1:"$Sreact.fragment" 2:I[87555,[],""] 3:I[31295,[],""]
4:I[70492,["3063","static/chunks/3063-0f90d7692c6d4b7c.js","6874","static/chunks/6874-75231d0d52e6a64d.js","4889","static/chunks/app/(pages)/solutions/permissioned-environments/page-7c7de5c7470d0cc0.js"],"default"]
5:I[33063,["3063","static/chunks/3063-0f90d7692c6d4b7c.js","6874","static/chunks/6874-75231d0d52e6a64d.js","4889","static/chunks/app/(pages)/solutions/permissioned-environments/page-7c7de5c7470d0cc0.js"],"Image"]
6:I[1678,["3063","static/chunks/3063-0f90d7692c6d4b7c.js","6874","static/chunks/6874-75231d0d52e6a64d.js","4889","static/chunks/app/(pages)/solutions/permissioned-environments/page-7c7de5c7470d0cc0.js"],"default"]
7:I[59665,[],"OutletBoundary"] a:I[74911,[],"AsyncMetadataOutlet"]
c:I[59665,[],"ViewportBoundary"] e:I[59665,[],"MetadataBoundary"]
10:"$Sreact.suspense" 11:I[74911,[],"AsyncMetadata"]
0:{"b":"WLofOomEv-d6MlML5VlP_","f":[["children","(pages)","children","solutions","children","permissioned-environments",["permissioned-environments",{"children":["__PAGE__",{}]}],["permissioned-environments",["$","$1","c",{"children":[null,["$","$L2",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L3",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":[["$","section",null,{"id":"solutions","children":[["$","$L4",null,{"title":"AI-Enhanced
Permissioned Environments for Secure and Scalable Blockchain
Solutions","content":"Nexchain provides advanced AI-powered permissioned
environments that enable enterprises and organizations to build secure, private,
and efficient blockchain networks tailored to their specific needs. By combining
the power of artificial intelligence with blockchain technology, Nexchain offers
a highly scalable and adaptable environment for businesses looking to leverage
blockchain while maintaining control over access and
permissions.","greenLabel":"Permissioned
Environments","greenIcon":"permissioned.svg"}],["$","div",null,{"className":"content
blocks","children":["$","div",null,{"className":"content-list","children":[["$","div","0",{"className":"line","children":[["$","div",null,{"className":"main","children":[["$","$L5",null,{"src":"/images/solutions/23.svg","width":"42","height":"42","alt":"Custom
Permissioned Blockchains"}],["$","h2",null,{"children":"Custom Permissioned
Blockchains"}],"Nexchain’s permissioned environments allow enterprises to set
up private blockchain networks with flexible access control, tailored governance
models, and enhanced privacy features. These customizable networks are ideal for
use cases such as enterprise data management, confidential transactions, and
private financial
ecosystems."]}],["$","div",null,{"className":"cards","children":[["$","div","0",{"className":"card","children":[["$","h4",null,{"children":"Custom
Access Control"}],"Enterprises can define and control who can participate in the
network, who can validate transactions, and who can access specific data. This
level of access control ensures that only authorized participants can interact
with the
blockchain."]}],["$","div","1",{"className":"card","children":[["$","h4",null,{"children":"Tailored
Governance"}],"Organizations can configure the governance model to meet their
specific operational and regulatory needs. Whether it’s decentralized or
centrally governed, Nexchain provides the tools for seamless management of
permissions and
decision-making."]}]]}]]}],["$","div","1",{"className":"line","children":[["$","div",null,{"className":"main","children":[["$","$L5",null,{"src":"/images/solutions/24.svg","width":"42","height":"42","alt":"AI-Driven
Privacy and Security"}],["$","h2",null,{"children":"AI-Driven Privacy and
Security"}],"In a permissioned environment, privacy and security are paramount.
Nexchain’s AI algorithms enhance the privacy and security of permissioned
networks by using advanced encryption, real-time monitoring, and fraud detection
techniques."]}],["$","div",null,{"className":"cards","children":[["$","div","0",{"className":"card","children":[["$","h4",null,{"children":"Privacy-Preserving
AI"}],"Nexchain leverages AI models that automatically adapt to privacy
regulations and organizational needs, ensuring that sensitive data is protected
while still enabling efficient blockchain
operations."]}],["$","div","1",{"className":"card","children":[["$","h4",null,{"children":"AI-Powered
Security"}],"Through AI-driven monitoring, Nexchain continuously tracks network
activity, detecting potential security threats and ensuring that any suspicious
activities are flagged and addressed in
real-time."]}]]}]]}],["$","div","2",{"className":"line","children":[["$","div",null,{"className":"main","children":[["$","$L5",null,{"src":"/images/solutions/25.svg","width":"42","height":"42","alt":"Scalable
Permissioned Networks"}],["$","h2",null,{"children":"Scalable Permissioned
Networks"}],"Nexchain’s AI-enhanced permissioned environments are designed to
scale effortlessly, handling increasing transaction volumes and growing user
bases without sacrificing performance. Whether your business is handling a small
internal network or a global enterprise system, Nexchain provides the
infrastructure needed to scale securely and
efficiently."]}],["$","div",null,{"className":"cards","children":[["$","div","0",{"className":"card","children":[["$","h4",null,{"children":"High
Throughput"}],"Powered by AI, Nexchain’s permissioned networks can process
large volumes of transactions per second (TPS), ensuring high performance even
under heavy
usage."]}],["$","div","1",{"className":"card","children":[["$","h4",null,{"children":"Efficient
Resource Management"}],"AI-driven protocols optimize resource allocation,
ensuring that the network remains scalable, secure, and cost-effective as it
grows."]}]]}]]}],["$","div","3",{"className":"line","children":[["$","div",null,{"className":"main","children":[["$","$L5",null,{"src":"/images/solutions/22.svg","width":"42","height":"42","alt":"Seamless
Integration with Existing Systems"}],["$","h2",null,{"children":"Seamless
Integration with Existing Systems"}],"Nexchain enables seamless integration with
existing enterprise systems, allowing businesses to easily incorporate
blockchain into their operations without overhauling current infrastructure.
Whether integrating with legacy systems or creating new applications, Nexchain
provides a robust framework for
interoperability."]}],["$","div",null,{"className":"cards","children":[["$","div","0",{"className":"card","children":[["$","h4",null,{"children":"Flexible
API Integration"}],"Nexchain offers a suite of APIs that allow businesses to
integrate permissioned blockchain environments into their existing workflows,
enabling real-time data sharing, secure transactions, and enhanced operational
efficiency."]}],["$","div","1",{"className":"card","children":[["$","h4",null,{"children":"Cross-Chain
Interoperability"}],"For enterprises that need to interact with multiple
blockchain ecosystems, Nexchain ensures that permissioned networks can
seamlessly integrate any blockchain networks, enabling a more interconnected
ecosystem."]}]]}]]}],["$","div","4",{"className":"line","children":[["$","div",null,{"className":"main","children":[["$","$L5",null,{"src":"/images/solutions/26.svg","width":"42","height":"42","alt":"AI-Driven
Compliance and Auditing"}],["$","h2",null,{"children":"AI-Driven Compliance and
Auditing"}],"With the rising demand for regulatory compliance, Nexchain’s
permissioned environments include AI-driven tools for ensuring that all
transactions, processes, and actions are in full compliance with industry
standards and legal
requirements."]}],["$","div",null,{"className":"cards","children":[["$","div","0",{"className":"card","children":[["$","h4",null,{"children":"Automated
Compliance"}],"Nexchain’s AI tools continuously analyze transactions and
operations within the network to ensure compliance with global regulations, such
as GDPR, KYC/AML, and financial reporting
standards."]}],["$","div","1",{"className":"card","children":[["$","h4",null,{"children":"Real-Time
Auditing"}],"AI-powered auditing tools automatically track and document all
actions on the network, creating an immutable and verifiable record that helps
businesses stay compliant and
audit-ready."]}]]}]]}]]}]}],["$","div",null,{"id":"whyBlock","children":["$","div",null,{"className":"content","children":[["$","div",null,{"className":"green","dangerouslySetInnerHTML":{"__html":"Why
Nexchain for Permissioned
Environments?"}}],[["$","div","0",{"className":"card","children":[["$","div",null,{"className":"image-wrap","children":["$","$L5",null,{"src":"/images/why/21.svg","fill":true,"alt":"AI-Enhanced
Privacy and
Security"}]}],["$","h4",null,{"dangerouslySetInnerHTML":{"__html":"AI-Enhanced
Privacy and Security"}}],["$","p",null,{"children":"Advanced AI models ensure
data privacy and network security by automatically adapting to changing needs
and
threats."}]]}],["$","div","1",{"className":"card","children":[["$","div",null,{"className":"image-wrap","children":["$","$L5",null,{"src":"/images/why/22.svg","fill":true,"alt":"Scalable
Infrastructure"}]}],["$","h4",null,{"dangerouslySetInnerHTML":{"__html":"Scalable
Infrastructure"}}],["$","p",null,{"children":"Nexchain’s permissioned
environments are built to scale, handling enterprise-level transaction volumes
and growing network sizes with
ease."}]]}],["$","div","2",{"className":"card","children":[["$","div",null,{"className":"image-wrap","children":["$","$L5",null,{"src":"/images/why/23.svg","fill":true,"alt":"Custom
Governance and Access
Control"}]}],["$","h4",null,{"dangerouslySetInnerHTML":{"__html":"Custom
Governance and Access Control"}}],["$","p",null,{"children":"Tailor blockchain
to business and regulatory needs with flexible governance and customizable
access."}]]}],["$","div","3",{"className":"card","children":[["$","div",null,{"className":"image-wrap","children":["$","$L5",null,{"src":"/images/why/24.svg","fill":true,"alt":"Seamless
Integration"}]}],["$","h4",null,{"dangerouslySetInnerHTML":{"__html":"Seamless
Integration"}}],["$","p",null,{"children":"Nexchain enables seamless
integration of your permissioned blockchain with enterprise systems for a smooth
transition."}]]}],["$","div","4",{"className":"card","children":[["$","div",null,{"className":"image-wrap","children":["$","$L5",null,{"src":"/images/why/25.svg","fill":true,"alt":"Regulatory
Compliance"}]}],["$","h4",null,{"dangerouslySetInnerHTML":{"__html":"Regulatory
Compliance"}}],["$","p",null,{"children":"Benefit from automated
compliance tools and real-time auditing features that ensure network stays
compliant with industry
regulations."}]]}]]]}]}],["$","div",null,{"id":"bottomPanel","children":["$","div",null,{"className":"content","children":[["$","h3",null,{"children":"Get
Started with Nexchain Permissioned Environments"}],"Transform your business
operations with Nexchain’s AI-powered permissioned blockchain environments.
Whether you're looking to build a secure, private blockchain for internal use or
a private financial ecosystem, Nexchain provides the tools, scalability, and
security you need to succeed. Start today and build the next-generation
permissioned blockchain solutions with
Nexchain.",["$","$L6",null,{"href":"https://testnet.nexchainai.net","children":["$","button",null,{"className":"btn
","onClick":"$undefined","children":"Join
Presale"}]}]]}]}]]}],"$undefined",[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/2da30e54a81e4c79.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","link","1",{"rel":"stylesheet","href":"/_next/static/css/d9be046dc93da3fe.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","link","2",{"rel":"stylesheet","href":"/_next/static/css/954df793ccb4204f.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","$L7",null,{"children":["$L8","$L9",["$","$La",null,{"promise":"$@b"}]]}]]}],{},null,false]},null,false],["$","$1","h",{"children":[null,["$","$1","ChBHDZ38uRzrj9C1QCJFR",{"children":[["$","$Lc",null,{"children":"$Ld"}],["$","meta",null,{"name":"next-size-adjust","content":""}]]}],[["$","$Le","ChBHDZ38uRzrj9C1QCJFR",{"children":"$Lf"}]],null]}],false]],"S":false}
f:["$","$10",null,{"fallback":null,"children":["$","$L11",null,{"promise":"$@12"}]}]
9:null
d:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width,
initial-scale=1"}]] 8:null b:{"metadata":[["$","title","0",{"children":"Secure
Permissioned Environments in
Blockchain"}],["$","meta","1",{"name":"description","content":"Learn how
Nexchain’s permissioned environments provide enterprise-grade access controls
and data security on
blockchain."}],["$","link","2",{"rel":"canonical","href":"https://nexchain.ai/solutions/permissioned-environments"}],["$","meta","3",{"property":"og:title","content":"Secure
Permissioned Environments in
Blockchain"}],["$","meta","4",{"property":"og:description","content":"Learn how
Nexchain’s permissioned environments provide enterprise-grade access controls
and data security on
blockchain."}],["$","meta","5",{"property":"og:url","content":"https://nexchain.ai/solutions/permissioned-environments"}],["$","meta","6",{"property":"og:image","content":"https://nexchain.ai/images/logo.svg"}],["$","meta","7",{"property":"og:image:width","content":"500"}],["$","meta","8",{"property":"og:image:height","content":"500"}],["$","meta","9",{"property":"og:image:alt","content":"Secure
Permissioned Environments in
Blockchain"}],["$","meta","10",{"name":"twitter:card","content":"summary_large_image"}],["$","meta","11",{"name":"twitter:title","content":"Secure
Permissioned Environments in
Blockchain"}],["$","meta","12",{"name":"twitter:description","content":"Learn
how Nexchain’s permissioned environments provide enterprise-grade access
controls and data security on
blockchain."}],["$","meta","13",{"name":"twitter:image","content":"https://nexchain.ai/images/logo.svg"}],["$","meta","14",{"name":"twitter:image:width","content":"500"}],["$","meta","15",{"name":"twitter:image:height","content":"500"}],["$","meta","16",{"name":"twitter:image:alt","content":"Secure
Permissioned Environments in
Blockchain"}],["$","link","17",{"rel":"icon","href":"/favicon.ico","type":"image/x-icon","sizes":"32x32"}]],"error":null,"digest":"$undefined"}
12:{"metadata":"$b:metadata","error":null,"digest":"$undefined"}