Merge version_2 into main #2
@@ -5,41 +5,25 @@ import { ServiceWrapper } from "@/components/ServiceWrapper";
|
||||
import Tag from "@/tag/Tag";
|
||||
|
||||
const montserrat = Montserrat({
|
||||
variable: "--font-montserrat",
|
||||
subsets: ["latin"],
|
||||
variable: "--font-montserrat", subsets: ["latin"],
|
||||
});
|
||||
|
||||
const inter = Inter({
|
||||
variable: "--font-inter",
|
||||
subsets: ["latin"],
|
||||
variable: "--font-inter", subsets: ["latin"],
|
||||
});
|
||||
|
||||
export const metadata: Metadata = {
|
||||
title: "CyberShield - Enterprise Cybersecurity Solutions",
|
||||
description: "Advanced threat detection, incident response, and compliance management for enterprise organizations. 24/7 security operations and expert consulting.",
|
||||
keywords: "cybersecurity, threat detection, incident response, penetration testing, compliance, security consulting, managed security services",
|
||||
metadataBase: new URL("https://cybershield.io"),
|
||||
title: "CyberShield - Enterprise Cybersecurity Solutions", description: "Advanced threat detection, incident response, and compliance management for enterprise organizations. 24/7 security operations and expert consulting.", keywords: "cybersecurity, threat detection, incident response, penetration testing, compliance, security consulting, managed security services", metadataBase: new URL("https://cybershield.io"),
|
||||
alternates: {
|
||||
canonical: "https://cybershield.io",
|
||||
},
|
||||
canonical: "https://cybershield.io"},
|
||||
openGraph: {
|
||||
title: "CyberShield - Enterprise Cybersecurity Solutions",
|
||||
description: "Protect your organization with advanced threat detection and 24/7 incident response.",
|
||||
url: "https://cybershield.io",
|
||||
siteName: "CyberShield",
|
||||
type: "website",
|
||||
images: [
|
||||
title: "CyberShield - Enterprise Cybersecurity Solutions", description: "Protect your organization with advanced threat detection and 24/7 incident response.", url: "https://cybershield.io", siteName: "CyberShield", type: "website", images: [
|
||||
{
|
||||
url: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/a-sophisticated-cybersecurity-monitoring-1772730292868-7c2380d6.png",
|
||||
alt: "CyberShield Security Dashboard",
|
||||
},
|
||||
url: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/a-sophisticated-cybersecurity-monitoring-1772730292868-7c2380d6.png", alt: "CyberShield Security Dashboard"},
|
||||
],
|
||||
},
|
||||
twitter: {
|
||||
card: "summary_large_image",
|
||||
title: "CyberShield - Enterprise Cybersecurity Solutions",
|
||||
description: "Advanced threat detection and 24/7 incident response for enterprises.",
|
||||
images: ["https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/a-sophisticated-cybersecurity-monitoring-1772730292868-7c2380d6.png"],
|
||||
card: "summary_large_image", title: "CyberShield - Enterprise Cybersecurity Solutions", description: "Advanced threat detection and 24/7 incident response for enterprises.", images: ["https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/a-sophisticated-cybersecurity-monitoring-1772730292868-7c2380d6.png"],
|
||||
},
|
||||
robots: {
|
||||
index: true,
|
||||
|
||||
331
src/app/page.tsx
331
src/app/page.tsx
@@ -82,10 +82,8 @@ export default function HomePage() {
|
||||
buttonAnimation="slide-up"
|
||||
background={{ variant: "radial-gradient" }}
|
||||
dashboard={{
|
||||
title: "Security Operations Hub",
|
||||
logoIcon: Lock,
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/a-sophisticated-cybersecurity-monitoring-1772730292868-7c2380d6.png",
|
||||
buttons: [
|
||||
title: "Security Operations Hub", logoIcon: Lock,
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/a-sophisticated-cybersecurity-monitoring-1772730292868-7c2380d6.png", buttons: [
|
||||
{ text: "Live Monitoring", href: "#" },
|
||||
{ text: "Threat Intelligence", href: "#" },
|
||||
],
|
||||
@@ -96,57 +94,41 @@ export default function HomePage() {
|
||||
],
|
||||
stats: [
|
||||
{
|
||||
title: "Threats Blocked",
|
||||
values: [15420, 28650, 42890],
|
||||
description: "Real-time threat prevention",
|
||||
},
|
||||
title: "Threats Blocked", values: [15420, 28650, 42890],
|
||||
description: "Real-time threat prevention"},
|
||||
{
|
||||
title: "Detection Time",
|
||||
values: [4.2, 3.8, 2.1],
|
||||
valueSuffix: "min",
|
||||
description: "Average response time",
|
||||
},
|
||||
title: "Detection Time", values: [4.2, 3.8, 2.1],
|
||||
valueSuffix: "min", description: "Average response time"},
|
||||
{
|
||||
title: "Systems Protected",
|
||||
values: [850, 1240, 1890],
|
||||
description: "Active endpoints defended",
|
||||
},
|
||||
title: "Systems Protected", values: [850, 1240, 1890],
|
||||
description: "Active endpoints defended"},
|
||||
],
|
||||
chartTitle: "Threat Activity Trend",
|
||||
chartData: [
|
||||
chartTitle: "Threat Activity Trend", chartData: [
|
||||
{ value: 65 },
|
||||
{ value: 45 },
|
||||
{ value: 80 },
|
||||
{ value: 55 },
|
||||
{ value: 90 },
|
||||
],
|
||||
listTitle: "Security Alerts",
|
||||
listItems: [
|
||||
listTitle: "Security Alerts", listItems: [
|
||||
{
|
||||
icon: AlertTriangle,
|
||||
title: "Unauthorized Access Attempt",
|
||||
status: "Blocked",
|
||||
},
|
||||
title: "Unauthorized Access Attempt", status: "Blocked"},
|
||||
{
|
||||
icon: Lock,
|
||||
title: "Malware Detection: trojad.exe",
|
||||
status: "Quarantined",
|
||||
},
|
||||
title: "Malware Detection: trojad.exe", status: "Quarantined"},
|
||||
{
|
||||
icon: Shield,
|
||||
title: "Suspicious Network Activity",
|
||||
status: "Investigated",
|
||||
},
|
||||
title: "Suspicious Network Activity", status: "Investigated"},
|
||||
],
|
||||
searchPlaceholder: "Search threats and incidents...",
|
||||
}}
|
||||
searchPlaceholder: "Search threats and incidents..."}}
|
||||
/>
|
||||
</div>
|
||||
|
||||
<div id="features" data-section="features">
|
||||
<FeatureBento
|
||||
title="Core Security Capabilities"
|
||||
description="Comprehensive security solutions designed to protect your organization from evolving cyber threats. Our integrated platform delivers real-time protection, threat intelligence, and compliance management."
|
||||
description="Our platform delivers AI-Powered Threat Detection, 24/7 Response Team, and Compliance Automation—the three critical capabilities that enterprises depend on. Comprehensive security solutions designed to protect your organization from evolving cyber threats through real-time protection, threat intelligence, and compliance management."
|
||||
tag="Security Features"
|
||||
tagIcon={Zap}
|
||||
tagAnimation="slide-up"
|
||||
@@ -155,66 +137,40 @@ export default function HomePage() {
|
||||
useInvertedBackground={true}
|
||||
features={[
|
||||
{
|
||||
title: "Threat Detection & Prevention",
|
||||
description:
|
||||
"AI-powered detection engine identifies and blocks threats in real-time across your entire infrastructure.",
|
||||
bentoComponent: "animated-bar-chart",
|
||||
},
|
||||
title: "Threat Detection & Prevention", description:
|
||||
"AI-powered detection engine identifies and blocks threats in real-time across your entire infrastructure.", bentoComponent: "animated-bar-chart"},
|
||||
{
|
||||
title: "Response Tasks",
|
||||
description:
|
||||
"24/7 response team and automated playbooks for rapid containment and recovery from security incidents.",
|
||||
bentoComponent: "3d-task-list",
|
||||
items: [
|
||||
title: "Response Tasks", description:
|
||||
"24/7 response team and automated playbooks for rapid containment and recovery from security incidents.", bentoComponent: "3d-task-list", items: [
|
||||
{ icon: AlertTriangle, label: "Threat Analysis", time: "5 min" },
|
||||
{ icon: Lock, label: "Containment", time: "15 min" },
|
||||
{ icon: CheckCircle, label: "Recovery", time: "30 min" },
|
||||
],
|
||||
},
|
||||
{
|
||||
title: "Vulnerability Management",
|
||||
description:
|
||||
"Continuous scanning and assessment to identify and remediate vulnerabilities before they can be exploited.",
|
||||
bentoComponent: "icon-info-cards",
|
||||
items: [
|
||||
title: "Vulnerability Management", description:
|
||||
"Continuous scanning and assessment to identify and remediate vulnerabilities before they can be exploited.", bentoComponent: "icon-info-cards", items: [
|
||||
{
|
||||
icon: Target,
|
||||
label: "Vulnerabilities Scanned",
|
||||
value: "12,450",
|
||||
},
|
||||
label: "Vulnerabilities Scanned", value: "12,450"},
|
||||
{ icon: TrendingDown, label: "Risk Reduced", value: "87%" },
|
||||
{ icon: Clock, label: "Avg Fix Time", value: "4.2 days" },
|
||||
],
|
||||
},
|
||||
{
|
||||
title: "Compliance & Governance",
|
||||
description:
|
||||
"Automated compliance monitoring for GDPR, HIPAA, PCI-DSS, ISO 27001, and SOC 2 standards.",
|
||||
bentoComponent: "timeline",
|
||||
heading: "Compliance Roadmap",
|
||||
subheading: "Your path to certification",
|
||||
items: [
|
||||
title: "Compliance & Governance", description:
|
||||
"Automated compliance monitoring for GDPR, HIPAA, PCI-DSS, ISO 27001, and SOC 2 standards.", bentoComponent: "timeline", heading: "Compliance Roadmap", subheading: "Your path to certification", items: [
|
||||
{
|
||||
label: "Assessment",
|
||||
detail: "Initial security posture evaluation",
|
||||
},
|
||||
label: "Assessment", detail: "Initial security posture evaluation"},
|
||||
{
|
||||
label: "Implementation",
|
||||
detail: "Controls and policy deployment",
|
||||
},
|
||||
label: "Implementation", detail: "Controls and policy deployment"},
|
||||
{
|
||||
label: "Certification",
|
||||
detail: "Audit and compliance validation",
|
||||
},
|
||||
label: "Certification", detail: "Audit and compliance validation"},
|
||||
],
|
||||
completedLabel: "Completed",
|
||||
},
|
||||
completedLabel: "Completed"},
|
||||
{
|
||||
title: "Network Security",
|
||||
description:
|
||||
"Advanced firewall, intrusion prevention, and network segmentation for complete infrastructure protection.",
|
||||
bentoComponent: "orbiting-icons",
|
||||
centerIcon: Network,
|
||||
title: "Network Security", description:
|
||||
"Advanced firewall, intrusion prevention, and network segmentation for complete infrastructure protection.", bentoComponent: "orbiting-icons", centerIcon: Network,
|
||||
items: [
|
||||
{ icon: Zap, ring: 1 },
|
||||
{ icon: Shield, ring: 1 },
|
||||
@@ -224,11 +180,8 @@ export default function HomePage() {
|
||||
],
|
||||
},
|
||||
{
|
||||
title: "Data Protection & Privacy",
|
||||
description:
|
||||
"Encryption, data loss prevention, and privacy controls to safeguard sensitive information assets.",
|
||||
bentoComponent: "globe",
|
||||
},
|
||||
title: "Data Protection & Privacy", description:
|
||||
"Encryption, data loss prevention, and privacy controls to safeguard sensitive information assets.", bentoComponent: "globe"},
|
||||
]}
|
||||
/>
|
||||
</div>
|
||||
@@ -246,40 +199,28 @@ export default function HomePage() {
|
||||
features={[
|
||||
{
|
||||
icon: Zap,
|
||||
title: "Penetration Testing",
|
||||
description:
|
||||
"Authorized security testing to identify exploitable vulnerabilities before attackers do.",
|
||||
},
|
||||
title: "Penetration Testing", description:
|
||||
"Authorized security testing to identify exploitable vulnerabilities before attackers do."},
|
||||
{
|
||||
icon: Eye,
|
||||
title: "Threat Intelligence",
|
||||
description:
|
||||
"Real-time threat feeds and tactical intelligence tailored to your industry and threat landscape.",
|
||||
},
|
||||
title: "Threat Intelligence", description:
|
||||
"Real-time threat feeds and tactical intelligence tailored to your industry and threat landscape."},
|
||||
{
|
||||
icon: Shield,
|
||||
title: "Security Consulting",
|
||||
description:
|
||||
"Expert advisory on security architecture, policy frameworks, and strategic security roadmaps.",
|
||||
},
|
||||
title: "Security Consulting", description:
|
||||
"Expert advisory on security architecture, policy frameworks, and strategic security roadmaps."},
|
||||
{
|
||||
icon: Lock,
|
||||
title: "Application Security",
|
||||
description:
|
||||
"Code analysis, secure SDLC integration, and API security for modern application environments.",
|
||||
},
|
||||
title: "Application Security", description:
|
||||
"Code analysis, secure SDLC integration, and API security for modern application environments."},
|
||||
{
|
||||
icon: Users,
|
||||
title: "Security Awareness Training",
|
||||
description:
|
||||
"Phishing simulations and employee training programs to build a security-conscious culture.",
|
||||
},
|
||||
title: "Security Awareness Training", description:
|
||||
"Phishing simulations and employee training programs to build a security-conscious culture."},
|
||||
{
|
||||
icon: BarChart3,
|
||||
title: "Security Metrics & Reporting",
|
||||
description:
|
||||
"Comprehensive dashboards and KPIs that translate security into business value and risk reduction.",
|
||||
},
|
||||
title: "Security Metrics & Reporting", description:
|
||||
"Comprehensive dashboards and KPIs that translate security into business value and risk reduction."},
|
||||
]}
|
||||
/>
|
||||
</div>
|
||||
@@ -307,65 +248,29 @@ export default function HomePage() {
|
||||
<TestimonialCardSix
|
||||
testimonials={[
|
||||
{
|
||||
id: "1",
|
||||
name: "David Mitchell",
|
||||
handle: "CEO, Financial Services Co.",
|
||||
testimonial:
|
||||
"CyberShield's rapid incident response capabilities saved us during a critical breach attempt. Their team was professional, efficient, and kept our business running while they contained the threat.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/professional-headshot-of-a-confident-bus-1772730283330-01f06d48.png",
|
||||
imageAlt: "David Mitchell",
|
||||
},
|
||||
id: "1", name: "David Mitchell", handle: "CEO, Financial Services Co.", testimonial:
|
||||
"CyberShield's rapid incident response capabilities saved us during a critical breach attempt. Their team was professional, efficient, and kept our business running while they contained the threat.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/professional-headshot-of-a-confident-bus-1772730283330-01f06d48.png", imageAlt: "David Mitchell"},
|
||||
{
|
||||
id: "2",
|
||||
name: "Sarah Chen",
|
||||
handle: "CISO, Healthcare Network",
|
||||
testimonial:
|
||||
"The compliance automation alone has saved us hundreds of hours on HIPAA audits. But what really impressed us was their proactive threat hunting that found vulnerabilities we didn't even know existed.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/professional-headshot-of-a-security-expe-1772730283361-fd39a4e3.png",
|
||||
imageAlt: "Sarah Chen",
|
||||
},
|
||||
id: "2", name: "Sarah Chen", handle: "CISO, Healthcare Network", testimonial:
|
||||
"The compliance automation alone has saved us hundreds of hours on HIPAA audits. But what really impressed us was their proactive threat hunting that found vulnerabilities we didn't even know existed.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/professional-headshot-of-a-security-expe-1772730283361-fd39a4e3.png", imageAlt: "Sarah Chen"},
|
||||
{
|
||||
id: "3",
|
||||
name: "Michael Torres",
|
||||
handle: "IT Director, Tech Startup",
|
||||
testimonial:
|
||||
"Security shouldn't slow down innovation. CyberShield helped us implement security controls that protect our assets without impeding our development velocity. Highly recommended.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/professional-headshot-of-an-it-director--1772730283107-2c0f1e30.png",
|
||||
imageAlt: "Michael Torres",
|
||||
},
|
||||
id: "3", name: "Michael Torres", handle: "IT Director, Tech Startup", testimonial:
|
||||
"Security shouldn't slow down innovation. CyberShield helped us implement security controls that protect our assets without impeding our development velocity. Highly recommended.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/professional-headshot-of-an-it-director--1772730283107-2c0f1e30.png", imageAlt: "Michael Torres"},
|
||||
{
|
||||
id: "4",
|
||||
name: "Jennifer Lee",
|
||||
handle: "Compliance Officer, Retail Chain",
|
||||
testimonial:
|
||||
"Their team made our PCI-DSS certification process straightforward and stress-free. The ongoing compliance monitoring gives us confidence that we're always audit-ready.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/professional-headshot-of-a-compliance-of-1772730282551-48a90949.png",
|
||||
imageAlt: "Jennifer Lee",
|
||||
},
|
||||
id: "4", name: "Jennifer Lee", handle: "Compliance Officer, Retail Chain", testimonial:
|
||||
"Their team made our PCI-DSS certification process straightforward and stress-free. The ongoing compliance monitoring gives us confidence that we're always audit-ready.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/professional-headshot-of-a-compliance-of-1772730282551-48a90949.png", imageAlt: "Jennifer Lee"},
|
||||
{
|
||||
id: "5",
|
||||
name: "Robert Patterson",
|
||||
handle: "Tech Lead, Insurance Provider",
|
||||
testimonial:
|
||||
"The penetration testing reports were incredibly detailed and actionable. Our development team used their findings to significantly harden our applications.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/professional-headshot-of-a-technical-lea-1772730282492-a0f8e222.png",
|
||||
imageAlt: "Robert Patterson",
|
||||
},
|
||||
id: "5", name: "Robert Patterson", handle: "Tech Lead, Insurance Provider", testimonial:
|
||||
"The penetration testing reports were incredibly detailed and actionable. Our development team used their findings to significantly harden our applications.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/professional-headshot-of-a-technical-lea-1772730282492-a0f8e222.png", imageAlt: "Robert Patterson"},
|
||||
{
|
||||
id: "6",
|
||||
name: "Amanda Foster",
|
||||
handle: "Security Manager, Manufacturing",
|
||||
testimonial:
|
||||
"We needed a partner who understood both IT and OT security. CyberShield's expertise across both domains was exactly what we needed for our digital transformation.",
|
||||
imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/professional-headshot-of-a-security-mana-1772730282982-b678d7cc.png",
|
||||
imageAlt: "Amanda Foster",
|
||||
},
|
||||
id: "6", name: "Amanda Foster", handle: "Security Manager, Manufacturing", testimonial:
|
||||
"We needed a partner who understood both IT and OT security. CyberShield's expertise across both domains was exactly what we needed for our digital transformation.", imageSrc:
|
||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AXDO1gMaHECH1IwJUyHZUCyAb0/professional-headshot-of-a-security-mana-1772730282982-b678d7cc.png", imageAlt: "Amanda Foster"},
|
||||
]}
|
||||
animationType="slide-up"
|
||||
title="Trusted by Enterprise Leaders"
|
||||
@@ -389,59 +294,30 @@ export default function HomePage() {
|
||||
useInvertedBackground={true}
|
||||
plans={[
|
||||
{
|
||||
id: "essentials",
|
||||
price: "Custom",
|
||||
name: "Essentials",
|
||||
badge: "Starting Plan",
|
||||
badgeIcon: Shield,
|
||||
id: "essentials", price: "Custom", name: "Essentials", badge: "Starting Plan", badgeIcon: Shield,
|
||||
buttons: [
|
||||
{ text: "Schedule Consultation", href: "/contact" },
|
||||
{ text: "Learn More", href: "#faq" },
|
||||
],
|
||||
features: [
|
||||
"Vulnerability assessments",
|
||||
"Basic threat monitoring",
|
||||
"Monthly security reports",
|
||||
"Email support",
|
||||
"Compliance framework guidance",
|
||||
],
|
||||
"Vulnerability assessments", "Basic threat monitoring", "Monthly security reports", "Email support", "Compliance framework guidance"],
|
||||
},
|
||||
{
|
||||
id: "professional",
|
||||
price: "Custom",
|
||||
name: "Professional",
|
||||
badge: "Most Popular",
|
||||
badgeIcon: Sparkles,
|
||||
id: "professional", price: "Custom", name: "Professional", badge: "Most Popular", badgeIcon: Sparkles,
|
||||
buttons: [
|
||||
{ text: "Get Started", href: "/contact" },
|
||||
{ text: "Talk to Expert", href: "/contact" },
|
||||
],
|
||||
features: [
|
||||
"Everything in Essentials",
|
||||
"24/7 threat monitoring",
|
||||
"Quarterly penetration testing",
|
||||
"Incident response included",
|
||||
"Priority phone support",
|
||||
"Security training program",
|
||||
],
|
||||
"Everything in Essentials", "24/7 threat monitoring", "Quarterly penetration testing", "Incident response included", "Priority phone support", "Security training program"],
|
||||
},
|
||||
{
|
||||
id: "enterprise",
|
||||
price: "Custom",
|
||||
name: "Enterprise",
|
||||
buttons: [
|
||||
id: "enterprise", price: "Custom", name: "Enterprise", buttons: [
|
||||
{ text: "Contact Sales", href: "/contact" },
|
||||
{ text: "View Demo", href: "#" },
|
||||
],
|
||||
features: [
|
||||
"Everything in Professional",
|
||||
"Dedicated security team",
|
||||
"Custom compliance programs",
|
||||
"Advanced threat intelligence",
|
||||
"24/7 incident response SOC",
|
||||
"Strategic security consulting",
|
||||
"SLA guarantees",
|
||||
],
|
||||
"Everything in Professional", "Dedicated security team", "Custom compliance programs", "Advanced threat intelligence", "24/7 incident response SOC", "Strategic security consulting", "SLA guarantees"],
|
||||
},
|
||||
]}
|
||||
/>
|
||||
@@ -460,53 +336,29 @@ export default function HomePage() {
|
||||
animationType="smooth"
|
||||
faqs={[
|
||||
{
|
||||
id: "1",
|
||||
title: "What is penetration testing and how does it help?",
|
||||
content:
|
||||
"Penetration testing is an authorized security assessment where our experts attempt to exploit vulnerabilities in your systems to identify weaknesses before malicious actors can. This helps you prioritize remediation efforts and strengthen your security posture.",
|
||||
},
|
||||
id: "1", title: "What is penetration testing and how does it help?", content:
|
||||
"Penetration testing is an authorized security assessment where our experts attempt to exploit vulnerabilities in your systems to identify weaknesses before malicious actors can. This helps you prioritize remediation efforts and strengthen your security posture."},
|
||||
{
|
||||
id: "2",
|
||||
title: "How quickly can you respond to security incidents?",
|
||||
content:
|
||||
"Our incident response team is available 24/7/365. For enterprise clients, we have on-call specialists who can be engaged within 15 minutes. Initial assessment and containment typically begins within 30 minutes of notification.",
|
||||
},
|
||||
id: "2", title: "How quickly can you respond to security incidents?", content:
|
||||
"Our incident response team is available 24/7/365. For enterprise clients, we have on-call specialists who can be engaged within 15 minutes. Initial assessment and containment typically begins within 30 minutes of notification."},
|
||||
{
|
||||
id: "3",
|
||||
title: "What compliance standards do you help with?",
|
||||
content:
|
||||
"We assist with GDPR, HIPAA, PCI-DSS, ISO 27001, SOC 2, NIST Cybersecurity Framework, and CIS Controls. Our team can also support industry-specific requirements for healthcare, finance, government, and other regulated sectors.",
|
||||
},
|
||||
id: "3", title: "What compliance standards do you help with?", content:
|
||||
"We assist with GDPR, HIPAA, PCI-DSS, ISO 27001, SOC 2, NIST Cybersecurity Framework, and CIS Controls. Our team can also support industry-specific requirements for healthcare, finance, government, and other regulated sectors."},
|
||||
{
|
||||
id: "4",
|
||||
title: "Do you offer managed security services?",
|
||||
content:
|
||||
"Yes, we provide managed security services (MSS) including 24/7 monitoring, threat detection, incident response, vulnerability management, and security operations center (SOC) services tailored to your organization's needs.",
|
||||
},
|
||||
id: "4", title: "Do you offer managed security services?", content:
|
||||
"Yes, we provide managed security services (MSS) including 24/7 monitoring, threat detection, incident response, vulnerability management, and security operations center (SOC) services tailored to your organization's needs."},
|
||||
{
|
||||
id: "5",
|
||||
title: "How do you stay current with emerging threats?",
|
||||
content:
|
||||
"Our team maintains memberships in industry organizations, participates in threat intelligence sharing communities, and continuously monitors the threat landscape. We provide our clients with threat intelligence briefings and proactive recommendations.",
|
||||
},
|
||||
id: "5", title: "How do you stay current with emerging threats?", content:
|
||||
"Our team maintains memberships in industry organizations, participates in threat intelligence sharing communities, and continuously monitors the threat landscape. We provide our clients with threat intelligence briefings and proactive recommendations."},
|
||||
{
|
||||
id: "6",
|
||||
title: "Can you help with security training for our staff?",
|
||||
content:
|
||||
"Absolutely. We provide customized security awareness training, phishing simulations, incident response drills, and specialized technical training for development and operations teams. Human security is as important as technical controls.",
|
||||
},
|
||||
id: "6", title: "Can you help with security training for our staff?", content:
|
||||
"Absolutely. We provide customized security awareness training, phishing simulations, incident response drills, and specialized technical training for development and operations teams. Human security is as important as technical controls."},
|
||||
{
|
||||
id: "7",
|
||||
title: "What's your approach to vulnerability remediation?",
|
||||
content:
|
||||
"We prioritize vulnerabilities based on risk, exploitability, and business impact. We work with your teams to develop remediation roadmaps that balance security improvements with operational continuity and minimize disruption.",
|
||||
},
|
||||
id: "7", title: "What's your approach to vulnerability remediation?", content:
|
||||
"We prioritize vulnerabilities based on risk, exploitability, and business impact. We work with your teams to develop remediation roadmaps that balance security improvements with operational continuity and minimize disruption."},
|
||||
{
|
||||
id: "8",
|
||||
title: "Do you provide consulting for security architecture?",
|
||||
content:
|
||||
"Yes, we offer strategic security consulting services to help design secure architectures, develop security strategies, establish governance frameworks, and guide digital transformation initiatives with security as a foundation.",
|
||||
},
|
||||
id: "8", title: "Do you provide consulting for security architecture?", content:
|
||||
"Yes, we offer strategic security consulting services to help design secure architectures, develop security strategies, establish governance frameworks, and guide digital transformation initiatives with security as a foundation."},
|
||||
]}
|
||||
/>
|
||||
</div>
|
||||
@@ -533,8 +385,7 @@ export default function HomePage() {
|
||||
logoText="CyberShield"
|
||||
columns={[
|
||||
{
|
||||
title: "Product",
|
||||
items: [
|
||||
title: "Product", items: [
|
||||
{ label: "Threat Detection", href: "#features" },
|
||||
{ label: "Incident Response", href: "#features" },
|
||||
{ label: "Compliance Management", href: "#features" },
|
||||
@@ -542,8 +393,7 @@ export default function HomePage() {
|
||||
],
|
||||
},
|
||||
{
|
||||
title: "Company",
|
||||
items: [
|
||||
title: "Company", items: [
|
||||
{ label: "About Us", href: "/about" },
|
||||
{ label: "Our Team", href: "/about" },
|
||||
{ label: "Blog", href: "#" },
|
||||
@@ -551,8 +401,7 @@ export default function HomePage() {
|
||||
],
|
||||
},
|
||||
{
|
||||
title: "Services",
|
||||
items: [
|
||||
title: "Services", items: [
|
||||
{ label: "Penetration Testing", href: "/services" },
|
||||
{ label: "Threat Intelligence", href: "/services" },
|
||||
{ label: "Security Consulting", href: "/services" },
|
||||
@@ -560,8 +409,7 @@ export default function HomePage() {
|
||||
],
|
||||
},
|
||||
{
|
||||
title: "Resources",
|
||||
items: [
|
||||
title: "Resources", items: [
|
||||
{ label: "Security Guidelines", href: "#" },
|
||||
{ label: "Case Studies", href: "#" },
|
||||
{ label: "Compliance Guides", href: "#" },
|
||||
@@ -569,8 +417,7 @@ export default function HomePage() {
|
||||
],
|
||||
},
|
||||
{
|
||||
title: "Legal",
|
||||
items: [
|
||||
title: "Legal", items: [
|
||||
{ label: "Privacy Policy", href: "#" },
|
||||
{ label: "Terms of Service", href: "#" },
|
||||
{ label: "Security Disclosure", href: "#" },
|
||||
|
||||
Reference in New Issue
Block a user