites, browser portals at others, an RPAM tool we never fully configured, and don\u2019t even get me started on the Excel-based workflows,\u201D he added. \u201CThe only thing they had in common was how much overhead they created.\u201D\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"His team\u2019s goal was clear: standardize secure remote access. Not just for internal engineers and operators, but for the OEMs and contractors their operations depended on every week. \u201CWe needed to cut through the mess. Time is money in manufacturing, and we were burning both just trying to get people to their equipment.\u201D\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"They\u2019d spoken with the usual IT SRA vendors. Most promised fast deployments and scalable platforms. \u201CBut once we got into the details, it was always the same story\u2014six to twelve months to deploy, a box shipped to your site, and a \u2018how to get started\u2019 PDF,\u201D he said. \u201CWe couldn\u2019t wait. We needed something we could stand up in days\u2014not quarters.\u201D\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[\"That\u2019s when I introduced him to the \",/*#__PURE__*/e(n,{href:\"https://dispel.com/products/dispel-zero-trust-engine\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel Zero Trust Engine\"})}),\". We talked about how Dispel was different. Our flexible deployment models\u2014SaaS, Private Cloud, Hybrid, or On-Prem\u2014were purpose-built for their operational realities.\\xa0I told him, we would partner with his team from day one, handle onboarding directly, stay hands-on through deployment, and wouldn't leave until the job was done.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Fast forward through a few months of talks and Dispel was able to deploy their first site in under 3 hours. Within the first 30 days, they had consolidated all seven locations onto a single platform\u2014no more jump servers, no more tool sprawl.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"They gained centralized control, role-based access tailored to every user\u2014from field engineers to OEMs\u2014and burst-capacity vendor access that could flex up or down and scale to 100+ vendors on demand.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"But the biggest win? Time. \u201COur plant manager isn\u2019t spending 10 hours a week troubleshooting vendor access anymore,\u201D the Director said. \u201CNow we\u2019re focused on uptime and shaving down OpEx. We finally have a remote access solution that works the way we do.\u201D\\xa0\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Real-world results. Built for operational reality\"})}),/*#__PURE__*/t(\"p\",{children:[\"Every unproductive hour now costs automotive manufacturers up to $2.3 million, according to Siemens, \",/*#__PURE__*/e(\"em\",{children:\"The True Cost of Downtime 2024\"}),\". And 31% of facilities spend 30+ hours each week on scheduled maintenance, per a recent WorkTrek report. With stakes this high, scalable, efficient remote access isn\u2019t optional\u2014it\u2019s essential. Dispel is built for exactly that: to meet the demands of modern OT environments and scale when and where you need it.\\xa0\"]})]});export const richText9=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:\"Ready to untangle your remote access?\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:\"https://dispel.com/products/dispel-zero-trust-engine\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Explore how Dispel helps\"})}),\" industrial organizations deploy OT secure remote access at scale.\\xa0\"]})]});export const richText10=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"With the rise of remote workforces and globally distributed operations, today\u2019s OT environments are more complex\u2014and more fragmented\u2014than ever before. From legacy systems to IIoT devices, many industrial organizations are forced to manage a patchwork of equipment that spans decades of technologies, protocols, and security models.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"In modern industrial environments, \",/*#__PURE__*/e(n,{href:\"https://dispel.com/solutions/secure-remote-access\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"remote access\"})}),\" isn\u2019t just a convenience\u2014it\u2019s a necessity for monitoring and managing critical systems. And we understand the roadblocks you're up against. Industrial organizations face unique challenges and threats that traditional IT-focused remote privileged access management (RPAM) and secure remote access solutions were never designed to handle. Too often, organizations fail to allocate adequate resources for OT security, often attempting to extend these IT-focused solutions into OT environments, leaving critical systems exposed to these unique threats and vulnerabilities.\\xa0\\xa0\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"RPAM Tools Were Not Built for OT \u2014 And It Shows\"})}),/*#__PURE__*/e(\"p\",{children:\"RPAM solutions work well for centralized IT environments, but they break down in OT networks. Why? Because RPAM assumes standardized systems, persistent connectivity, and user-role models that simply don\u2019t translate to industrial use cases.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Key limitations of RPAM in OT environments include:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Limited support for legacy systems and proprietary protocols\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Incompatibility with device- and interface-based access models\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Persistent, bidirectional connections that violate OT segmentation or air-gapped network designs\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Proxy-based access models that introduce latency\u2014unacceptable for time-sensitive control tasks\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Lack of process-level visibility or insight into device interactions\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Interfaces designed for IT administrators, not technicians in the field\\xa0\"})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:\"https://www.gartner.com/en/documents/5362663\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Gartner notes that while RPAM\"})}),\" tools manage IT systems and standard protocols effectively, they often fail to integrate with industrial infrastructure\u2014leading to operational disruption, configuration conflicts, and auditability gaps.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"The impact is real. In 2024, Dragos \",/*#__PURE__*/e(n,{href:\"https://www.dragos.com/ot-cybersecurity-year-in-review/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"intelligence shows\"})}),\" 65% of assessed OT environments had insecure remote access conditions, including misconfigurations, outdated systems, and weak segmentation.\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Jump Servers: High Maintenance, Low Security\"})}),/*#__PURE__*/e(\"p\",{children:\"Jump servers\u2014also called jump hosts or bastions\u2014were once seen as a stopgap solution for bridging access between IT and OT. But as threats have grown and infrastructures have scaled, the model has collapsed under its own weight.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Why jump servers fall short for OT:\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Grant broad access, violating least privilege principles\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Require individual jump hosts per asset or zone\u2014neither scalable nor secure\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Offer no granular session control, no just-in-time access, and no ability to block risky behavior like unauthorized file transfers\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Rely on shared credentials, which obscure user accountability and complicate incident response\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Often remain active after contractors or vendors depart, increasing insider risk\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Create massive operational overhead\u2014requiring constant patching, manual configuration, and labor-intensive content management\\xa0\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"In an environment where uptime is critical and resources are often limited, jump servers become a maintenance headache. Every host requires configuration, updates, vulnerability management, and access auditing. As environments scale, this multiplies\u2014quickly becoming unmanageable without ballooning operational staff. \\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"Security consequences are significant. A recent report revealed that \",/*#__PURE__*/e(n,{href:\"https://www.dragos.com/ot-cybersecurity-year-in-review/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"50% of ransomware incidents\"})}),\" stemmed from compromised remote access services, with attackers exploiting unpatched VPN appliances, or remote access applications, leading to severe operational disruptions. The inherent weaknesses of traditional remote access methods, such as corporate VPNs and jump servers, have expanded attack surfaces, exposing OT networks to escalating cyber threats.\\xa0\\xa0\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"A Patchwork of Remote Access Tools Creates More Problems Than It Solves\"})}),/*#__PURE__*/t(\"p\",{children:[\"To meet the needs of diverse users\u2014engineers, contractors, OEMs, and third-party vendors\u2014many organizations have cobbled together remote access solutions using VPNs, jump servers, RPAM, and vendor portals. The result is tool sprawl: inconsistent access policies, fragmented visibility, increased management overhead, and unexpected \u201Csticker shock\u201D in total cost of ownership.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"According to the \",/*#__PURE__*/e(n,{href:\"https://www.sans.org/white-papers/ics-ot-cybersecurity-survey-2023/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"SANS ICS/OT Cybersecurity Survey\"})}),\", 42% of organizations use three or more remote access tools, and 20% use five or more, often without centralized oversight. \",/*#__PURE__*/e(n,{href:\"https://www.dragos.com/wp-content/uploads/2023-Dragos-Ot-Cybersecurity-Year-In-Review.pdf\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dragos highlights\"})}),\" remote access complexity and lack of standardization as a top contributor to OT cyber incidents. Industry analysts like \",/*#__PURE__*/e(n,{href:\"https://www.arcweb.com/blog/industrial-companies-address-cybersecurity-challenges-digital-transformation\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"ARC Advisory Group\"})}),\" and \",/*#__PURE__*/e(n,{href:\"https://www.gartner.com/en/newsroom/press-releases/2023-05-10-gartner-identifies-three-key-initiatives-to-improve-industrial-operational-resilience\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Gartner\"})}),\" recommend platform consolidation to improve visibility, control, and resilience.\\xa0\\xa0\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Standardize OT Secure Remote Access\u2014Reduce Maintenance, Scale with Confidence\"})}),/*#__PURE__*/t(\"p\",{children:[\"Industrial organizations need more than retrofitted IT tools\u2014they need to standardize their remote access to eliminate tool sprawl, reduce maintenance burdens, achieve immediate value, and deliver security that matches the complexity of today\u2019s industrial environments.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"The path forward is clear: consolidate fragmented, high-maintenance remote access tools into a single, scalable platform designed for how OT really works.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"The \",/*#__PURE__*/e(n,{href:\"https://dispel.com/products/zero-trust-access\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel Zero Trust Engine\"})}),\" provides tailored OT secure remote access for every role and use case\u2014whether it\u2019s a field technician connecting to legacy systems, a remote vendor responding to an urgent issue, or a security team enforcing access policies in real time. Only Dispel gives you the flexibility to replace high-maintenance jump servers to improve operational efficiency and security. \\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"Dispel is engineered for scale\u2014supporting thousands of users, tens of thousands of endpoints, and hundreds of thousands of access control rules across globally distributed OT networks. Organizations can simplify and secure remote access across every environment\u2014while significantly reducing operational burden.\\xa0\"]})]});export const richText11=/*#__PURE__*/e(a.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ready to modernize your OT secure remote access strategy?\"}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(n,{href:\"https://dispel.com/contact-us\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Get in touch with our team\"})}),\" today or \",/*#__PURE__*/e(n,{href:\"https://go.dispel.com/on-demand-demo-how-the-dispel-zero-trust-engine-works\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"watch our new On-Demand Demo\"})}),\" to see the Dispel Zero Trust Engine in action!\\xa0\"]})});export const richText12=/*#__PURE__*/e(a.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AUSTIN, Texas, March 26, 2024\"}),\" \u2013 \",/*#__PURE__*/e(n,{href:\"https://stats.nwe.io/x/html?final=aHR0cHM6Ly9kaXNwZWwuY29tLw&sig=ourWkbuUARiO4YiMY7bBXnWBUi-DfKvWYtoGN9mfHb0rm1OCA3TJIoRkZVrXnkD3ENY_UWoIpib4IUcOSrQOtw&hit%2Csum=WyI0cmY2azIiLCI0cmY2azMiLCI0cmY2azQiXQ\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel\"})}),\", a leader in secure remote access solutions for industrial control systems (ICS) and operational technology (OT), has been named the \",/*#__PURE__*/e(n,{href:\"https://www.newswire.com/news/dispel-celebrates-2025-fastest-growing-cybersecurity-company-as-ot-22544275\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Fastest Growing Cybersecurity Company\"})}),\" in the 2025 Cybersecurity Excellence Awards. This recognition underscores Dispel\u2019s rapid growth and leadership in addressing the demand for OT Secure Remote Access across critical infrastructure industries, including manufacturing, energy, and utilities.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"As organizations increasingly rely on remote access solutions to operate, maintain, and update their mission-critical environments, the need for robust security has never been greater. According to \",/*#__PURE__*/e(n,{href:\"https://www.gartner.com/en/documents/5362663\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Gartner\\xae Innovation Insight\"})}),\", \u201CBy 2028, the percentage of attacks on Cyber-Physical Systems (CPS) using remote access vectors will grow from a negligible number today to over 15%.\u201D Industrial organizations are recognizing that traditional IT Remote Privileged Access Management (RPAM) solutions do not adequately support OT environments, driving a surge in the adoption of OT Secure Remote Access solutions like Dispel.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"Dispel has continued its growth trajectory through 2024 and Q1 2025, adding new customers, including \",/*#__PURE__*/e(n,{href:\"https://us.mitsubishielectric.com/fa/en/news-and-events/2024/march/dispel-launch/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Mitsubishi Electric Corporation\"})}),\", who integrated its Factory Automation (FA) equipment and OT security solutions with the Dispel Zero Trust Engine, enabling OT Secure Remote Access with comprehensive monitoring and control of industrial processes.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\u201CThis award is a testament to our ongoing mission to secure OT environments with the most advanced Zero Trust Remote Access solution available,\u201D said Ethan Schmertzler, Co-CEO of Dispel. \u201CAs industrial organizations modernize and face escalating cyber threats, we remain committed to delivering scalable, compliant, and highly secure remote access solutions to protect critical infrastructure.\u201D\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"The Cybersecurity Excellence Awards recognize companies, products, and professionals demonstrating leadership, innovation, and excellence in information security. As OT environments become more interconnected, the need for secure, scalable, and compliant remote access solutions is greater than ever. Dispel Zero Trust Engine is redefining how industrial organizations protect critical assets, manage vendor access, and ensure operational efficiency and resilience.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\u201CWe congratulate Dispel on this outstanding achievement in the \u2018Fastest Growing Cybersecurity Company\u2019 category of the \",/*#__PURE__*/e(n,{href:\"https://cybersecurity-excellence-awards.com/candidates/dispel-2025/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"2025 Cybersecurity Excellence Awards\"})}),\",\u201D said Holger Schulze, founder of Cybersecurity Insiders and organizer of the Cybersecurity Excellence Awards. \u201CAs we celebrate 10 years of recognizing cybersecurity excellence, your commitment to innovation and security sets a powerful example for the entire industry.\u201D\"]})});export const richText13=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"h4\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Take the First Step Toward OT Secure Remote Access \"}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:\"https://dispel.com/contact-us\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Get in touch with our team\"})}),\" today or \",/*#__PURE__*/e(n,{href:\"https://go.dispel.com/on-demand-demo-how-the-dispel-zero-trust-engine-works\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"watch our new On-Demand Demo\"})}),\" to see the Dispel Zero Trust Engine in action!\\xa0\"]})]});export const richText14=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"With the growth of remote workforces and distributed locations, \",/*#__PURE__*/e(n,{href:\"https://dispel.com/solutions/secure-remote-access\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"OT secure remote access\"})}),\" (SRA) solutions are vital for enabling operators, contractors, and third-party vendors to remotely monitor, manage, and maintain ICS/OT assets fast, efficiently and securely. \\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"em\",{children:\"But what is behind the speed and efficiency of the Dispel Zero Trust Engine?\"}),\" \",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"As the systems and methods of deploying Moving Target Defenses to Operational Technology (OT), Internet of Things, or other cyber physical systems have matured to the point of seeing use in some 20% of the productive capacity of most core industry verticals in the United States. Let\u2019s review how hybridized Static Defense and Moving Target Defense structures are emerging in the field, and the financial benefits driving this adoption.\"]}),/*#__PURE__*/t(\"h2\",{children:[/*#__PURE__*/e(\"strong\",{children:\"How We Got Here: Cracks in the Castle Walls\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"Until the mid 2010s, for lack of an alternative option, defending industrial systems in the commercial world was an exercise in building castles. You set up walls and gates, positioned sensors to cover those walls and gates, deployed systems to make sense of the sensor data, and hired guards to respond to attacks.\\xa0\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"People built castles in cyberspace because it was intuitive and, for the first two thirds of the existence of the Internet, it largely worked. But castles do not move, and unlike real castles, cyber castles built by commercial entities aren\u2019t allowed to have cavalry that can charge forth to chase away the barbarians searching for weaknesses. So, if you are going with the strategy of building a castle, unless you have the financial, technical, and logistical wherewithal to constantly, and correctly anticipate the types of attacks that will be launched against you and invest in defeating those attacks, someone will eventually focus on the problem long enough to punch a hole through the wall.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"Years of building numerous gates and walls has inadvertently resulted in complex systems that slow down the very people they\u2019re meant to protect. For example, remote access connections to Industrial Control Systems (ICS), a subset of OT, when aligned with the NIST 800-82 moderate baseline, typically involve a 7-to-12 minute connection process and require 15 minutes of administrative overhead. That is insane. And not efficient.\\xa0\"]}),/*#__PURE__*/t(\"h2\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Static Defense and Layered Defense\"}),\"\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"The strategy of building walls is known as \u201CStatic Defense.\u201D It\u2019s easy to understand, easy to market, and easy to sell. Every heard, \u201COh, you already have a competing product? No problem. You should have \u2018a layered defense.\u2019\u201D It still works most of the time too. But static defense as it has been implemented forgets the fundamental reason why computers and networks exist within an organization\u2014computers and networks are not cybersecurity tools. They are efficiency and enablement tools with necessary cybersecurity attributes.\\xa0\"}),/*#__PURE__*/t(\"h2\",{children:[/*#__PURE__*/e(\"strong\",{children:\"What is Moving Target Defense?\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"The alternative to Static Defense is \",/*#__PURE__*/e(n,{href:\"https://dispel.com/blog/whats-the-benefit-of-moving-target-defense-in-zero-trust-sra\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Moving Target Defense\"})}),\". You take what you care about, your assets, your \u201Ccrown jewels\u201D and move it around\u2014ideally in a medium where it is difficult to be followed. Think a submarine. The way Moving Target Defense is applied in cyber is typically not by moving the asset itself (in the case of OT, you can\u2019t very well pick up an assembly line, drive it around, and hope to accomplish anything) but rather by moving the network through which that asset can be reached.\\xa0\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"To truly move a network, you need to launch a set of virtual machines to serve as traffic nodes, then launch more virtual machines, turn those into traffic nodes, and shift the network traffic from the original nodes over to the new ones. To make all that movement difficult to track (ideally in a medium where it is difficult to be followed), you need to launch these virtual machines on commercial clouds where right after you\u2019re done using a virtual machine, the cloud provider will take the freed up processing power and memory and lease it to someone else.\\xa0\"]}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"512\",src:\"https://framerusercontent.com/images/0zLdi8xrSVhlBHcodEEmmPX38w.png\",srcSet:\"https://framerusercontent.com/images/0zLdi8xrSVhlBHcodEEmmPX38w.png?scale-down-to=512 512w,https://framerusercontent.com/images/0zLdi8xrSVhlBHcodEEmmPX38w.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/0zLdi8xrSVhlBHcodEEmmPX38w.png 1920w\",style:{aspectRatio:\"1920 / 1025\"},width:\"960\"}),/*#__PURE__*/e(\"p\",{children:\"Done properly, Moving Target Defense networks force an adversary to continuously expend resources trying to obtain target lock on a system. It puts the adversary in the position of needing to think their strategy continuously.\\xa0\\xa0\"}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/t(\"em\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Terminology Tip: \"}),\"This idea of building a network of virtual machines in an environment where the processing power and memory used to build those virtual machines can be subsequently allocated to someone else is a concept known as \u201Ccompostability.\u201D The characteristic of deliberately launching something to be difficult to track is known as \u201Cmanaged attribution.\u201D The network you are building, then, is a \u201Ccompostable, managed attribution, network.\u201D\"]})})}),/*#__PURE__*/t(\"h2\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Why Moving Target Defense Got Traction with Commercial Organizations\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"If you\u2019ve automated the launch of a network, it\u2019s not a significant technical leap to automate integrating other systems into that network\u2014such as AIs, monitoring and prognostics systems, resource planning tools, patch management systems, log servers, event managers, recording servers, or access approval systems. In turn, this means you can eliminate many of the manual processes traditionally required to connect a person to a device.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"Which brings us full circle to the core purpose of networks and computers: They are not cybersecurity tools; they are efficiency and enablement tools with necessary cybersecurity attributes.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"What this all leads to is a world where Moving Target Defense networks built to provide remote access to OT systems were delivering connection times of 30 seconds versus the 7 to 12 minute Static Defense systems they were replacing. In worlds where a minute of downtime can cost 6 figures, it was time saved, not cybersecurity, that provided the \u201Cwhy\u201D for adoption of Moving Target Defense in industrial environments.\\xa0\\xa0\"]}),/*#__PURE__*/t(\"h2\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Simplifying the Problem: Why Hybrid Systems Make Sense\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"Pure Static Defense is a sound defensive strategy. But it comes at great cost to the usability of the systems it is protecting. What we would suggest is that, by using both Moving Target Defenses and Static Defenses, you can make a more performant, secure, system.\\xa0\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"Let\u2019s start with remote access, the \u201Cwhy\u201D for the existence of network connections from Operational Technology environments to the rest of the world. We\u2019ve dividing the problem space into three sections.\\xa0\"]}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"168\",src:\"https://framerusercontent.com/images/4lUYoMY3O3ZlOrbZQ6nfFfv3CgY.png\",srcSet:\"https://framerusercontent.com/images/4lUYoMY3O3ZlOrbZQ6nfFfv3CgY.png?scale-down-to=512 512w,https://framerusercontent.com/images/4lUYoMY3O3ZlOrbZQ6nfFfv3CgY.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/4lUYoMY3O3ZlOrbZQ6nfFfv3CgY.png 1214w\",style:{aspectRatio:\"1214 / 336\"},width:\"607\"}),/*#__PURE__*/t(\"h4\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Environment Being Accessed\"}),\"\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"The walls and gates used to explain Static Defense are, in cyberspace, just computers applying rules to traffic flows. The simpler the rule, the more likely the firewall is to pull it off effectively. Imagine a world in which you established this set of rules:\\xa0\\xa0\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"No traffic stream is allowed to initiate from the outside.\\xa0\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"All traffic streams must initiate from inside the network.\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"All traffic streams must initiate from an \",/*#__PURE__*/e(n,{href:\"https://dispel.com/products/wicket\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"uplink device\"})}),\" (i.e. the toaster can\u2019t reach out).\\xa0\\xa0\\xa0\\xa0\\xa0\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"That\u2019s a relatively easy rule to follow, it doesn\u2019t slow down traffic flows, and it stops all inbound, randomized attacks from across the Internet.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"Now imagine further you have some things inside the environment that never need remote access (think a sensor). Andrew Ginter would correctly point out that the right thing to do would be to park that sensor behind a physical data diode so there was no technical way for an attack to push in. You\u2019ve now further narrowed the problem set to the handful of things that sometimes do need to reach the rest of the world in a bidirectional fashion.\\xa0\\xa0\"]}),/*#__PURE__*/t(\"h4\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Connecting Network\"}),\"\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Now, imagine a compostable, managed attribution network deployed to serve as a dedicated network for establishing remote access connections. On the network itself, those virtual machines must be configured to block any traffic from non-network sources. It must include monitoring and logging capabilities in case of a flaw in the network or if someone using it has malicious intent. Additionally, it should have scanning software to detect malware attempting to pass through. These are all Static Defense concepts applied within a Moving Target Defense network.\"}),/*#__PURE__*/t(\"h4\",{children:[/*#__PURE__*/e(\"strong\",{children:\"The Remote User\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"Finally, let\u2019s look at whoever is trying to reach the environment with the thing or asset we care about. It doesn\u2019t matter who this person is, we don\u2019t (and shouldn\u2019t) entirely trust the device they are on. Further, we want to prevent an adversary from identifying that person\u2019s device as being a potential entry point into our factory. We want to disassociate it.\\xa0\\xa0\\xa0So instead of having the remote user directly connect through the channel from their device, we have the managed attribution network include a single-use virtual desktop launched in a data center close to where that remote user is physically located. From the human\u2019s standpoint, that virtual desktop will appear, with the appropriate configuration, to be the interface they meant to reach inside the environment being accessed, but at a technical level, that virtual desktop is a miniature castle, hardened to the DISA STIG. Due to its geographic proximity, it should also appear blazing fast to the user. And from an adversary\u2019s point of view, unless they are investing the resources needed to dynamically map the managed attribution network (a technically achievable but phenomenally costly task), your user isn\u2019t going to appear associated with the system they are accessing.\\xa0\\xa0\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"When the remote session is done, the network through which remote access was being conducted can be destroyed. The user no longer has a pathway in, and the environment that was being accessed reverts to having no traffic flows in or out whatsoever.\\xa0\\xa0\\xa0What we\u2019ve just described is a hybrid strategy. It works from a cybersecurity point of view and it\u2019s fast.\\xa0\"]}),/*#__PURE__*/t(\"h2\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Deploy Hybrid MTD and Static Defense with Dispel\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"Dispel delivers a hybridized Moving Target Defense and Static Defense OT Secure Remote Access system. A key differentiator from other remote access providers is Dispel\u2019s ability to supply a virtual desktop in geographic proximity to the user\u2014one of the 767 critical security controls often bypassed by competitors to reduce costs.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"The \",/*#__PURE__*/e(n,{href:\"https://dispel.com/products/zero-trust-access\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel Zero Trust Engine\"})}),\" offers a new path forward on your OT secure remote access journey:\\xa0\\xa0\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Rapid OT Secure Remote Access \"}),\"\u2013 Eliminate connection delays and login fatigue with an OT remote access solution designed for speed and security. Faster connections mean faster response times and reduced downtime.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Minimize Risk, Maximize Security for OT \"}),\"\u2013 Dispel Zero Trust Engine eliminates static entry points with Moving Target Defense, shutting down \u2018living off the land\u2019 threats and closing attack vectors\u2014dramatically reducing your OT network\u2019s exposure to cyber risks.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unmatched Remote Access Security \"}),\"\u2013\",/*#__PURE__*/e(\"strong\",{children:\" \"}),\"Dispel\u2019s Virtual Desktop (VDI) Workstations deliver the highest level of secure remote access, built for organizations that require uncompromising protection. With automatic credential cycling, dynamic IPs, continuous OS patching, and full compliance with industry standards, our VDI ensures resilience against phishing, DDoS, and cyber threats\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Collaboration\"}),\" \u2013 Seamlessly integrate with your technology ecosystem for full visibility, while securing remote access without complexity.\\xa0\"]})})]})]});export const richText15=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"Remote access is an operational necessity in industrial control system (ICS) environments, enabling vendors, engineers, and operators to monitor and manage critical infrastructure. However, it can also presents a major cybersecurity risk. According to \",/*#__PURE__*/e(n,{href:\"https://www.dragos.com/ot-cybersecurity-year-in-review/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"recent intelligence reporting\"})}),\", more than 50% of ransomware incidents in 2024 were traced back to compromised remote access services, such as VPN appliances and Remote Desktop Protocol (RDP) servers. Cyber adversaries have consistently exploited unpatched VPNs, weak authentication practices, and poor network segmentation, making remote access one of the most significant attack vectors in OT security. \\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"So why do industrial organizations continue to rely on a patchwork of unsecured solutions, IT-focused PAM, or outdated legacy access tools? Gaining a clear understanding of the threats and vulnerabilities associated with \",/*#__PURE__*/e(n,{href:\"https://dispel.com/solutions/secure-remote-access\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"OT remote access\"})}),\", along with implementing best practices for mitigation, can help establish a more secure and resilient access strategy.\\xa0\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Common Remote Access Vulnerabilities and Threats\"})}),/*#__PURE__*/e(\"p\",{children:\"The reliance on legacy VPN infrastructure has made OT environments an attractive target for cybercriminals. Attackers are known to exploit vulnerabilities in widely used virtual private network (VPN) solutions, allowing them to execute malicious code remotely, steal configuration data, and create unauthorized tunnels into ICS networks. \\xa0\"}),/*#__PURE__*/e(\"blockquote\",{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"\u201CWe believe the attacker exploited a legacy VPN profile that was not intended to be in use.\u201D\"}),\" \u2014 \",/*#__PURE__*/e(n,{href:\"https://www.hsgac.senate.gov/wp-content/uploads/imo/media/doc/Testimony-Blount-2021-06-08.pdf\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Testimony of Joseph Blount\"})}),\", President and CEO of Colonial Pipeline Company to U.S. Congress, 8 June 2021.\"]})}),/*#__PURE__*/t(\"p\",{children:[\"Overly permissive VPN and RDP access and the use of default or weak credentials create significant security risks in OT environments. Flat network architectures often allow remote users, including vendors and engineers, to move laterally across both IT and OT systems without restriction. This means that if an attacker compromises one set of credentials, they can access multiple critical systems, increasing the risk of widespread disruption. Many industrial systems come with default login credentials that organizations fail to change, leaving them vulnerable to automated scanning tools and credential-based attacks. Attackers can easily exploit unchanged factory-set usernames and passwords, gaining remote control without sophisticated hacking techniques.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"Additionally, nation-state actors such as BAUXITE and VOLTZITE have been observed targeting remote access gateways to conduct reconnaissance, exfiltrate GIS data, and stage further attacks. Vulnerabilities like these exposes critical infrastructure to operational disruptions and long-term security risks.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"The impact of insecure remote access is severe. From the same intel reporting, approximately 65% of assessed OT environments have insecure remote access conditions, including weak configurations, unpatched VPN appliances, and inadequate network segmentation. These gaps significantly increase incident response times, operational downtime, and the risk of complete shutdowns when ransomware strikes.\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Living-Off-the-Land Techniques Against Industrial Organizations\"})}),/*#__PURE__*/t(\"p\",{children:[\"Ransomware groups such as Fog, Helldown, and RansomHub have also evolved their tactics, prioritizing operational sabotage over financial extortion by exploiting remote access tools. These \",/*#__PURE__*/e(n,{href:\"https://industrialcyber.co/threats-attacks/dragos-reports-ransomware-shifts-in-q3-with-hackers-picking-operational-sabotage-over-financial-extortion/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"groups leverage\"})}),\" living-off-the-land (LOTL) techniques, abusing built-in administrative tools like PowerShell and PsExec to execute attacks without triggering security alerts and move laterally within OT networks. LOTL attacks blend in with normal system processes, making them difficult for traditional security tools to identify. Threat actors frequently use these techniques to abuse remote access protocols, manipulate native automation scripts, or alter programmable logic controller (PLC) settings within industrial environments, allowing them to interfere with critical processes while avoiding detection.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"Attackers often exploit weak or stolen credentials to gain access to privileged systems and move deeper into OT networks. In industrial control system (ICS) environments, LOTL techniques pose a particularly high risk, as they can allow attackers to manipulate production processes, disable alarms, or disrupt operations without triggering traditional security alerts.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"Dispel\u2019s Moving Target Defense (MTD) mitigates LOTL attacks by continuously changing the attack surface, preventing adversaries from establishing persistence. By rotating access points, randomizing network paths, and obscuring endpoints, MTD ensures that attackers cannot predict, exploit, or persist in an environment. This approach effectively neutralizes credential-stuffing attempts, lateral movement, and reconnaissance efforts by adversaries attempting to exploit remote access vulnerabilities.\\xa0\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Mitigation Strategies for Secure OT Remote Access\"})}),/*#__PURE__*/t(\"p\",{children:[\"Many organizations fail to allocate adequate resources for OT security, often attempting to extend IT-focused solutions into OT environments, leaving critical systems exposed to vulnerabilities. Mitigating these threats requires a multi-layered security strategy with a strong focus on zero trust remote access best practices. Key mitigation strategies include:\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Enforce Network Segmentation\"}),\" \u2013 Segmenting IT and OT networks, along with micro-segmentation facilities, users, devices, and applications based on function and security needs, is critical for limiting lateral movement by attackers. Organizations that implemented strict segmentation and regularly tested offline backups experienced faster recovery times and were better positioned to avoid ransom payments.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Implement Strong Authentication Measures \"}),\"\u2013 Weak password policies continue to be a major attack vector. Enforcing multi-factor authentication (MFA) and robust credential management significantly reduces the risk of unauthorized access. The Colonial Pipeline attack exploited a legacy VPN account with no MFA, highlighting the dangers of unprotected credentials.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Secure Third-Party and Vendor Access\"}),\" \u2013 Since adversaries often exploit third-party access points, organizations should implement strong authentication policies, audit vendor access logs, and restrict external access to specific assets.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Monitor and Detect Remote Access Anomalies\"}),\" \u2013 Attackers frequently use pass-the-hash, brute-force attacks, and credential stuffing to bypass authentication measures. Organizations must deploy real-time monitoring and logging of remote access traffic to detect unauthorized access attempts.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Disable Unnecessary Remote Access Services \"}),\"\u2013 Outdated \",/*#__PURE__*/e(n,{href:\"https://attack.mitre.org/techniques/T1021/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"remote access protocols\"})}),\" such as Telnet, SSH, and unsecured VPN services should be replaced with more secure VPN alternatives.\\xa0\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Secure Remote Access Best Practices for Your OT Environment\"})}),/*#__PURE__*/t(\"p\",{children:[\"Given the persistent threats targeting remote access, VPNs alone are no longer sufficient for securing OT environments. Organizations who transition to a modern, zero trust remote access solution that eliminates the vulnerabilities associated with legacy VPN technology, typically follows a secure remote access framework that includes:\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Ephemeral Remote Access \"}),\"\u2013 Unlike static VPN connections, secure solutions should establish temporary, single-use access sessions, reducing the attack surface and eliminating persistent access risks.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Microsegmentation and Isolation\"}),\" \u2013 Each session should be logically and physically isolated, preventing attackers from using remote access as a foothold into critical ICS networks.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Multi-Factor Authentication (MFA) & Role-Based Access Control (RBAC) \"}),\"\u2013 Ensures that only authorized personnel can access specific OT assets, significantly reducing unauthorized login attempts.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"End-to-End Encryption & Full Session Logging \"}),\"\u2013 Protects data from interception while providing complete visibility for forensic analysis and auditing & compliance.\\xa0\"]}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"OT Secure Remote Access is Essential for Resilience\"})}),/*#__PURE__*/t(\"p\",{children:[\"Remote access remains a top attack vector for adversaries targeting ICS environments. The traditional reliance on VPNs and legacy remote access solutions exposes critical infrastructure to ransomware, credential-based attacks, and persistent threats.\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),\"The Dispel Zero Trust Engine eliminates VPN vulnerabilities, enforces Zero Trust, and secures third-party access, reducing attack surface and prevent costly breaches. \",/*#__PURE__*/e(n,{href:\"https://dispel.com/products/zero-trust-access\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel Engine\u2019s Virtual Desktop\"})}),\" (VDI) Workstations deliver the highest level of secure remote access, built for organizations that require uncompromising protection. With automatic credential cycling, dynamic IPs, continuous OS patching, our VDI ensures resilience against phishing, DDoS, and cyber threats\u2014while providing seamless, scalable access to OT environments.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Dispel\u2019s compliance-driven architecture streamlines industry security frameworks, strengthening\\xa0your OT security program to help fulfill controls and security gaps in networks that otherwise do not have a means to implement those controls.\\xa0\"})]});export const richText16=/*#__PURE__*/e(a.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Take the First Step Toward OT Secure Remote Access \"}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(n,{href:\"https://dispel.com/contact-us\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Get in touch with our team\"})}),\" today or \",/*#__PURE__*/e(n,{href:\"https://go.dispel.com/on-demand-demo-how-the-dispel-zero-trust-engine-works\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"watch our new On-Demand Demo\"})}),\" to see the Dispel Zero Trust Engine in action!\\xa0\"]})});export const richText17=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"h4\",{children:/*#__PURE__*/e(\"em\",{children:\"Collaboration enhances industrial security by combining secure remote access with advanced endpoint protection\"})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"TAMPA, Fla., February 12, 2025 - \"}),/*#__PURE__*/e(n,{href:\"https://stats.nwe.io/x/html?final=aHR0cHM6Ly9kaXNwZWwuY29tLw&sig=ourWkbuUARiO4YiMY7bBXnWBUi-DfKvWYtoGN9mfHb0rm1OCA3TJIoRkZVrXnkD3ENY_UWoIpib4IUcOSrQOtw&hit%2Csum=WyI0cmY3cGUiLCI0cmY3cGYiLCI0cmY3cGciXQ\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:/*#__PURE__*/e(\"strong\",{children:\"Dispel\"})})}),\", a leader in secure remote access solutions for industrial control systems (ICS) and operational technology (OT), and \",/*#__PURE__*/e(\"strong\",{children:\"TXOne Networks\"}),\", a specialist in Cyber-Physical Systems (CPS) security, today \",/*#__PURE__*/e(n,{href:\"https://www.newswire.com/news/dispel-and-txone-networks-announce-partnership-strengthening-ot-22516126\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"announced a strategic partnership\"})}),\" at the S4x25 OT Cybersecurity conference. This collaboration combines the \",/*#__PURE__*/e(n,{href:\"https://stats.nwe.io/x/html?final=aHR0cHM6Ly9kaXNwZWwuY29tL3Byb2R1Y3RzL3plcm8tdHJ1c3QtYWNjZXNz&sig=mtBkLV5HpkJtH0w3h2CDf5esg2knSTheYPQ3K7m62FLKi88Mkg2RAOTapLOASE3d__Bf0zh22sGACh4slVUQ5Q&hit%2Csum=WyI0cmY3cGgiLCI0cmY3cGkiLCI0cmY3cGciXQ\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel Zero Trust Engine\"})}),\" for secure remote access with \",/*#__PURE__*/e(n,{href:\"https://www.txone.com/products/endpoint-protection/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"TXOne's Stellar\"})}),\" advanced endpoint protection, providing industrial operators with a seamless way to manage remote access while maintaining strict security controls, reducing administrative burden, and ensuring operational integrity.\"]}),/*#__PURE__*/e(\"p\",{children:\"As industrial organizations increasingly rely on remote operations, securing access to critical systems and protecting endpoints has never been more essential. Dispel and TXOne Networks are combining their expertise to provide a comprehensive, operationally efficient security solution that ensures resilience, reduces risk, and improves visibility without disrupting workflows.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"em\",{children:'\"Industrial operators need security solutions that work with, not against, their operational priorities,\"'}),\" said \",/*#__PURE__*/e(\"strong\",{children:\"Clay Speckmiear, Vice President of Sales and Channel at Dispel\"}),\". \",/*#__PURE__*/e(\"em\",{children:'\"Our partnership with TXOne Networks delivers a practical, integrated approach that simplifies remote access security while maintaining the highest levels of protection.\"'})]}),/*#__PURE__*/e(\"p\",{children:\"Through this collaboration, organizations can securely grant and manage remote access while enforcing strict security controls on endpoints - eliminating blind spots, reducing manual processes, and ensuring real-time visibility. Security teams gain enhanced monitoring, audit logging, and the ability to rapidly respond to potential threats, all while maintaining operational continuity.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"em\",{children:\"\\\"Industrial cybersecurity isn't just about individual tools-it's about how they work together to create a stronger defense. Our partnership with Dispel enhances OT security by integrating endpoint protection with secure remote access, ensuring resilient defenses without disrupting operations. Together, we're helping organizations streamline security policies, reduce risks, and safeguard critical industrial environments,\\\"\"}),\" said, \",/*#__PURE__*/e(\"strong\",{children:\"Nasser Zayour, VP of Global Alliances at TXOne Networks.\"})]}),/*#__PURE__*/e(\"p\",{children:\"By aligning remote access security with endpoint protection, Dispel and TXOne Networks equip industrial operators with the tools they need to manage security at scale without introducing unnecessary complexity.\"})]});export const richText18=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"Take the First Step Toward Secure Remote Access\\xa0\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:\"https://dispel.com/contact-us\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Get in touch with our team\"})}),\" today or \",/*#__PURE__*/e(n,{href:\"https://dispel.com/book\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"book a demo\"})}),\" to see the Dispel Zero Trust Engine in action!\"]})]});export const richText19=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"h4\",{children:/*#__PURE__*/e(\"em\",{children:\"Dispel and Nozomi Networks announce an integrated solution to accelerate digital transformation for manufacturing, utilities, water/wastewater, mining, and oil & gas organizations\"})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"TAMPA, Fla., February 11, 2025 - \"}),/*#__PURE__*/e(n,{href:\"https://stats.nwe.io/x/html?final=aHR0cHM6Ly9kaXNwZWwuY29tLw&sig=ourWkbuUARiO4YiMY7bBXnWBUi-DfKvWYtoGN9mfHb0rm1OCA3TJIoRkZVrXnkD3ENY_UWoIpib4IUcOSrQOtw&hit%2Csum=WyI0cmY2azIiLCI0cmY2azMiLCI0cmY2azQiXQ\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel\"})}),\", a leader in secure remote access solutions for industrial control systems (ICS) and operational technology (OT), and Nozomi Networks Inc., the leader in OT and IoT security, today \",/*#__PURE__*/e(n,{href:\"https://www.newswire.com/news/dispel-and-nozomi-networks-deliver-integrated-zero-trust-security-22516105\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"announced at the S4x25\"})}),\" OT cybersecurity conference an expanded technology alliance and certified technology integration between the Nozomi Networks Platform and the Dispel Zero Trust Engine.\"]}),/*#__PURE__*/e(\"p\",{children:\"Together, Dispel and Nozomi Networks empower organizations with unified OT asset visibility and secure remote access, delivering unparalleled security, operational efficiency, and control across their environments.\"}),/*#__PURE__*/e(\"p\",{children:'\"As IT and OT systems become increasingly interconnected, securing critical infrastructure is more essential than ever,\" said Ethan Schmertzler, Co-CEO of Dispel. \"Our partnership with Nozomi Networks helps customers get the most out of their security investments, simplifying OT oversight, and maximizing utilization.\"'}),/*#__PURE__*/t(\"p\",{children:[\"Industrial organizations in sectors like manufacturing, electric utilities, water/wastewater, mining, and oil & gas are navigating the challenges of digital transformation, including the need for complete visibility and remote access across facilities. This integration between \",/*#__PURE__*/e(n,{href:\"https://stats.nwe.io/x/html?final=aHR0cHM6Ly93d3cubm96b21pbmV0d29ya3MuY29tL3Byb2R1Y3Rz&sig=mAUw5d-mn3HnGnIvN7Y8aJvvhhMEYmtTX0hvaj6bKZEhkWr6VrZj1R47DH0IXfrkgmPpNcthB4IpcOam1p-t3g&hit%2Csum=WyI0cmY2azUiLCI0cmY2azYiLCI0cmY2azQiXQ\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"The Nozomi Networks Platform\"})}),\" and the \",/*#__PURE__*/e(n,{href:\"https://stats.nwe.io/x/html?final=aHR0cHM6Ly9kaXNwZWwuY29tL3Byb2R1Y3RzL3plcm8tdHJ1c3QtYWNjZXNz&sig=mtBkLV5HpkJtH0w3h2CDf5esg2knSTheYPQ3K7m62FLKi88Mkg2RAOTapLOASE3d__Bf0zh22sGACh4slVUQ5Q&hit%2Csum=WyI0cmY2azciLCI0cmY2azgiLCI0cmY2azQiXQ\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel Zero Trust Engine\"})}),\" addresses this challenge by synchronizing OT asset inventory with secure remote access capabilities. Administrators can easily identify all OT, IIoT, and ICS assets, such as PLCs, HMIs, and servers, enable secure remote access to these devices, and receive real-time alerts for unauthorized connections to mitigate risks proactively.\"]}),/*#__PURE__*/e(\"p\",{children:\"With this integration, organizations can:\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"left\",\"--framer-text-color\":\"rgb(75, 85, 99)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reduce Business Risk\"}),\": Quickly detect and respond to suspicious remote access connections with enhanced asset visibility and robust policy enforcement.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ensure Compliance\"}),\": Meet critical regulatory standards, including IEC 62443, NIST 800-82, and NIST 800-53.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Optimize Efficiency:\"}),\" Simplify deployment, reduce administrative overhead, and accelerate ROI with streamlined configuration and improved access control.\"]})})]}),/*#__PURE__*/e(\"p\",{children:'\"We couldn\\'t be more pleased to innovate together with Dispel, enabling users to leverage network and security insights generated by Nozomi Network\\'s Platform within the Dispel Zero Trust Engine,\" said Jacob Chapman, Director of BD & Alliances of Nozomi Networks. This integrated functionality accelerates time to value while enhancing both operational outcomes and security outcomes for Plant Managers and CISOs.\"'}),/*#__PURE__*/t(\"p\",{children:[\"The integrated functionality between \",/*#__PURE__*/e(n,{href:\"https://dispel.com/resources/integrations/nozomi-networks\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel and Nozomi Networks\"})}),\" technologies marks a significant step forward in enabling organizations to secure their critical infrastructure while optimizing operations and advancing their digital transformation initiatives.\"]})]});export const richText20=/*#__PURE__*/e(a.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ready to level up remote access to your ICS?\"}),\" \",/*#__PURE__*/e(n,{href:\"https://dispel.com/book\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Book a demo today\"})}),\" to see the Dispel and Nozomi Network integration in action!\\xa0\\xa0\"]})});export const richText21=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"We are excited to announce that the Dispel Zero Trust Engine has been nominated for the 2025 Product Awards, presented by \",/*#__PURE__*/e(n,{href:\"https://productsthatcount.com/product-awards/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Products That Count\"})}),\"! These prestigious awards recognize the most influential and innovative technologies shaping the future. As cyber threats continue to target manufacturing, electric utilities, water/wastewater, oil & gas, and other essential infrastructure, this nomination underscores the importance of secure remote access solutions purpose-built for operational technology (OT) environments.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),'\"This nomination reinforces our mission to provide industrial organizations with the most secure, resilient remote access solutions available,\u201D said Ethan Schmertzler, Co-CEO of Dispel. \u201CWe\u2019re proud to be recognized alongside other innovators who are shaping the future of cybersecurity.\"\\xa0']}),/*#__PURE__*/e(\"h2\",{children:\"About the Product Awards\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Since 2017, the Product Awards have honored the most impactful technologies across industries, helping organizations adopt best-in-class solutions by spotlighting product innovations that drive meaningful advancements in cybersecurity, AI, Internet of Things (IoT), data, and more.\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:\"Why Dispel Zero Trust Engine Stands Out for Critical Infrastructure\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:\"https://dispel.com/products/zero-trust-access\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel Zero Trust Engine\"})}),\" is designed for the unique remote access challenges of industrial control systems (ICS) and OT networks. It provides:\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"\u2705 \",/*#__PURE__*/e(\"strong\",{children:\"Scalable Remote Access\"}),\" \u2013 Ensures reliable,\\xa0time-based access\\xa0for remote operations, field technicians, and third-party vendors without exposing networks to threats.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"\u2705 \",/*#__PURE__*/e(\"strong\",{children:\"Compliance with Industry Standards\"}),\" \u2013 Meets the stringent security requirements of IEC 62443, NIST 800-82, and NIST 800-53, supporting NERC CIP compliance for utilities.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"\u2705 \",/*#__PURE__*/e(\"strong\",{children:\"Unrivaled Security\"}),\" \u2013 Uses Moving Target Defense (MTD) SD-WAN to make remote access infrastructure virtually invisible to attackers, reducing risk during maintenance and monitoring activities.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"\u2705 \",/*#__PURE__*/e(\"strong\",{children:\"Operational Efficiency Without Compromise\"}),\" \u2013 Provides low-latency, high-security connectivity, ensuring uptime for SCADA systems, HMIs, remote diagnostics, and predictive maintenance.\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"\u2705 \",/*#__PURE__*/e(\"strong\",{children:\"Seamless Integration with Legacy Systems\"}),\" \u2013 Works with existing ICS, DCS, and IIoT ecosystems to modernize security without disrupting operations.\\xa0\"]}),/*#__PURE__*/e(\"h2\",{children:\"About Products That Count\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Products That Count is one of the most influential global networks for technology decision-makers, with 500,000+ product managers and industry leaders. Their platform features insights from executives at Netflix, Coinbase, and Box, and partners with leading brands like Autodesk, Capital One, and mParticle to drive industry innovation.\\xa0\"}),/*#__PURE__*/e(\"h2\",{children:\"Securing Critical Infrastructure for the Future\"}),/*#__PURE__*/t(\"p\",{children:[\"At Dispel, we understand that in industries where safety, reliability, and security are mission-critical, remote access cannot be a weak link. This nomination reaffirms our commitment to delivering solutions that protect industrial networks, reduce cyber risk, and ensure continuous operations.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"We\u2019re honored to be recognized and look forward to celebrating alongside other industry innovators.\\xa0\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]});export const richText22=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"h2\",{children:\"Take the First Step Toward Secure Remote Access\\xa0\\xa0\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:\"https://dispel.com/contact-us\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Get in touch with our team\"})}),\" today or \",/*#__PURE__*/e(n,{href:\"https://dispel.com/book\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"book a demo\"})}),\" to see the Dispel Zero Trust Engine in action!\\xa0\"]})]});export const richText23=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IT/OT Convergence\"}),\" refers to the integration of Information Technology (IT) systems, which manage data and communication, with Operational Technology (OT) systems, which control and monitor industrial processes. This convergence allows organizations to securely connect traditionally siloed systems, fostering collaboration, efficiency, and data-driven decision-making.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"For example, automotive manufacturers leverage IT/OT convergence to optimize production, enhance quality, and strengthen cybersecurity. Robotic welders, torque tools, and assembly sensors generate OT data, which IT systems analyze to provide real-time insights into efficiency and maintenance needs. IT systems can detect deviations in torque data, alerting operators to prevent defects. Simultaneously, OT systems report vulnerabilities in PLCs, HMIs and other devices to both IT and OT cybersecurity teams, enabling proactive threat mitigation. This integration creates a unified view of operations, improving quality control, reducing downtime, and ensuring compliance with cybersecurity standards such as NIST 800-82 and IEC 62443. The result is a more efficient, secure, and innovative manufacturing process.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"When evaluating IT/OT integration strategies, it\u2019s important to recognize that each organization\u2019s journey is unique. Understanding your specific needs and challenges, as well as how the Dispel Zero Trust Engine can accelerate adoption, is critical to success.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"IT/OT Convergence Value\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enhanced Visibility\"}),\": Unified IT/OT data streams enable better analytics, predictive maintenance, and decision making.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Greater Efficiency\"}),\": Automation reduces redundancies and speeds up issue resolution.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cost Savings\"}),\": Centralized systems lower expenses and reduce duplication.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Digital Transformation\"}),\": Enables adoption of IoT, AI, and Industry 4.0 technologies.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Stronger Security\"}),\": Unified cybersecurity strategies protect against OT-specific cyber threats and meet compliance standards.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Faster Recovery\"}),\": Speeds anomaly detection and mean time to recovery (MTTR).\\xa0\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"IT/OT Convergence Challenges\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Increased Complexity\"}),\": Requires expertise, infrastructure updates, and team alignment.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Legacy Systems\"}),\": Older OT systems may need costly upgrades for integration.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cultural Barriers\"}),\": Differing priorities between IT and OT hinder collaboration.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Downtime Risks\"}),\": Integration can disrupt operations without careful planning.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cybersecurity Risks\"}),\": Exposes OT systems to IT threats if not properly secured.\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Compliance Challenges\"}),\": Ensuring regulatory adherence demands significant resources.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Cybersecurity Benefits to IT/OT Convergence\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"strong\",{children:[/*#__PURE__*/e(\"br\",{}),\"Strengthening IT/OT Security and Risk Mitigation\"]}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"Effective IT/OT risk mitigation relies on \",/*#__PURE__*/e(n,{href:\"https://dispel.com/solutions/secure-remote-access\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"secure remote access\"})}),\", network segmentation, and Zero Trust principles to minimize cyber threats. Real-time monitoring, patch management, and robust incident response plans proactively address vulnerabilities head-on while ensuring compliance with industry standards like NIST 800-82 and IEC 62443. Training programs reduce human error, and strong vendor management secures the supply chain, creating a layered defense strategy that minimizes disruptions and fosters secure IT/OT integration.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Enhanced Segmentation and Compliance\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"Segmentation establishes security boundaries to isolate critical assets, limit unnecessary communication, and prevent breaches from spreading while aligning policies with security frameworks and compliance standards. However, segmentation is not static or a standalone solution; it requires ongoing management, logical and physical tools, and integration with authentication and monitoring. When effectively implemented, segmentation enhances visibility, efficiency, and cybersecurity for secure IT/OT convergence.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Unified Monitoring Through Data Enrichment\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"Integrating OT data into IT-centric tools such as SOC and SIEM platforms unifies asset visibility and strengthens proactive threat management. Unified data streams enable real-time monitoring, anomaly detection, and enriched alerts, reducing false positives and uncovering hidden vulnerabilities. This holistic approach enhances cybersecurity, operational resilience, and incident response across IT and OT environments.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/e(\"h2\",{children:\"Dispel Securely Bridges Your Access and Productivity\\xa0\"})]});export const richText24=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"Dispel enables your organization to confidently achieve IT/OT convergence and drive sustainable, long-term success by\\xa0securing\\xa0your access and data connectivity. The \",/*#__PURE__*/e(n,{href:{webPageId:\"irFCW2EvI\"},motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel Zero Trust Engine\"})}),\" provides your team with robust zero trust security, access control, and industrial data streaming while enhancing operational efficiency and productivity.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"OT Secure Remote Access\"})]}),/*#__PURE__*/t(\"p\",{children:[\"No two OT environments are the same. That\u2019s why the Dispel Zero Trust Engine creates a secure, scalable connectivity layer across all makes, models, and generations of equipment\u2014standardizing access and enabling internal teams, external contractors, and third-party vendors to securely connect to mission-critical OT assets, even in the most complex environments.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"Designed for how OT really works:\\xa0\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Total access control and full visibility\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Tailored for every role, every use case\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Out-of-the-box compliance with NIS2, NIST 800-53, and NERC CIP\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Flexible deployment model\u2014SaaS, Private, or On-Prem\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Deploy at scale in hours, not months\\xa0\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/t(\"strong\",{children:[/*#__PURE__*/e(\"br\",{}),\"Industrial Data Streaming\"]})}),/*#__PURE__*/t(\"p\",{children:[\"Simplify device-to-device transfer of real-time operational, diagnostic, and system data between industrial assets and cloud environments\u2014enabling bidirectional and unidirectional flows to support predictive maintenance and streamline system updates for greater efficiency.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"Stream critical industrial data directly into your cloud environment:\\xa0\\xa0\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Export Files\"}),\" \u2013 Transmit logs, reports, and other essential exports.\\xa0\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Vibration Data\"}),\" \u2013 Enable real-time equipment monitoring and predictive maintenance.\\xa0\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Offsite Diagnostics\"}),\" \u2013 Centralize fault diagnostics to accelerate issue resolution.\\xa0\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Supply Chain Logistics\"}),\" \u2013 Improve operational visibility with real-time data flow.\\xa0\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"WSUS Server Updates\"}),\" \u2013 Securely automate patch and update management.\\xa0\\xa0\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Custom Data Streams \"}),\"\u2013 Adapt to unique industrial data needs with flexible architecture.\"]})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/t(\"strong\",{children:[/*#__PURE__*/e(\"br\",{}),\"Enhance operational efficiency\"]})}),/*#__PURE__*/t(\"p\",{children:[\"Without altering internal networks, Dispel\u2019s OT DMZ Unification Fabric standardizes how access occurs across all facilities while maintaining a Zero Trust framework. Integrate new sites in weeks, not years, while eliminating redundant assets, duplicate licenses, and administrative overhead. This allows your team to make a resource available across multiple secure environments to standardize systems.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"Dispel OT DMZ Unification Fabric enables you to:\\xa0\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Eliminate duplicate OT DMZ Asset licenses\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Eliminate duplicative processes in OT environments\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Centrally monitor OT systems access\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Simplify facility modernization\\xa0\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Reduce the cost of securing the OT environment\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})})]}),/*#__PURE__*/e(\"h4\",{children:/*#__PURE__*/e(\"strong\",{children:\"Take the First Step Toward Secure Remote Access\"})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:\"https://dispel.com/contact-us\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Get in touch with our team\"})}),\" today or \",/*#__PURE__*/e(n,{href:\"https://go.dispel.com/on-demand-demo-how-the-dispel-zero-trust-engine-works\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"watch our new On-Demand Demo\"})}),\" to see the Dispel Zero Trust Engine in action!\\xa0\"]})]});export const richText25=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"As 2024 comes to a close, we reflect on a year filled with exciting achievements, significant partnerships, and a steadfast commitment to advancing cybersecurity for industrial control systems (ICS) and cyber-physical environments (CPS). Here\u2019s a look back at five key accomplishments:\\xa0\",/*#__PURE__*/e(\"br\",{}),\"\\xa0\"]}),/*#__PURE__*/t(\"h3\",{children:[/*#__PURE__*/e(\"strong\",{children:\"1. No. 1 Fastest Growing IoT Security Company\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"Dispel was named the No. 1 Fastest Growing IoT Security Company by the Cyber150 List, reflecting our leadership in scaling secure, efficient solutions for IoT and OT environments.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"This recognition from IT-Harvest reinforces our mission to address evolving cyber-physical threats while enabling the integration of IoT devices in critical infrastructure.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"em\",{children:\"Explore the milestone: \"}),/*#__PURE__*/e(n,{href:\"https://dispel.com/blog/dispel-ranked-the-1-fastest-growing-iot-security-company-of-2024-by-cyber150-list\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:/*#__PURE__*/e(\"em\",{children:\"Dispel Ranked the #1 Fastest Growing IoT Security Company of 2024\"})})}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/t(\"h3\",{children:[/*#__PURE__*/e(\"strong\",{children:\"2. Pioneering Collaboration with Mitsubishi Electric\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"This year, we partnered with Mitsubishi Electric Corporation to integrate our Dispel Zero Trust Engine (ZTE) secure remote access with their factory-automation equipment and OT security solutions. Together, we launched a Zero Trust Remote Access Service aimed at securing industrial processes while advancing digital manufacturing.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),'\"At Mitsubishi Electric, we are creating new value in OT security by combining our OT technology and expertise in manufacturing with information-system security technologies from leading security vendors,\" said Kunihiko Kaga, Mitsubishi Electric\\'s Representative Executive Officer and Industry and Mobility Business Area Owner. \"Through our collaboration with Dispel, we expect to contribute to OT security and society as a whole by providing secure environments for remote maintenance.\"\\xa0',/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"em\",{children:\"Learn more: \"}),/*#__PURE__*/e(n,{href:\"https://dispel.com/blog/dispel-mitsubishi-collaboration\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:/*#__PURE__*/e(\"em\",{children:\"Dispel and Mitsubishi Electric Announce Collaboration\"})})}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/t(\"h3\",{children:[/*#__PURE__*/e(\"strong\",{children:'3. Winning \"Best in Show\" at Interop Tokyo 2024'}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:['At Interop Tokyo, the Dispel Zero Trust Engine earned the prestigious \"Best in Show\" award in the Industrial Networks category, in collaboration with TechMatrix. This recognition underscores the platform\u2019s ability to simplify secure remote access for critical infrastructure, providing robust control, visibility, and response capabilities for IT, OT, XIoT, and IIoT systems while aligning with global standards like IEC 62443 and NIST 800-82.\\xa0',/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"\u201CWe are honored to receive the Best in Show award. Interop\u2019s recognition highlights the strength of our channel partners and the valued work TechMatrix performs in Japan,\u201D said Ethan Schmertzler, CEO of Dispel.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"em\",{children:\"Read more: \"}),/*#__PURE__*/e(n,{href:\"https://dispel.com/blog/dispel-zero-trust-access-wins-best-of-show-at-interop-tokyo-2024\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:/*#__PURE__*/e(\"em\",{children:\"Dispel Wins Best in Show at Interop Tokyo 2024\"})})}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/t(\"h3\",{children:[/*#__PURE__*/e(\"strong\",{children:\"4. Dispel Zero Trust Engine Recognized as a G2 High Performer\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"Customer satisfaction is our top priority! We're proud to share that Dispel earned the High Performer designation in G2's Summer 2024 Report for System Security. Users praised the simplicity, reliability, and robust security of our ZTE platform.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),'\u201CDispel prioritizes security above all else,\u201D one user shared. \u201CWith its built-in multi-factor authentication (MFA) and approval workflow capabilities, the product ensures a highly secure environment.\"\\xa0',/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"em\",{children:\"Check it out: \"}),/*#__PURE__*/e(n,{href:\"https://dispel.com/blog/dispel-named-a-high-performer-in-g2-summer-2024-report\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:/*#__PURE__*/e(\"em\",{children:\"Dispel Named a High Performer in G2 Summer 2024 Report\"})})}),\"\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]}),/*#__PURE__*/t(\"h3\",{children:[/*#__PURE__*/e(\"strong\",{children:\"5. Named Hot Company in Zero Trust Platforms\"}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"Dispel was thrilled to be named a Hot Company in the Zero Trust Platform category at the 2024 Cyber Defense Awards! This Top InfoSec Innovator Award shines a spotlight on our innovative approach to OT security, making it easier to balance operational efficiency with compliance and auditing.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"\u201CAs cyberattacks on OT systems grow, organizations face not only security challenges but also operational and scalability concerns,\u201D said Ethan Schmertzler, Co-CEO of Dispel. \u201COur focus remains on providing simple, fast, and reliable access to the devices they need.\u201D\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"em\",{children:\"Full story: \"}),/*#__PURE__*/e(n,{href:\"https://dispel.com/blog/dispel-winner-zero-trust-platform-2024-cyber-defense-awards\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:/*#__PURE__*/e(\"em\",{children:\"Dispel Named Hot Company Winner in Zero Trust Platform\"})})}),\"\\xa0\"]}),/*#__PURE__*/t(\"h4\",{children:[/*#__PURE__*/t(\"strong\",{children:[/*#__PURE__*/e(\"br\",{}),\"Looking Forward to Innovation and Growth\"]}),\"\\xa0\"]}),/*#__PURE__*/t(\"p\",{children:[\"As we approach our 10-year anniversary in 2025, Dispel is more dedicated than ever to driving the future of cybersecurity and secure remote access. These milestones strengthen our ability to deliver innovative solutions that safeguard critical systems and build trust in our ever-connected world.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"A big thank you to our incredible team, partners, and customers for making 2024 such a remarkable year. Here\u2019s to the next decade of protecting what matters most!\\xa0\"]})]});export const richText26=/*#__PURE__*/e(a.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Take the First Step Toward OT Security\"}),\" - Ready to simplify access to your cyber-physical systems? \",/*#__PURE__*/e(n,{href:\"https://dispel.com/contact-us\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Get in touch with our team\"})}),\" today or \",/*#__PURE__*/e(n,{href:\"https://dispel.com/book\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"book a demo\"})}),\" to see the Dispel Zero Trust Engine in action!\\xa0\\xa0\"]})});export const richText27=/*#__PURE__*/e(a.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/t(\"em\",{children:[\"Dispel recognized for Zero Trust Platform innovation in Secure Remote Access, Moving Target Defense (MTD), and OT DMZ Unification\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{})]}),/*#__PURE__*/e(\"strong\",{children:\"AUSTIN, Texas, December 19, 2024 \"}),\"\u2013 Dispel, a cybersecurity leader in secure remote access solutions for industrial control systems (ICS) and cyber-physical environments (CPS), \",/*#__PURE__*/e(n,{href:\"https://www.newswire.com/news/dispel-wins-cyber-defense-award-s-2024-zero-trust-platform-hot-company-22489848\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"has been named 2024\u2019s Hot Company\"})}),\" in the Zero Trust Platform category at the coveted Top InfoSec Innovator Awards in Cyber Defense Magazine (CDM), the industry\u2019s leading electronic information security publication.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"\u201CIt\u2019s an honor to be recognized as a Zero Trust Platform innovator at the \",/*#__PURE__*/e(n,{href:\"https://cyberdefenseawards.com/top-infosec-innovators-for-2024/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Cyber Defense Awards\"})}),\",\u201D said Ethan Schmertzler, Co-CEO of Dispel. \u201CAs cyberattacks on OT systems grow, organizations face not only security challenges but also operational efficiency and scalability concerns. Our focus remains on providing simple, fast, and reliable access to the devices they need.\u201D\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"The \",/*#__PURE__*/e(n,{href:\"https://dispel.com/products/zero-trust-access\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel Zero Trust Engine\"})}),\" (ZTE) is redefining industrial cybersecurity, delivering secure remote access, data streaming, OT DMZ unification, and robust threat detection tailored for ICS and CPS environments. Built on a zero trust foundation, ZTE minimizes attack vectors and ensures compliance with critical standards like IEC 62443 and NIST 800-82. Key features include just-in-time access, multi-factor authentication, Identity & Access Management (IAM), granular access controls, end-to-end encryption, and real-time monitoring, enhancing operational agility and resilience. With over 42 patents, Dispel pioneers secure remote access innovations like moving target defense, OT DMZ unification, time-based access, dual sessions, and password vaulting, setting a new standard for OT security.\\xa0\"]})});export const richText28=/*#__PURE__*/e(a.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[\"Now in its 12th year, the Top InfoSec Innovator Awards, part of the Cyber Defense Awards platform and presented during CyberDefenseCon 2024, recognize companies that are shaping the future of cybersecurity through exceptional innovation. The awards are globally acknowledged for highlighting solutions that tackle emerging cyber threats.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),\"\u201CDispel embodies three major features we judges look for with the potential to become winners: understanding tomorrow\u2019s threats, today, providing a cost-effective solution and innovating in unexpected ways that can help mitigate cyber risk and get one step ahead of the next breach,\u201D said Gary S. Miliefsky, Publisher of Cyber Defense Magazine.\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Take the First Step Toward Zero Trust Access - \"}),\"Ready to simplify access to your cyber-physical systems? \",/*#__PURE__*/e(n,{href:\"https://dispel.com/contact-us\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Get in touch with our team\"})}),\" today or \",/*#__PURE__*/e(n,{href:\"https://dispel.com/book\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"book a demo\"})}),\" to see the Dispel Zero Trust Engine in action!\\xa0\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})});export const richText29=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"Dispel has been \",/*#__PURE__*/e(n,{href:\"https://stiennon.substack.com/p/the-fastest-growing-iot-security?utm_source=post-email-title&publication_id=169638&post_id=148829995&utm_campaign=email-post-title&isFreemail=true&r=2ne8zr&triedRedirect=true&utm_medium=email\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"ranked\"})}),\" the #1 Fastest Growing IoT Security Company of 2024 according to the \",/*#__PURE__*/e(\"em\",{children:\"Cyber150 List\"}),\" from IT-Harvest.\"]}),/*#__PURE__*/t(\"p\",{children:[\"IT-Harvest\u2019s \",/*#__PURE__*/e(\"em\",{children:\"Cyber150 List\"}),\" provides rankings in company size and scale in the cybersecurity space, spotlighting the top-performing companies driving change and innovation in their respective fields. Dispel\u2019s recognition as the fastest-growing IoT security company is not just a testament to our success but also underscores the increasing demand for reliable, secure, and efficient solutions in the IoT and OT sectors.\"]}),/*#__PURE__*/e(\"h3\",{children:\"The Growth Behind the Success\"}),/*#__PURE__*/e(\"p\",{children:\"Dispel\u2019s growth rate reflects the accelerating adoption of our company\u2019s flagship product, the Dispel Zero Trust Engine, which enables seamless secure remote access, data streaming, micro-segmentation, and continuous threat detection for industrial control systems (ICS) and cyber-physical environments. This growth is being fueled by:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Strategic Customer Relationships\"}),\": Dispel has consistently set the standard in OT cybersecurity, not only saving Fortune 500 companies millions in operational efficiency but also helping them achieve cybersecurity compliance, helping them winning billions in bids. Our Zero Trust Engine is also playing a critical role in national defense, being featured in large-scale contracts such as the U.S. Air Force's JADC2/Advanced Battle Management System.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Critical Partnerships\"}),\": We\u2019ve expanded our ecosystem with key partners like Mitsubishi Electric Factory Automation, who deploy the Dispel Zero Trust Engine to secure PLCs, and major industrial clients who rely on Dispel to protect their operational infrastructure.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cutting-Edge Technology\"}),\": With over 42 patents and a robust product roadmap, Dispel continues to push the envelope on what\u2019s possible in zero-trust security. Our platform simplifies cybersecurity for complex industrial environments, streamlining secure remote access and real-time threat detection with unparalleled ease of use.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"The Future of IoT and OT Security\"}),/*#__PURE__*/e(\"p\",{children:\"The recognition from IT-Harvest is an important moment as we continue to shape the future of cybersecurity for OT and IoT environments. With the rise of cyber-physical threats and the growing integration of IoT devices in critical infrastructure, Dispel remains focused on delivering scalable, future-proof solutions that keep pace with the evolving threat landscape.\"}),/*#__PURE__*/e(\"p\",{children:\"As the fastest-growing company in this space, Dispel is committed to driving innovation, securing essential industries, and leading the way in IoT security. Thank you to our dedicated team, partners, and clients for making this achievement possible.\"}),/*#__PURE__*/e(\"p\",{children:\"Together, we are building a safer, more secure future for all.\"})]});export const richText30=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AUSTIN, Texas, September 3, 2024\"}),\" - Dispel today announced the launch of the \",/*#__PURE__*/e(n,{href:\"https://dispel.com/training\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel Enterprise Academy\"})}),\", a comprehensive training platform designed to help organizations maximize the value of their Dispel deployments and earn certifications for users, administrators, and partners.\"]}),/*#__PURE__*/e(\"p\",{children:\"The Dispel Enterprise Academy offers a range of web-led certification courses tailored for users, administrators, technical support teams, and partners. These courses provide hands-on, in-depth training, covering everything from real deployment demonstrations to best practices in sustaining and debugging Dispel environments. Participants will also gain access to exclusive training materials and detailed step-by-step guides created by the Dispel Operations team.\"}),/*#__PURE__*/e(\"p\",{children:'\"With the Dispel Enterprise Academy, customers and partners can now easily earn certifications and reduce onboarding and training timelines\u2014simplifying jobs for administrators and users. In large scale deployments, certifications allow our customers to keep track and remediate any workflow or knowledge gaps and ensure competency baselines across their entire user base,\u201D said Fred Chang, Head of Operations at Dispel.'}),/*#__PURE__*/e(\"p\",{children:\"\u201CWe developed the Dispel Enterprise Academy to meet the growing demand for specialized training in zero trust environments,\u201D said Benjamin Burke, COO of Dispel. \u201COur goal is to empower our customers and partners with the knowledge and skills they need to confidently manage and optimize their Dispel deployments for fast, simple, secure remote access to cyber-physical systems.\u201D\"}),/*#__PURE__*/e(\"p\",{children:\"Key courses at the Dispel Enterprise Academy include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User & Administrator Courses\"}),\": Focused on the essentials of using and overseeing Dispel deployments.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Technical Support Training\"}),\": Comprehensive instruction for devops and infrastructure teams on deploying and maintaining Dispel solutions.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Partner Enablement\"}),\": Equips Dispel partners with the expertise to articulate the value of Dispel\u2019s solutions to their clients.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"In addition to online courses, Dispel offers private classroom sessions, either remote or on-site, that are custom-tailored to meet the specific needs of each organization. These private sessions are ideal for teams operating in complex environments or at scale, ensuring that training is both relevant and immediately applicable.\"}),/*#__PURE__*/e(\"p\",{children:\"The Dispel Academy enables seasonal or sporadic users to revisit training modules to shake out any cobwebs when returning to Dispel dashboards and VDIs. The hands-on walk throughs cover not only what to do in the Dispel Zero Trust Engine platform, but also the why it is important and how it simplifies their day to day lives.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ready to maximize the value of your Dispel deployment? \"}),\"Visit \",/*#__PURE__*/e(n,{href:\"https://dispel.com/training\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Dispel.com/training\"})}),\" to sign up today and get certified!\"]})]});export const richText31=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AUSTIN, Texas, August 22, 2024 - \"}),\"Dispel is pleased to announce its recognition as a High Performer in the latest G2 Summer 2024 Report for System Security. This recognition is based on customer reviews and G2\u2019s rigorous scoring algorithm, which analyzes feedback and third-party data to determine product rankings. Dispel simplifies cyber-physical systems access, and the award reflects the company's excellence in serving clients in manufacturing, utilities, government, and critical infrastructure.\"]}),/*#__PURE__*/e(\"p\",{children:'Dispel\\'s Zero Trust Engine received high praise from users for its simplicity, robust security features, and ease of use. One customer noted, \"Dispel prioritizes security above all else. With its built-in multi-factor authentication (MFA) and approval workflow capabilities, the product ensures a highly secure environment.\" Another shared, \"The product is extremely easy to use. [The] Dispel team are always available to help.\"'}),/*#__PURE__*/e(\"p\",{children:\"Dispel leads the industry in secure remote access tailored for industrial control systems (ICS) and cyber-physical systems (CPS). Critical infrastructure like smart grids and distributed control systems (DCS) require targeted security platforms to protect while maintaining seamless operation of physical processes.\"}),/*#__PURE__*/e(\"p\",{children:\"Dispel\u2019s solutions integrate robust identity and access management (IAM), single sign-on (SSO), session recording, and access windows, and isolation to ensure that only authorized users gain access to critical OT systems, reducing the risk of breaches and maintaining the integrity of embedded systems and local controllers.\"}),/*#__PURE__*/e(\"p\",{children:\"Dispel's technology also addresses the growing complexity of process control and monitoring in environments where the physical world intersects with computation, such as human-machine interfaces (HMI) and intelligent electronic devices. By implementing zero trust controls, Dispel empowers organizations to protect sensitive data within programmable logic controllers (PLC) and other critical components of industrial processes, ensuring that medical devices, workstations, and corporate networks remain secure. This award highlights Dispel\u2019s ability to deliver on security and user experience, making it a trusted partner for organizations navigating the challenges of OT system security.\"}),/*#__PURE__*/e(\"p\",{children:'\"We\\'re honored to be recognized by G2 as a leader in system security,\" said Ethan Schmertzler, Co-CEO of Dispel. \"These reviews highlight the hard work of our team and the trust our customers place in our solutions.\"'}),/*#__PURE__*/t(\"p\",{children:[\"New to Dispel? If you\u2019d like to know why our reviews are so positive, why not run a free pilot? Visit \",/*#__PURE__*/e(n,{href:\"https://dispel.com/\",motionChild:!0,nodeId:\"QsZaADSSZ\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"https://dispel.com\"})}),\" to speak with an expert and learn how we can help you protect your sensitive cyber-physical systems.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"About Dispel\"})}),/*#__PURE__*/e(\"p\",{children:\"Dispel is a cybersecurity company specializing in secure remote access solutions for industrial control systems and cyber-physical environments. With a focus on implementing zero trust security models, Dispel\u2019s technology safeguards sensitive data and ensures the integrity of operational technology systems. The company\u2019s solutions are designed to meet the needs of industries where simplicity, security, and efficiency are paramount.\"})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText23\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText27\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText25\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText29\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText31\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText24\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText30\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText22\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText28\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText26\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "2MAAAA,IAAsJ,IAAMC,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,6KAAwK,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAA+B,CAAC,EAAE,WAAmBA,EAAEC,EAAE,CAAC,KAAK,sBAAsB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,+EAA4FF,EAAEC,EAAE,CAAC,KAAK,4GAA4G,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAE,kEAA+EF,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAE,uQAAkQ,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,4TAAyUE,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,mYAAsYA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,iTAA0SA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,wDAAwD,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,oKAA0J,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kEAA6D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,uFAAkF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,oEAA+D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,2DAAsD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,mEAA8D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,6DAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,2DAAsD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,6DAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gRAA2Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kKAA6J,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,yDAAyD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAE,+BAA+B,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeC,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iQAA4P,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gKAAsJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,2CAA4B,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+HAA0H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6LAAyK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oTAA+S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8FAA8F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iGAA4F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iKAAuJ,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4BAAoCE,EAAE,KAAK,CAAC,CAAC,EAAE,kCAA6B,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oMAA+L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4KAA4K,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qEAAkFE,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAE,sJAAsJ,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,4CAAoDE,EAAE,KAAK,CAAC,CAAC,EAAE,+CAAuDA,EAAE,KAAK,CAAC,CAAC,EAAE,sDAAsD,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4EAAoFE,EAAE,KAAK,CAAC,CAAC,EAAE,wBAAqCA,EAAE,KAAK,CAAC,CAAC,EAAE,kCAA+CA,EAAE,KAAK,CAAC,CAAC,EAAE,+FAA0F,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kEAA0EE,EAAE,KAAK,CAAC,CAAC,EAAE,qEAAqE,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uIAA6H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kPAAwO,CAAC,CAAC,CAAC,CAAC,EAAeI,EAAuBJ,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAC,2BAAmCE,EAAEC,EAAE,CAAC,KAAK,oDAAoD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,uDAAuD,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mTAAmT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iFAAkE,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+PAA6PE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oVAA+U,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uEAAqEE,EAAEC,EAAE,CAAC,KAAK,oKAAoK,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAE,iJAAiJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,kOAAmN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,yIAAiJA,EAAE,KAAK,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,gFAAsE,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8TAAqS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mDAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mJAAyI,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sDAA8DE,EAAEC,EAAE,CAAC,KAAK,yHAAyH,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8CAAyC,CAAC,CAAC,CAAC,EAAE,sSAAuR,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,uKAAoLA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wKAAmK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,iFAA4E,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,gEAA4C,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iMAA6K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qUAAsT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8DAA8D,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gGAAgG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uFAAuF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,oGAA4GA,EAAEC,EAAE,CAAC,KAAK,yDAAyD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yCAAoC,CAAC,CAAC,CAAC,EAAE,qEAA6EF,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,kFAAwE,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wTAA0R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uJAA6I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8XAAgW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+BAA+B,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sIAAsI,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iFAA4E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,2FAAmGA,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,6GAAqHF,EAAE,KAAK,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,kFAA6E,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mLAAyK,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uGAA0GE,EAAEC,EAAE,CAAC,KAAK,4DAA4D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,uMAAkM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4EAAuE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wNAAmN,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAAyB,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yHAA+G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+HAAgH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oHAAoH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,wHAAwH,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,2CAAsC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gIAA6IE,EAAEC,EAAE,CAAC,KAAK,0BAA0B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,kLAA6K,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+CAA0C,CAAC,EAAE,WAAmBA,EAAEC,EAAE,CAAC,KAAK,sBAAsB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,qFAAkGF,EAAEC,EAAE,CAAC,KAAK,gHAAgH,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,mKAAgLF,EAAEC,EAAE,CAAC,KAAK,oDAAoD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAE,kEAA+EF,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,oNAAiOA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,2VAA6T,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,icAAic,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoBE,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAE,kLAA6K,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,uHAA6G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,qJAAgJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,8GAAyG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kGAA6F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6GAA0HE,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoBE,EAAE,KAAK,CAAC,CAAC,EAAE,wLAAwL,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yDAAyD,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,qLAAkMA,EAAEC,EAAE,CAAC,KAAK,wEAAwE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,kBAA+BF,EAAEC,EAAE,CAAC,KAAK,6EAA6E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,kBAA+BF,EAAEC,EAAE,CAAC,KAAK,4EAA4E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAE,0BAAuCF,EAAEC,EAAE,CAAC,KAAK,0EAA0E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,6DAA0EF,EAAEC,EAAE,CAAC,KAAK,sDAAsD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,YAAY,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,IAAiBF,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,uKAAkK,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,4FAAoGA,EAAEC,EAAE,CAAC,KAAK,sBAAsB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,yEAAsFF,EAAEC,EAAE,CAAC,KAAK,6GAA6G,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,yEAAsFF,EAAEC,EAAE,CAAC,KAAK,kDAAkD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAE,oFAAiGF,EAAEC,EAAE,CAAC,KAAK,2EAA2E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAE,yGAAoG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4LAA4L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,udAA8b,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qCAAkDE,EAAEC,EAAE,CAAC,KAAK,oDAAoD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAE,8WAA+V,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,sZAAmX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wPAAmP,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,6BAA0CE,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAE,kDAAkD,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6CAA6C,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,2LAAwMA,EAAEC,EAAE,CAAC,KAAK,oGAAoG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,EAAE,KAAkBF,EAAEC,EAAE,CAAC,KAAK,oGAAoG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAE,KAAkBF,EAAEC,EAAE,CAAC,KAAK,4EAA4E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAE,KAAkBF,EAAEC,EAAE,CAAC,KAAK,0EAA0E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAE,KAAkBF,EAAEC,EAAE,CAAC,KAAK,+DAA+D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAE,KAAkBF,EAAEC,EAAE,CAAC,KAAK,qFAAqF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAE,KAAkBF,EAAEC,EAAE,CAAC,KAAK,2FAA2F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,EAAE,KAAkBF,EAAEC,EAAE,CAAC,KAAK,2EAA2E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,KAAkBF,EAAEC,EAAE,CAAC,KAAK,0EAA0E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,QAAqBF,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAE,iFAA8FF,EAAEC,EAAE,CAAC,KAAK,2CAA2C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAE,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBZ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iZAAwX,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yKAAiLE,EAAEC,EAAE,CAAC,KAAK,oDAAoD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAE,mSAA0Q,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,sVAAuU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iZAA+V,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,4CAAoDE,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAE,2VAAiV,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4PAAuP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uNAA6M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mSAAqQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wGAAqHE,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAE,4UAA6T,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAuBb,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,iWAA+VE,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,sCAAmDA,EAAEC,EAAE,CAAC,KAAK,oDAAoD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAE,klBAAmkB,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,sDAAiD,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2PAAsP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yGAAoG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0EAA0E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,+CAA+C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,EAAE,uNAA+NF,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,uCAAoDA,EAAEC,EAAE,CAAC,KAAK,0DAA0D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,+IAA+I,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oPAA0O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sFAAiF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wIAAwI,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oGAAoG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sFAAsF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wIAAmI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0UAAkVE,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,wEAAqFA,EAAEC,EAAE,CAAC,KAAK,0DAA0D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAE,iXAAiX,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kZAA2YE,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,oBAAiCA,EAAEC,EAAE,CAAC,KAAK,sEAAsE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAE,gIAA6IF,EAAEC,EAAE,CAAC,KAAK,4FAA4F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,4HAAyIF,EAAEC,EAAE,CAAC,KAAK,2GAA2G,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,QAAqBF,EAAEC,EAAE,CAAC,KAAK,sJAAsJ,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,2FAA2F,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,oFAA+E,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8RAAiSE,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,iKAA8KA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAEC,EAAE,CAAC,KAAK,gDAAgD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAE,+XAAkYF,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,sUAA4T,CAAC,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBb,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2DAA2D,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,gCAAgC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAE,aAA0BF,EAAEC,EAAE,CAAC,KAAK,8EAA8E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,EAAeY,EAAwBd,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,WAAmBA,EAAEC,EAAE,CAAC,KAAK,2MAA2M,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,yIAAsJF,EAAEC,EAAE,CAAC,KAAK,4GAA4G,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAE,2QAAmRF,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,yMAAsNA,EAAEC,EAAE,CAAC,KAAK,+CAA+C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAE,wZAA2ZF,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,wGAAqHA,EAAEC,EAAE,CAAC,KAAK,oFAAoF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAE,8NAA2OF,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,qaAA8ZA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,wdAAqeA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,yIAAuIA,EAAEC,EAAE,CAAC,KAAK,sEAAsE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sCAAsC,CAAC,CAAC,CAAC,EAAE,gSAAiR,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBjB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qDAAqD,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,gCAAgC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAE,aAA0BF,EAAEC,EAAE,CAAC,KAAK,8EAA8E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,CAAC,EAAec,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,mEAAgFE,EAAEC,EAAE,CAAC,KAAK,oDAAoD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAE,uLAAoMF,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8EAA8E,CAAC,EAAE,IAAiBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,2bAAsb,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6CAA6C,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sUAAmVE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,ksBAA0sBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,ybAAob,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+jBAAuhB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAEC,EAAE,CAAC,KAAK,uFAAuF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAE,2dAAodF,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,4jBAAujB,CAAC,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4OAA4O,CAAC,EAAeA,EAAE,aAAa,CAAC,SAAsBA,EAAE,IAAI,CAAC,SAAsBF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,+cAAib,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sEAAsE,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2cAAycE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,qMAAkNA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,qbAA2a,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wDAAwD,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mRAAgSE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,qOAAiN,CAAC,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8QAA8Q,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,6CAA0DE,EAAEC,EAAE,CAAC,KAAK,qCAAqC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAE,+DAA0D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,oKAAuKE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,0cAAqc,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mjBAAmjB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8xCAAmwCE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8XAAoX,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kDAAkD,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2VAA8VE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAEC,EAAE,CAAC,KAAK,gDAAgD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAE,6EAA6E,CAAC,CAAC,EAAeJ,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,iMAA4L,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,EAAE,4PAAmO,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,SAAiBA,EAAE,SAAS,CAAC,SAAS,GAAG,CAAC,EAAE,mWAA8V,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,uIAAkI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,+PAA4QE,EAAEC,EAAE,CAAC,KAAK,0DAA0D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,EAAE,6XAA0YF,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,gOAA6OA,EAAEC,EAAE,CAAC,KAAK,oDAAoD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAE,8HAA8H,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wVAAwV,CAAC,EAAeA,EAAE,aAAa,CAAC,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wGAA8F,CAAC,EAAE,WAAmBA,EAAEC,EAAE,CAAC,KAAK,gGAAgG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAE,iFAAiF,CAAC,CAAC,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,iwBAA8wBE,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,wTAAqUA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,iZAAiZ,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+LAA4ME,EAAEC,EAAE,CAAC,KAAK,wJAAwJ,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,2lBAAwmBF,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,sXAAmYA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,+fAA0f,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gXAA6XE,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,qYAA6YA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,2CAA2C,CAAC,EAAE,4UAAoVA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,mNAA2NA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,4CAA4C,CAAC,EAAE,kQAA0QA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,6CAA6C,CAAC,EAAE,mBAA2BA,EAAEC,EAAE,CAAC,KAAK,6CAA6C,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAE,4GAA4G,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,6DAA6D,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,uVAAoWE,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,0LAAkMA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAE,gKAAwKA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,uEAAuE,CAAC,EAAE,uIAA+IA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,+CAA+C,CAAC,EAAE,iIAA4H,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iQAA8QE,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAE,0KAAuLA,EAAEC,EAAE,CAAC,KAAK,gDAAgD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sCAAiC,CAAC,CAAC,CAAC,EAAE,4VAAuV,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,6PAAwP,CAAC,CAAC,CAAC,CAAC,EAAekB,EAAwBlB,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qDAAqD,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,gCAAgC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAE,aAA0BF,EAAEC,EAAE,CAAC,KAAK,8EAA8E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBrB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,gHAAgH,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,2MAA2M,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,0HAAuIA,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,kEAA+EA,EAAEC,EAAE,CAAC,KAAK,yGAAyG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAE,8EAA2FF,EAAEC,EAAE,CAAC,KAAK,6OAA6O,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAE,kCAA+CF,EAAEC,EAAE,CAAC,KAAK,sDAAsD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,2NAA2N,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,4XAA4X,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,2GAA2G,CAAC,EAAE,SAAsBA,EAAE,SAAS,CAAC,SAAS,gEAAgE,CAAC,EAAE,KAAkBA,EAAE,KAAK,CAAC,SAAS,4KAA4K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qYAAqY,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,SAAS,0aAA4a,CAAC,EAAE,UAAuBA,EAAE,SAAS,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,CAAC,CAAC,CAAC,EAAeoB,EAAwBtB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,gCAAgC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAE,aAA0BF,EAAEC,EAAE,CAAC,KAAK,0BAA0B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,iDAAiD,CAAC,CAAC,CAAC,CAAC,CAAC,EAAemB,EAAwBvB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,qLAAqL,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,2MAA2M,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,yLAAsMF,EAAEC,EAAE,CAAC,KAAK,2GAA2G,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAE,0KAA0K,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,wNAAwN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iUAAiU,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yRAAsSE,EAAEC,EAAE,CAAC,KAAK,qOAAqO,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAE,YAAyBF,EAAEC,EAAE,CAAC,KAAK,6OAA6O,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAE,gVAAgV,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,OAAO,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,oIAAoI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,0FAA0F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,sIAAsI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gaAAka,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAEC,EAAE,CAAC,KAAK,4DAA4D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAE,sMAAsM,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoB,EAAwBtB,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8CAA8C,CAAC,EAAE,IAAiBA,EAAEC,EAAE,CAAC,KAAK,0BAA0B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,sEAAsE,CAAC,CAAC,CAAC,CAAC,EAAeqB,EAAwBzB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,6HAA0IE,EAAEC,EAAE,CAAC,KAAK,gDAAgD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,iYAA8YF,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,qTAAsS,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+RAA+R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qEAAqE,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,gDAAgD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAE,4HAA4H,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,UAAkBE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,+JAA0J,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,UAAkBE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,iJAA4I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,UAAkBE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,wLAAmL,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,UAAkBE,EAAE,SAAS,CAAC,SAAS,2CAA2C,CAAC,EAAE,wJAAmJ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,UAAkBE,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,EAAE,oHAA+G,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sVAAsV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6SAA0TE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8GAAyG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewB,EAAwB1B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,gCAAgC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAE,aAA0BF,EAAEC,EAAE,CAAC,KAAK,0BAA0B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeuB,EAAwB3B,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,sWAAmXA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,ozBAAi0BA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,qRAAwRA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,wGAAwG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,mEAAmE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,iHAAiH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoBE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,iEAAiE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,qEAAkFA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,CAAC,EAAE,kDAAkD,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6CAA0DE,EAAEC,EAAE,CAAC,KAAK,oDAAoD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,8dAA2eF,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,ygBAAshBE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,4CAA4C,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2aAAwbE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,CAAC,EAAe0B,EAAwB5B,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,+KAA4LE,EAAEC,EAAE,CAAC,KAAK,CAAC,UAAU,WAAW,EAAE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAE,kKAA+KF,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wXAA2XE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uCAAuC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0DAAqD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,CAAC,EAAE,2BAA2B,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yRAAiSE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+EAA+E,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,sEAAiE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,mFAA8E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,8EAAyE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,0EAAqE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,gEAA2D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,0EAAqE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBF,EAAE,SAAS,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,CAAC,EAAE,gCAAgC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8ZAAsaE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,sDAAsD,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,qDAAkEE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,gCAAgC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAE,aAA0BF,EAAEC,EAAE,CAAC,KAAK,8EAA8E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeyB,EAAwB7B,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,ySAAiTE,EAAE,KAAK,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+CAA+C,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0LAAuME,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,mLAAgMA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,4GAA4G,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,KAAK,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sDAAsD,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8UAA2VE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8eAA4fA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,0DAA0D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,KAAK,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iDAAiD,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,ucAA+cE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,wOAAsOA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,2FAA2F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+DAA+D,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wPAAqQE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+NAA6NA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,iFAAiF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8CAA8C,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0SAAuTE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,sSAA+RA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,sFAAsF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcA,EAAE,SAAS,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,CAAC,EAAE,0CAA0C,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+SAA4TE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,6KAAwK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe4B,EAAwB5B,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAE,+DAA4EA,EAAEC,EAAE,CAAC,KAAK,gCAAgC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAE,aAA0BF,EAAEC,EAAE,CAAC,KAAK,0BAA0B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,yDAAyD,CAAC,CAAC,CAAC,CAAC,EAAe2B,EAAwB7B,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAcA,EAAE,KAAK,CAAC,SAAS,CAAC,wIAAqJE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,uJAA+JA,EAAEC,EAAE,CAAC,KAAK,gHAAgH,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wCAAmC,CAAC,CAAC,CAAC,EAAE,6LAAqMF,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,uFAA0FA,EAAEC,EAAE,CAAC,KAAK,kEAAkE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAE,6SAA2SF,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,OAAoBA,EAAEC,EAAE,CAAC,KAAK,gDAAgD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAE,swBAAswB,CAAC,CAAC,CAAC,CAAC,EAAe4B,EAAwB9B,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAC,wVAAqWE,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,8WAA4WA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,iDAAiD,CAAC,EAAE,4DAAyEA,EAAEC,EAAE,CAAC,KAAK,gCAAgC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAE,aAA0BF,EAAEC,EAAE,CAAC,KAAK,0BAA0B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,sDAAmEF,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe+B,EAAwBjC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,mBAAgCE,EAAEC,EAAE,CAAC,KAAK,kOAAkO,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,yEAAsFF,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAE,mBAAmB,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qBAA6BE,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAE,+YAA0Y,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2VAAiV,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,kaAAka,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,yPAAoP,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,uTAAkT,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iXAAiX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2PAA2P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAegC,EAAwBlC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,+CAA4DA,EAAEC,EAAE,CAAC,KAAK,8BAA8B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,EAAE,oLAAoL,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,mdAAmd,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+aAAqa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gZAA4X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,gHAAgH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,kHAA6G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4UAA4U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wUAAwU,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yDAAyD,CAAC,EAAE,SAAsBA,EAAEC,EAAE,CAAC,KAAK,8BAA8B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAE,sCAAsC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe+B,EAAwBnC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,0dAAqd,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8aAA+a,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6TAA6T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2UAAsU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wrBAAmrB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0NAA2N,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAAsHE,EAAEC,EAAE,CAAC,KAAK,sBAAsB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,uGAAuG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+bAAqb,CAAC,CAAC,CAAC,CAAC,EAC/w9IkC,EAAqB,CAAC,QAAU,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["init_ssg_sandbox_shims", "richText", "u", "x", "p", "Link", "motion", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "richText16", "richText17", "richText18", "richText19", "richText20", "richText21", "richText22", "richText23", "richText24", "richText25", "richText26", "richText27", "richText28", "richText29", "richText30", "richText31", "__FramerMetadata__"]
}
