/**handles:elementor-post-17017**/
.elementor-widget-slides .elementor-slide-heading{font-family:var( --e-global-typography-primary-font-family ),Sans-serif;font-weight:var(--e-global-typography-primary-font-weight)}.elementor-widget-slides .elementor-slide-description{font-family:var( --e-global-typography-secondary-font-family ),Sans-serif;font-weight:var(--e-global-typography-secondary-font-weight)}.elementor-widget-slides .elementor-slide-button{font-family:var( --e-global-typography-accent-font-family ),Sans-serif;font-weight:var(--e-global-typography-accent-font-weight)}.elementor-17017 .elementor-element.elementor-element-6777c62 .elementor-repeater-item-9bf2fc2 .swiper-slide-bg{background-image:url(https://impulsenetworks.in/wp-content/uploads/2024/09/7-Best-Practices-for-Robust-Perimeter-Security-1-scaled.webp);background-size:contain}.elementor-17017 .elementor-element.elementor-element-6777c62 .elementor-repeater-item-8aacdf4 .swiper-slide-bg{background-image:url(https://impulsenetworks.in/wp-content/uploads/2024/09/7-Best-Practices-for-Robust-Perimeter-Security-2-scaled.webp);background-size:contain}.elementor-17017 .elementor-element.elementor-element-6777c62 .elementor-repeater-item-5beca13 .swiper-slide-bg{background-image:url(https://impulsenetworks.in/wp-content/uploads/2024/09/7-Best-Practices-for-Robust-Perimeter-Security-3-scaled.webp);background-size:contain}.elementor-17017 .elementor-element.elementor-element-6777c62 .elementor-repeater-item-e6ff2e8 .swiper-slide-bg{background-image:url(https://impulsenetworks.in/wp-content/uploads/2024/09/7-Best-Practices-for-Robust-Perimeter-Security-4-scaled.webp);background-size:contain}.elementor-17017 .elementor-element.elementor-element-6777c62 .elementor-repeater-item-a3a28ab .swiper-slide-bg{background-image:url(https://impulsenetworks.in/wp-content/uploads/2024/09/7-Best-Practices-for-Robust-Perimeter-Security-5-scaled.webp);background-size:contain}.elementor-17017 .elementor-element.elementor-element-6777c62 .elementor-repeater-item-244d248 .swiper-slide-bg{background-image:url(https://impulsenetworks.in/wp-content/uploads/2024/09/7-Best-Practices-for-Robust-Perimeter-Security-6-scaled.webp);background-size:contain}.elementor-17017 .elementor-element.elementor-element-6777c62 .elementor-repeater-item-ea7645f .swiper-slide-bg{background-image:url(https://impulsenetworks.in/wp-content/uploads/2024/09/7-Best-Practices-for-Robust-Perimeter-Security-7-scaled.webp);background-size:contain}.elementor-17017 .elementor-element.elementor-element-6777c62 .elementor-repeater-item-d627062 .swiper-slide-bg{background-image:url(https://impulsenetworks.in/wp-content/uploads/2024/09/7-Best-Practices-for-Robust-Perimeter-Security-8-scaled.webp);background-size:contain}.elementor-17017 .elementor-element.elementor-element-6777c62 .swiper-slide{transition-duration:calc(5000ms*1.2);height:100vh}.elementor-17017 .elementor-element.elementor-element-6777c62 .swiper-slide-contents{max-width:100%}.elementor-17017 .elementor-element.elementor-element-6777c62 .swiper-slide-inner{text-align:center}.elementor-17017 .elementor-element.elementor-element-6777c62 .elementor-swiper-button{color:#000a64}.elementor-17017 .elementor-element.elementor-element-6777c62 .elementor-swiper-button svg{fill:#000A64}@media(max-width:767px){.elementor-17017 .elementor-element.elementor-element-af412e3>.elementor-element-populated{padding:0}.elementor-17017 .elementor-element.elementor-element-6777c62>.elementor-widget-container{padding:0}.elementor-17017 .elementor-element.elementor-element-6777c62 .swiper-slide{height:64vh}}