Update src/app/solutions/page.tsx

This commit is contained in:
2026-03-05 01:09:50 +00:00
parent 8521f611a4
commit f20fd024b6

View File

@@ -44,13 +44,13 @@ export default function SolutionsPage() {
features={[
{
id: 1,
title: "Cloud Infrastructure", description: "AWS-native architecture with auto-scaling Kubernetes clusters, containerized workloads, and enterprise-grade networking for 99.99% uptime SLAs.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AVKNo1f7tHooZ2gXlX4V4cPscb/aws-cloud-infrastructure-visualization-w-1772672802173-429b864a.png", imageAlt: "Cloud Infrastructure"},
title: "Cloud Infrastructure", description: "AWS-native architecture with auto-scaling Kubernetes clusters, containerized workloads, and enterprise-grade networking for 99.99% uptime SLAs.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AVKNo1f7tHooZ2gXlX4V4cPscb/aws-cloud-infrastructure-visualization-w-1772672802173-429b864a.png?_wi=3", imageAlt: "Cloud Infrastructure"},
{
id: 2,
title: "Zero-Trust Security", description: "Multi-layered encryption, DDoS protection, real-time threat detection, and compliance frameworks (ISO 27001, SOC 2 Type II) ensuring data sovereignty.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AVKNo1f7tHooZ2gXlX4V4cPscb/enterprise-security-interface-showing-en-1772672801093-dda964a7.png", imageAlt: "Security Protocol"},
title: "Zero-Trust Security", description: "Multi-layered encryption, DDoS protection, real-time threat detection, and compliance frameworks (ISO 27001, SOC 2 Type II) ensuring data sovereignty.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AVKNo1f7tHooZ2gXlX4V4cPscb/enterprise-security-interface-showing-en-1772672801093-dda964a7.png?_wi=3", imageAlt: "Security Protocol"},
{
id: 3,
title: "Regional Network Hub", description: "Fiber-optic backbone connecting Kigali to major African tech hubs. Sub-50ms latency to East African region with redundant routing and failover protocols.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AVKNo1f7tHooZ2gXlX4V4cPscb/global-network-topology-with-kigali-as-p-1772672802328-306f8043.png", imageAlt: "Network Topology"},
title: "Regional Network Hub", description: "Fiber-optic backbone connecting Kigali to major African tech hubs. Sub-50ms latency to East African region with redundant routing and failover protocols.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AVKNo1f7tHooZ2gXlX4V4cPscb/global-network-topology-with-kigali-as-p-1772672802328-306f8043.png?_wi=2", imageAlt: "Network Topology"},
]}
title="Enterprise Solutions"
description="Mission-critical infrastructure designed for institutional requirements"
@@ -65,11 +65,11 @@ export default function SolutionsPage() {
<TestimonialCardTen
testimonials={[
{
id: "1", title: "Infrastructure Excellence", quote: "NELTECH's data center transformed our enterprise operations. The 99.99% uptime guarantee has been consistently delivered. Their technical expertise and commitment to institutional standards are unmatched in the region.", name: "Nyamwaya David", role: "CTO, Financial Services Group", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AVKNo1f7tHooZ2gXlX4V4cPscb/professional-headshot-of-enterprise-clie-1772672803007-e6e29902.png", imageAlt: "CTO Portrait"},
id: "1", title: "Infrastructure Excellence", quote: "NELTECH's data center transformed our enterprise operations. The 99.99% uptime guarantee has been consistently delivered. Their technical expertise and commitment to institutional standards are unmatched in the region.", name: "Nyamwaya David", role: "CTO, Financial Services Group", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AVKNo1f7tHooZ2gXlX4V4cPscb/professional-headshot-of-enterprise-clie-1772672803007-e6e29902.png?_wi=2", imageAlt: "CTO Portrait"},
{
id: "2", title: "Enterprise-Grade Security", quote: "The zero-trust security architecture NELTECH implemented gave us the compliance certifications required for international operations. Their approach to data sovereignty is precisely what we needed.", name: "Umutesi Grace", role: "CISO, Regional Telecom", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AVKNo1f7tHooZ2gXlX4V4cPscb/cto-of-technology-firm-professional-stud-1772672801911-f6da8d63.png", imageAlt: "CISO Portrait"},
id: "2", title: "Enterprise-Grade Security", quote: "The zero-trust security architecture NELTECH implemented gave us the compliance certifications required for international operations. Their approach to data sovereignty is precisely what we needed.", name: "Umutesi Grace", role: "CISO, Regional Telecom", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AVKNo1f7tHooZ2gXlX4V4cPscb/cto-of-technology-firm-professional-stud-1772672801911-f6da8d63.png?_wi=2", imageAlt: "CISO Portrait"},
{
id: "3", title: "Regional Network Hub", quote: "Latency to our East African operations dropped from 200ms to 48ms. NELTECH's fiber backbone has become mission-critical infrastructure for our entire region.", name: "Kamiyimba Robert", role: "VP Operations, Logistics", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AVKNo1f7tHooZ2gXlX4V4cPscb/operations-manager-of-logistics-company--1772672802348-c0bd0842.png", imageAlt: "Operations VP Portrait"},
id: "3", title: "Regional Network Hub", quote: "Latency to our East African operations dropped from 200ms to 48ms. NELTECH's fiber backbone has become mission-critical infrastructure for our entire region.", name: "Kamiyimba Robert", role: "VP Operations, Logistics", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AVKNo1f7tHooZ2gXlX4V4cPscb/operations-manager-of-logistics-company--1772672802348-c0bd0842.png?_wi=2", imageAlt: "Operations VP Portrait"},
]}
title="Enterprise Recognition"
description="Trusted by institutional leaders across Africa"