[{"id":"ci_2b64aea4da9eb136f6a706f15cf37b5cc298319d10897e5ceac0eb6d126ce669","title":"Solution Partners","path":"/en/partners/working-version/solution-partners","children":[{"id":"ci_dac89a583390dd8e494dd311bb75088253b0e86d640bad7a4cd4c41c2add31ee","title":"Solution Partner | Harmony","path":"/en/partners/working-version/harmony-with-electric","children":[{"id":"ci_e004dc2c23ebe154f4af380d033cb9848c32404b4f03f8e4a08c38c3b3f315b8","title":"Harmony | FAQ","path":"/en/partners/working-version/solution-partner-harmony","children":[]},{"id":"ci_fa9fec7d3713eda135a58a2cfa12e0b2ab4b6ea0bda7c6f7ac1220bf55e8fc33","title":"Getting Started: A Guide to Avanan","path":"/en/partners/working-version/getting-started-a-guide-to-avanan","children":[]}]},{"id":"ci_10ec8905330b1b949c7bbb26236d4f075c370136518ffdd2615d0a0540e2411e","title":"Solution Partner | Keeper","path":"/en/partners/working-version/solution-partner-keeper-1","children":[{"id":"ci_90e9cb30d313bd53a96044433daee7e7c4fae6ddcf4a1af61f620822fe36e104","title":"Keeper | FAQ","path":"/en/partners/working-version/solution-partner-keeper","children":[]}]},{"id":"ci_c76d86f92dc9ccad6ee9e09692551a59c52db7ad4e098240a2116eb644a3b654","title":"Solution Partner | Dropsuite","path":"/en/partners/working-version/dropsuite","children":[{"id":"ci_2c42c99a397d22bbb2eddcd780385948592b7a7efa03b7cc47b607ebb984f7eb","title":"Dropsuite | FAQ","path":"/en/partners/working-version/solution-partner-dropsuite","children":[]}]},{"id":"ci_78db06ea3434b0f6d4c8dec344d8111a9f67ca630696b9c42df6f1ce51c392ed","title":"Solution Partner | Threatdown","path":"/en/partners/working-version/threatdown","children":[{"id":"ci_8e2c4a2a0771f40fec4d9ca66d6a684b69594a175723f1b9ed47cb53d6f60eae","title":"Threatdown | FAQ","path":"/en/partners/working-version/solution-partner-threatdown","children":[]},{"id":"ci_9d2ac9007006781c5664ce22cae5a030512b06bdcf50b1fc9eebeff86aa37f4d","title":"Managed Detection & Response - Threatdown Implementation SOW","path":"/en/partners/working-version/managed-detection-response-threatdown-implementati","children":[]}]},{"id":"ci_de66a1ee0a405cae83384432fed4532af2dd19548c8ce9535adc24dd458be453","title":"Solution Partner | Perimeter81","path":"/en/partners/working-version/perimeter81","children":[{"id":"ci_8968d91f8a76c3677cae827b4e6abb95abba603e6c23980c3d46c8bcdd87380a","title":"Perimeter 81 | FAQ","path":"/en/partners/working-version/solution-partner-perimeter-81","children":[]},{"id":"ci_6053d9a5fdec1edbdd3a13c7225ee285953e2f6fab7b150291c1cf77e67c0a67","title":"Secure Internet Access | FAQ","path":"/en/partners/working-version/secure-internet-access-faq","children":[]}]},{"id":"ci_e955fd10fe1c79f37ac87fa84f8979d3e27d797c58a1623845f60a421515fc00","title":"Solution Partner | General Support","path":"/en/partners/working-version/solution-partner-general-support","children":[]},{"id":"ci_a1c64e1839a24813181eb3522d6c0f48b8722bf1f61d35599a24278ac4abc9f6","title":"Solution Partner | Breach Secure Now","path":"/en/partners/working-version/solution-partner-breach-secure-now-1","children":[{"id":"ci_a11531d5fc643b825603d54624fa2de9bb0d97e6eeebc09f8123de97f418e230","title":"Breach Secure Now | FAQ","path":"/en/partners/working-version/solution-partner-breach-secure-now","children":[]}]}]},{"id":"ci_f698d6328911a1dd1215dab029a1e5f8bcb4cb369d3e4c388b8dae043a50bcb7","title":"Service Partners","path":"/en/partners/working-version/service-partners","children":[{"id":"ci_399659906b98367fdec4265fc4fc5b7dbe24cc0b580fd30aad35830c5e5f2b8a","title":"Electric IT Hub Service Partner Program Quality Standards","path":"/en/partners/working-version/eletric-it-hub-service-partner-program-quality-sta","children":[]},{"id":"ci_1664b607d31984a3421483e17a9133c3801deaa0cb7da3daf5bf7ebffa56d346","title":"Service Partner FAQs","path":"/en/partners/working-version/service-partner-faqs","children":[]}]}]