/**handles:elementor-post-17005**/
.elementor-widget-slides .elementor-slide-heading{font-family:var( --e-global-typography-primary-font-family ),Sans-serif;font-weight:var(--e-global-typography-primary-font-weight)}.elementor-widget-slides .elementor-slide-description{font-family:var( --e-global-typography-secondary-font-family ),Sans-serif;font-weight:var(--e-global-typography-secondary-font-weight)}.elementor-widget-slides .elementor-slide-button{font-family:var( --e-global-typography-accent-font-family ),Sans-serif;font-weight:var(--e-global-typography-accent-font-weight)}.elementor-17005 .elementor-element.elementor-element-b66594b .elementor-repeater-item-9bf2fc2 .swiper-slide-bg{background-image:url(https://impulsenetworks.in/wp-content/uploads/2024/09/Different-Types-of-Perimeter-Security-Systems-1-scaled.webp);background-size:contain}.elementor-17005 .elementor-element.elementor-element-b66594b .elementor-repeater-item-8aacdf4 .swiper-slide-bg{background-image:url(https://impulsenetworks.in/wp-content/uploads/2024/09/Different-Types-of-Perimeter-Security-Systems-2-scaled.webp);background-size:contain}.elementor-17005 .elementor-element.elementor-element-b66594b .elementor-repeater-item-5beca13 .swiper-slide-bg{background-image:url(https://impulsenetworks.in/wp-content/uploads/2024/09/Different-Types-of-Perimeter-Security-Systems-3-scaled.webp);background-size:contain}.elementor-17005 .elementor-element.elementor-element-b66594b .elementor-repeater-item-e6ff2e8 .swiper-slide-bg{background-image:url(https://impulsenetworks.in/wp-content/uploads/2024/09/Different-Types-of-Perimeter-Security-Systems-4-scaled.webp);background-size:contain}.elementor-17005 .elementor-element.elementor-element-b66594b .elementor-repeater-item-a3a28ab .swiper-slide-bg{background-image:url(https://impulsenetworks.in/wp-content/uploads/2024/09/Different-Types-of-Perimeter-Security-Systems-5-scaled.webp);background-size:contain}.elementor-17005 .elementor-element.elementor-element-b66594b .elementor-repeater-item-244d248 .swiper-slide-bg{background-image:url(https://impulsenetworks.in/wp-content/uploads/2024/09/Different-Types-of-Perimeter-Security-Systems-6-scaled.webp);background-size:contain}.elementor-17005 .elementor-element.elementor-element-b66594b .swiper-slide{transition-duration:calc(5000ms*1.2);height:100vh}.elementor-17005 .elementor-element.elementor-element-b66594b .swiper-slide-contents{max-width:100%}.elementor-17005 .elementor-element.elementor-element-b66594b .swiper-slide-inner{text-align:center}.elementor-17005 .elementor-element.elementor-element-b66594b .elementor-swiper-button{color:#000a64}.elementor-17005 .elementor-element.elementor-element-b66594b .elementor-swiper-button svg{fill:#000A64}@media(max-width:767px){.elementor-17005 .elementor-element.elementor-element-2345238{margin-top:0;margin-bottom:0;padding:0}.elementor-17005 .elementor-element.elementor-element-ce08911>.elementor-element-populated{padding:0}.elementor-17005 .elementor-element.elementor-element-b66594b .swiper-slide{height:63vh}}