[{"id":"ci_117c34f27c506963ff2db99d5264420b2f2506c87bbb8ca15f43afa938ce989c","title":"Solution Partners","path":"/fr/partners/working-version/solution-partners","children":[{"id":"ci_d24ecf94a9672660a43d212c17f650f3de0a737fef2eab8a5bac1eb55fc9e08e","title":"Solution Partner | Harmony","path":"/fr/partners/working-version/harmony-with-electric","children":[{"id":"ci_002ee5a32e9f703b64bdcab85fe4d3527a9b4359e8866d7d3b74742ddbf6d2ad","title":"Harmony | FAQ","path":"/fr/partners/working-version/solution-partner-harmony","children":[]},{"id":"ci_88a234b45be577bbdc83ab12bcb7142d04e5b337a4e8c16ad6355f215f96aa7b","title":"Getting Started: A Guide to Avanan","path":"/fr/partners/working-version/getting-started-a-guide-to-avanan","children":[]}]},{"id":"ci_fbd8f96f817d72c5548401880fc0b37b0173d60859046abab96026749c6cbfeb","title":"Solution Partner | Keeper","path":"/fr/partners/working-version/solution-partner-keeper-1","children":[{"id":"ci_81651a6cb609eebd504339768f81c6f35e9f0d534cdb0a11e65f33f97a1f8ead","title":"Keeper | FAQ","path":"/fr/partners/working-version/solution-partner-keeper","children":[]}]},{"id":"ci_d1a53fc05d0982a1f238a01a763e81990a7b0b8dc1ba2a6e964b084cea8e804e","title":"Solution Partner | Dropsuite","path":"/fr/partners/working-version/dropsuite","children":[{"id":"ci_1929638ca2cc31223b3ef5f9f0f0746f19e40ac7dbecb0c60a3c8c59851da2b9","title":"Dropsuite | FAQ","path":"/fr/partners/working-version/solution-partner-dropsuite","children":[]}]},{"id":"ci_5146bfb11d0c870f829b73431b7ad9abfb6d3d472b8332967053aac6219d0a8d","title":"Solution Partner | Threatdown","path":"/fr/partners/working-version/threatdown","children":[{"id":"ci_52bac6f9e09b2e7e3a9918a21c9e3aecd5e7333c8c4ed2900180da092874abb2","title":"Threatdown | FAQ","path":"/fr/partners/working-version/solution-partner-threatdown","children":[]},{"id":"ci_88f179cab419b8b1cd92e5776e4f2dee21fe54d5f3c67c713f0d1eb14debbc7b","title":"Managed Detection & Response - Threatdown Implementation SOW","path":"/fr/partners/working-version/managed-detection-response-threatdown-implementati","children":[]}]},{"id":"ci_3ee48e6d05899c54208e82187aeec61821d552dfde8834296810c094f583d910","title":"Solution Partner | Perimeter81","path":"/fr/partners/working-version/perimeter81","children":[{"id":"ci_8a9e38aebb5308d3d9bbe1d70330b94fbe929ceebeeecdff93b6716ecb40ce6f","title":"Perimeter 81 | FAQ","path":"/fr/partners/working-version/solution-partner-perimeter-81","children":[]},{"id":"ci_69e42cc1e03bcaaf31b619d44cce99a2e5d9628641f32bf99cebbd9f4b4ff519","title":"Secure Internet Access | FAQ","path":"/fr/partners/working-version/secure-internet-access-faq","children":[]}]},{"id":"ci_f28b74e6e5298d4165050171ffc6079b96e3c5051e7b40aac88d3bcdf3bc8630","title":"Solution Partner | General Support","path":"/fr/partners/working-version/solution-partner-general-support","children":[]},{"id":"ci_6166a1982352e39dcba4423a35b84c2e6f8dd41b9dc752b2b440ef2090be788e","title":"Solution Partner | Breach Secure Now","path":"/fr/partners/working-version/solution-partner-breach-secure-now-1","children":[{"id":"ci_0e98dcaad75283091829987fb25a2bc2213c901b80be3a256e4ad59d014940a6","title":"Breach Secure Now | FAQ","path":"/fr/partners/working-version/solution-partner-breach-secure-now","children":[]}]}]},{"id":"ci_51994f2bd1c4d86bc1231faba1a3552fc8a359d5c8a986ae590bb80f953ccd20","title":"Service Partners","path":"/fr/partners/working-version/service-partners","children":[{"id":"ci_bdf4b6500d340579c981f17012edd44b78beb198468ee510990d98da1f2493df","title":"Electric IT Hub Service Partner Program Quality Standards","path":"/fr/partners/working-version/eletric-it-hub-service-partner-program-quality-sta","children":[]},{"id":"ci_a849beb6b861e321102539c60918ada5e79e802c10a3d539fa15e8302961934e","title":"Service Partner FAQs","path":"/fr/partners/working-version/service-partner-faqs","children":[]}]}]