Compare commits
5 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 942583777c | |||
| 08f784ba17 | |||
| 4cada0ea44 | |||
| 6864c934c1 | |||
| bfc23c89ee |
@@ -1,8 +1,6 @@
|
|||||||
import type { Metadata } from "next";
|
import type { Metadata } from "next";
|
||||||
import { Manrope } from "next/font/google";
|
import { Manrope } from "next/font/google";
|
||||||
import { DM_Sans } from "next/font/google";
|
import { DM_Sans } from "next/font/google";
|
||||||
import { Halant } from "next/font/google";
|
|
||||||
import { Inter } from "next/font/google";
|
|
||||||
import "./globals.css";
|
import "./globals.css";
|
||||||
import { ServiceWrapper } from "@/components/ServiceWrapper";
|
import { ServiceWrapper } from "@/components/ServiceWrapper";
|
||||||
import Tag from "@/tag/Tag";
|
import Tag from "@/tag/Tag";
|
||||||
@@ -15,25 +13,16 @@ const dmSans = DM_Sans({
|
|||||||
variable: "--font-dm-sans", subsets: ["latin"],
|
variable: "--font-dm-sans", subsets: ["latin"],
|
||||||
});
|
});
|
||||||
|
|
||||||
const halant = Halant({
|
|
||||||
variable: "--font-halant", subsets: ["latin"],
|
|
||||||
weight: ["300", "400", "500", "600", "700"],
|
|
||||||
});
|
|
||||||
|
|
||||||
const inter = Inter({
|
|
||||||
variable: "--font-inter", subsets: ["latin"],
|
|
||||||
});
|
|
||||||
|
|
||||||
export const metadata: Metadata = {
|
export const metadata: Metadata = {
|
||||||
title: "Runtime File Antivirus Scanner | Real-Time Threat Detection", description: "ThreatShield: Advanced runtime antivirus scanning that detects threats as files execute. Enterprise-grade protection with 99.7% accuracy and sub-50ms response.", keywords: "antivirus, runtime scanning, malware detection, cybersecurity, endpoint protection, real-time threat detection", openGraph: {
|
title: "VirusTotal Alternative | Runtime File Threat Detection", description: "Advanced runtime threat detection scanner for files and executables. Analyze malware in real-time with behavioral analysis, sandboxing, and instant threat identification.", keywords: "file scanner, malware analysis, threat detection, runtime scanning, file analyzer, executable analysis, virus detection, malware detection, endpoint security", openGraph: {
|
||||||
title: "ThreatShield - Runtime Antivirus Scanner", description: "Detect threats in real-time as code executes. Advanced heuristic analysis protects your systems before damage occurs.", type: "website", siteName: "ThreatShield", images: [
|
title: "Runtime File Threat Detection Scanner", description: "Scan files and detect threats in real-time with advanced behavioral analysis and threat intelligence.", type: "website", siteName: "FileThreatScan", images: [
|
||||||
{
|
{
|
||||||
url: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-modern-sleek-cybersecurity-dashboard-i-1772588505362-50975afa.png", alt: "A modern, sleek cybersecurity dashboard interface showing real-time threat detection and runtime fil"
|
url: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-modern-sleek-cybersecurity-dashboard-i-1772588505362-50975afa.png", alt: "Advanced file threat detection and malware analysis dashboard"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
twitter: {
|
twitter: {
|
||||||
card: "summary_large_image", title: "ThreatShield - Real-Time Runtime Antivirus", description: "Enterprise-grade runtime threat detection and analysis. Catch sophisticated malware before it can execute.", images: [
|
card: "summary_large_image", title: "Runtime File Threat Detection Scanner", description: "Analyze files for threats with advanced behavioral detection and threat intelligence.", images: [
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-modern-sleek-cybersecurity-dashboard-i-1772588505362-50975afa.png"
|
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-modern-sleek-cybersecurity-dashboard-i-1772588505362-50975afa.png"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@@ -52,7 +41,7 @@ export default function RootLayout({
|
|||||||
<html lang="en" suppressHydrationWarning>
|
<html lang="en" suppressHydrationWarning>
|
||||||
<ServiceWrapper>
|
<ServiceWrapper>
|
||||||
<body
|
<body
|
||||||
className={`${manrope.variable} ${dmSans.variable} ${halant.variable} ${inter.variable} antialiased`}
|
className={`${manrope.variable} ${dmSans.variable} antialiased`}
|
||||||
>
|
>
|
||||||
<Tag />
|
<Tag />
|
||||||
{children}
|
{children}
|
||||||
|
|||||||
142
src/app/page.tsx
142
src/app/page.tsx
@@ -11,7 +11,7 @@ import MetricCardTwo from '@/components/sections/metrics/MetricCardTwo';
|
|||||||
import FaqSplitMedia from '@/components/sections/faq/FaqSplitMedia';
|
import FaqSplitMedia from '@/components/sections/faq/FaqSplitMedia';
|
||||||
import ContactCenter from '@/components/sections/contact/ContactCenter';
|
import ContactCenter from '@/components/sections/contact/ContactCenter';
|
||||||
import FooterBaseCard from '@/components/sections/footer/FooterBaseCard';
|
import FooterBaseCard from '@/components/sections/footer/FooterBaseCard';
|
||||||
import { Award, CheckCircle, HelpCircle, Lock, Shield, Sparkles, TrendingUp, Zap } from 'lucide-react';
|
import { Award, CheckCircle, HelpCircle, Lock, Zap, Sparkles, TrendingUp, AlertTriangle } from 'lucide-react';
|
||||||
|
|
||||||
export default function LandingPage() {
|
export default function LandingPage() {
|
||||||
return (
|
return (
|
||||||
@@ -29,45 +29,45 @@ export default function LandingPage() {
|
|||||||
>
|
>
|
||||||
<div id="nav" data-section="nav">
|
<div id="nav" data-section="nav">
|
||||||
<NavbarStyleCentered
|
<NavbarStyleCentered
|
||||||
brandName="ThreatShield"
|
brandName="FileThreatScan"
|
||||||
navItems={[
|
navItems={[
|
||||||
{ name: "Features", id: "features" },
|
{ name: "Scanner", id: "scanner" },
|
||||||
{ name: "Security", id: "comparison" },
|
{ name: "Detection", id: "comparison" },
|
||||||
{ name: "Pricing", id: "metrics" },
|
{ name: "Threat Intel", id: "metrics" },
|
||||||
{ name: "FAQ", id: "faq" },
|
{ name: "Help", id: "faq" },
|
||||||
{ name: "Contact", id: "contact" }
|
{ name: "Contact", id: "contact" }
|
||||||
]}
|
]}
|
||||||
button={{ text: "Start Free Trial", href: "contact" }}
|
button={{ text: "Scan Now", href: "contact" }}
|
||||||
/>
|
/>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div id="hero" data-section="hero">
|
<div id="hero" data-section="hero">
|
||||||
<HeroBillboardTestimonial
|
<HeroBillboardTestimonial
|
||||||
title="Real-Time Antivirus Runtime Scanning"
|
title="Scan Files for Runtime Threats in Seconds"
|
||||||
description="Detect and neutralize threats instantly as files execute. Advanced heuristic analysis protects your system before damage occurs."
|
description="Upload and analyze any file for malware, trojans, and advanced threats. Get instant results from multiple antivirus engines and behavioral detection systems."
|
||||||
tag="Enterprise Security"
|
tag="Multi-Engine Analysis"
|
||||||
tagIcon={Shield}
|
tagIcon={AlertTriangle}
|
||||||
tagAnimation="slide-up"
|
tagAnimation="slide-up"
|
||||||
background={{ variant: "glowing-orb" }}
|
background={{ variant: "glowing-orb" }}
|
||||||
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-modern-sleek-cybersecurity-dashboard-i-1772588505362-50975afa.png"
|
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-modern-sleek-cybersecurity-dashboard-i-1772588505362-50975afa.png"
|
||||||
imageAlt="Runtime antivirus dashboard with threat detection"
|
imageAlt="File threat detection and analysis dashboard"
|
||||||
mediaAnimation="slide-up"
|
mediaAnimation="slide-up"
|
||||||
testimonials={[
|
testimonials={[
|
||||||
{
|
{
|
||||||
name: "James Mitchell", handle: "IT Director, SecureBank Corp", testimonial: "ThreatShield caught a zero-day exploit that our legacy system missed. Exactly what we needed.", rating: 5,
|
name: "Alex Thompson", handle: "Security Researcher, CyberLabs", testimonial: "The most comprehensive file analysis I've used. Catches malware that others miss.", rating: 5,
|
||||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-m-1772588501456-97a7303b.png"
|
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-m-1772588501456-97a7303b.png"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "Sarah Chen", handle: "Security Lead, TechVentures", testimonial: "The runtime scanning is incredibly fast. No performance degradation on our servers.", rating: 5,
|
name: "Maria Rodriguez", handle: "IT Security Manager, TechCorp", testimonial: "Reliable threat detection with zero false positives in our testing. Essential tool.", rating: 5,
|
||||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-f-1772588501586-40d6d943.png"
|
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-f-1772588501586-40d6d943.png"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "David Rodriguez", handle: "CISO, Enterprise Solutions Inc", testimonial: "We replaced three other tools with ThreatShield. Better protection, lower cost.", rating: 5,
|
name: "James Liu", handle: "Malware Analyst, SecureNet", testimonial: "Fast, accurate, and incredibly detailed threat reports. Best-in-class analysis.", rating: 5,
|
||||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-m-1772588502151-b7a38d8c.png"
|
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-m-1772588502151-b7a38d8c.png"
|
||||||
}
|
}
|
||||||
]}
|
]}
|
||||||
buttons={[
|
buttons={[
|
||||||
{ text: "Download Now", href: "contact" },
|
{ text: "Scan Your Files", href: "contact" },
|
||||||
{ text: "Learn More", href: "comparison" }
|
{ text: "Learn More", href: "comparison" }
|
||||||
]}
|
]}
|
||||||
buttonAnimation="slide-up"
|
buttonAnimation="slide-up"
|
||||||
@@ -75,17 +75,17 @@ export default function LandingPage() {
|
|||||||
/>
|
/>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div id="about" data-section="about">
|
<div id="scanner" data-section="scanner">
|
||||||
<MediaAbout
|
<MediaAbout
|
||||||
title="Advanced Runtime Protection"
|
title="Deep File Analysis Engine"
|
||||||
description="Traditional antivirus scans files on access. ThreatShield goes deeper—analyzing behavior and patterns as code executes. Catch sophisticated malware before it can establish persistence or steal data."
|
description="Unlike basic file scanners, our runtime threat detection analyzes file behavior, code patterns, and execution chains. Detect zero-day exploits, ransomware, trojans, and sophisticated malware in real-time as files execute or are scanned."
|
||||||
tag="How It Works"
|
tag="Advanced Analysis"
|
||||||
tagIcon={Zap}
|
tagIcon={Zap}
|
||||||
tagAnimation="slide-up"
|
tagAnimation="slide-up"
|
||||||
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/an-advanced-runtime-protection-system-vi-1772588502551-0c2eb711.png"
|
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/an-advanced-runtime-protection-system-vi-1772588502551-0c2eb711.png"
|
||||||
imageAlt="Runtime file scanning analysis interface"
|
imageAlt="File analysis and threat detection interface"
|
||||||
buttons={[
|
buttons={[
|
||||||
{ text: "Explore Features", href: "features" }
|
{ text: "Start Analysis", href: "contact" }
|
||||||
]}
|
]}
|
||||||
buttonAnimation="slide-up"
|
buttonAnimation="slide-up"
|
||||||
useInvertedBackground={false}
|
useInvertedBackground={false}
|
||||||
@@ -94,19 +94,19 @@ export default function LandingPage() {
|
|||||||
|
|
||||||
<div id="comparison" data-section="comparison">
|
<div id="comparison" data-section="comparison">
|
||||||
<FeatureCardSixteen
|
<FeatureCardSixteen
|
||||||
title="Why Runtime Scanning Matters"
|
title="Superior File Threat Detection"
|
||||||
description="See how ThreatShield's runtime approach outpaces traditional file-based detection"
|
description="See why our multi-engine approach outperforms traditional single-engine file scanners"
|
||||||
tag="Security Advantage"
|
tag="Threat Detection Advantage"
|
||||||
tagIcon={CheckCircle}
|
tagIcon={CheckCircle}
|
||||||
tagAnimation="slide-up"
|
tagAnimation="slide-up"
|
||||||
negativeCard={{
|
negativeCard={{
|
||||||
items: [
|
items: [
|
||||||
"File-based scanning only", "Misses behavioral threats", "Delayed detection", "High false positives", "Manual threat updates"
|
"Single antivirus engine", "No behavioral analysis", "Missed zero-day threats", "Limited sandbox testing", "Slow analysis times"
|
||||||
]
|
]
|
||||||
}}
|
}}
|
||||||
positiveCard={{
|
positiveCard={{
|
||||||
items: [
|
items: [
|
||||||
"Real-time execution monitoring", "Behavioral threat detection", "Instant threat response", "AI-powered accuracy", "Auto-updated threat signatures"
|
"70+ antivirus engines", "Advanced behavioral detection", "Zero-day threat identification", "Full sandboxing environment", "Results in under 30 seconds"
|
||||||
]
|
]
|
||||||
}}
|
}}
|
||||||
animationType="slide-up"
|
animationType="slide-up"
|
||||||
@@ -117,33 +117,33 @@ export default function LandingPage() {
|
|||||||
|
|
||||||
<div id="testimonials" data-section="testimonials">
|
<div id="testimonials" data-section="testimonials">
|
||||||
<TestimonialCardSixteen
|
<TestimonialCardSixteen
|
||||||
title="Trusted by Security Professionals"
|
title="Trusted by Security Teams Worldwide"
|
||||||
description="Leading enterprises rely on ThreatShield to protect critical infrastructure and sensitive data"
|
description="Organizations and security professionals rely on our file threat detection for critical infrastructure and sensitive data protection"
|
||||||
tag="Client Stories"
|
tag="User Success Stories"
|
||||||
tagIcon={Award}
|
tagIcon={Award}
|
||||||
tagAnimation="slide-up"
|
tagAnimation="slide-up"
|
||||||
testimonials={[
|
testimonials={[
|
||||||
{
|
{
|
||||||
id: "1", name: "Emily Watson", role: "Senior Security Analyst", company: "Financial Services Corp", rating: 5,
|
id: "1", name: "Sarah Mitchell", role: "Chief Security Officer", company: "Global Financial Corp", rating: 5,
|
||||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-f-1772588501732-58a276ac.png"
|
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-f-1772588501732-58a276ac.png"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
id: "2", name: "Marcus Johnson", role: "Infrastructure Lead", company: "Healthcare Systems Ltd", rating: 5,
|
id: "2", name: "David Chen", role: "Infrastructure Architect", company: "Healthcare Solutions Ltd", rating: 5,
|
||||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-m-1772588501708-f6201ebc.png"
|
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-m-1772588501708-f6201ebc.png"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
id: "3", name: "Lisa Park", role: "CTO", company: "E-Commerce Solutions", rating: 5,
|
id: "3", name: "Jennifer Walsh", role: "Threat Intelligence Lead", company: "Enterprise Security Systems", rating: 5,
|
||||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-f-1772588501778-2743ff8a.png"
|
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-f-1772588501778-2743ff8a.png"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
id: "4", name: "Thomas Mueller", role: "Security Director", company: "Government Agency", rating: 5,
|
id: "4", name: "Robert King", role: "Security Operations Director", company: "Government Defense Agency", rating: 5,
|
||||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-m-1772588502525-9df4f53d.png"
|
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-m-1772588502525-9df4f53d.png"
|
||||||
}
|
}
|
||||||
]}
|
]}
|
||||||
kpiItems={[
|
kpiItems={[
|
||||||
{ value: "99.7%", label: "Threat Detection Rate" },
|
{ value: "70+", label: "Antivirus Engines" },
|
||||||
{ value: "<50ms", label: "Average Response Time" },
|
{ value: "<30s", label: "Average Scan Time" },
|
||||||
{ value: "1M+", label: "Threats Blocked Daily" }
|
{ value: "1B+", label: "Files Analyzed" }
|
||||||
]}
|
]}
|
||||||
animationType="slide-up"
|
animationType="slide-up"
|
||||||
textboxLayout="default"
|
textboxLayout="default"
|
||||||
@@ -153,9 +153,9 @@ export default function LandingPage() {
|
|||||||
|
|
||||||
<div id="social-proof" data-section="social-proof">
|
<div id="social-proof" data-section="social-proof">
|
||||||
<SocialProofOne
|
<SocialProofOne
|
||||||
title="Enterprise Confidence"
|
title="Global Security Leadership"
|
||||||
description="Securing the world's most demanding infrastructure"
|
description="Protecting organizations and individuals worldwide with threat intelligence"
|
||||||
tag="Industry Leaders"
|
tag="Trusted Partners"
|
||||||
tagIcon={Sparkles}
|
tagIcon={Sparkles}
|
||||||
tagAnimation="slide-up"
|
tagAnimation="slide-up"
|
||||||
textboxLayout="default"
|
textboxLayout="default"
|
||||||
@@ -171,16 +171,16 @@ export default function LandingPage() {
|
|||||||
|
|
||||||
<div id="metrics" data-section="metrics">
|
<div id="metrics" data-section="metrics">
|
||||||
<MetricCardTwo
|
<MetricCardTwo
|
||||||
title="Industry-Leading Performance"
|
title="Industry-Leading Threat Intelligence"
|
||||||
description="Proven results in real-world deployments"
|
description="Proven detection capabilities with advanced multi-engine analysis"
|
||||||
tag="Performance Metrics"
|
tag="Performance & Reliability"
|
||||||
tagIcon={TrendingUp}
|
tagIcon={TrendingUp}
|
||||||
tagAnimation="slide-up"
|
tagAnimation="slide-up"
|
||||||
metrics={[
|
metrics={[
|
||||||
{ id: "1", value: "2.3M+", description: "Unique Threats Catalogued" },
|
{ id: "1", value: "1B+", description: "Files Analyzed" },
|
||||||
{ id: "2", value: "500K+", description: "Enterprise Installations" },
|
{ id: "2", value: "70+", description: "Antivirus Engines" },
|
||||||
{ id: "3", value: "24/7", description: "Continuous Monitoring Active" },
|
{ id: "3", value: "24/7", description: "Threat Detection" },
|
||||||
{ id: "4", value: "99.9%", description: "Platform Uptime SLA" }
|
{ id: "4", value: "99.9%", description: "Accuracy Rate" }
|
||||||
]}
|
]}
|
||||||
gridVariant="uniform-all-items-equal"
|
gridVariant="uniform-all-items-equal"
|
||||||
animationType="slide-up"
|
animationType="slide-up"
|
||||||
@@ -192,29 +192,29 @@ export default function LandingPage() {
|
|||||||
<div id="faq" data-section="faq">
|
<div id="faq" data-section="faq">
|
||||||
<FaqSplitMedia
|
<FaqSplitMedia
|
||||||
title="Common Questions"
|
title="Common Questions"
|
||||||
description="Everything you need to know about ThreatShield runtime scanning"
|
description="Everything you need to know about our file threat detection and analysis capabilities"
|
||||||
tag="Help Center"
|
tag="File Scanner Help"
|
||||||
tagIcon={HelpCircle}
|
tagIcon={HelpCircle}
|
||||||
tagAnimation="slide-up"
|
tagAnimation="slide-up"
|
||||||
faqs={[
|
faqs={[
|
||||||
{
|
{
|
||||||
id: "1", title: "How does runtime scanning differ from traditional antivirus?", content: "Traditional antivirus scans files when they're accessed or on a schedule. Runtime scanning monitors code execution in real-time, detecting threats based on behavior patterns. This catches sophisticated malware that disguises itself as legitimate files."
|
id: "1", title: "How does your file scanner detect threats?", content: "Our scanner uses 70+ antivirus engines plus behavioral analysis to detect threats. We analyze file structure, code patterns, execution behavior, and compare against threat intelligence databases. This multi-engine approach catches threats that single-engine scanners miss."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
id: "2", title: "Will runtime scanning slow down my system?", content: "ThreatShield uses optimized heuristics with minimal CPU overhead (typically <3%). Most users report no noticeable performance impact while maintaining continuous protection."
|
id: "2", title: "What file types can be scanned?", content: "We analyze all file types including executables (.exe, .dll), documents (.pdf, .doc), archives (.zip, .rar), scripts (.js, .vbs), and more. Our sandbox environment safely tests suspicious files without risk."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
id: "3", title: "What platforms does ThreatShield support?", content: "ThreatShield is available for Windows Server 2016+, Linux distributions (Ubuntu, CentOS, RHEL), and cloud environments (AWS, Azure, GCP). Unified management across all platforms."
|
id: "3", title: "Is my uploaded file private and secure?", content: "Yes. Uploaded files are analyzed in isolated sandbox environments. We follow strict privacy policies - files are automatically deleted after analysis, and we never share your files with third parties unless you explicitly allow it."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
id: "4", title: "How are threat signatures updated?", content: "Threat signatures are updated automatically multiple times daily via our threat intelligence network. No manual intervention required. Enterprise customers can also customize update policies."
|
id: "4", title: "How long does a file scan take?", content: "Most file scans complete in under 30 seconds. Time may vary based on file size and complexity. Large files or those requiring deep behavioral analysis may take 1-2 minutes. Results are usually instant."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
id: "5", title: "Can ThreatShield integrate with my existing security stack?", content: "Yes. ThreatShield offers REST APIs, SIEM integrations, and plugins for Splunk, ELK, and other platforms. Full documentation and support team assistance available."
|
id: "5", title: "Can I integrate this into my security workflow?", content: "Yes. We offer REST APIs, webhook integrations, and plugins for popular security tools. Our threat intelligence feed can integrate with SIEM systems, EDR solutions, and custom security workflows."
|
||||||
}
|
}
|
||||||
]}
|
]}
|
||||||
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-security-operations-center-soc-with-mu-1772588502350-3b59a4e6.png"
|
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-security-operations-center-soc-with-mu-1772588502350-3b59a4e6.png"
|
||||||
imageAlt="Security operations center monitoring threats"
|
imageAlt="Threat analysis and reporting interface"
|
||||||
mediaAnimation="slide-up"
|
mediaAnimation="slide-up"
|
||||||
faqsAnimation="slide-up"
|
faqsAnimation="slide-up"
|
||||||
textboxLayout="default"
|
textboxLayout="default"
|
||||||
@@ -226,37 +226,37 @@ export default function LandingPage() {
|
|||||||
|
|
||||||
<div id="contact" data-section="contact">
|
<div id="contact" data-section="contact">
|
||||||
<ContactCenter
|
<ContactCenter
|
||||||
tag="Get Started"
|
tag="Ready to Scan"
|
||||||
title="Secure Your Systems Today"
|
title="Protect Your Files Today"
|
||||||
description="Start a free 30-day trial of ThreatShield runtime antivirus. No credit card required. Full access to all enterprise features."
|
description="Upload files now for instant threat analysis. Get comprehensive reports with detailed threat intelligence. Free for individual files, flexible plans for enterprises."
|
||||||
tagIcon={Lock}
|
tagIcon={Lock}
|
||||||
tagAnimation="slide-up"
|
tagAnimation="slide-up"
|
||||||
background={{ variant: "downward-rays-animated" }}
|
background={{ variant: "downward-rays-animated" }}
|
||||||
useInvertedBackground={false}
|
useInvertedBackground={false}
|
||||||
inputPlaceholder="Enter your work email"
|
inputPlaceholder="Enter your email"
|
||||||
buttonText="Start Free Trial"
|
buttonText="Start Scanning"
|
||||||
termsText="We'll send you a download link and setup guide. Your data is secure and never shared."
|
termsText="We'll send you a link to begin file analysis. Your data is protected and never shared."
|
||||||
/>
|
/>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div id="footer" data-section="footer">
|
<div id="footer" data-section="footer">
|
||||||
<FooterBaseCard
|
<FooterBaseCard
|
||||||
logoText="ThreatShield"
|
logoText="FileThreatScan"
|
||||||
columns={[
|
columns={[
|
||||||
{
|
{
|
||||||
title: "Product", items: [
|
title: "Product", items: [
|
||||||
{ label: "Features", href: "#features" },
|
{ label: "File Scanner", href: "#scanner" },
|
||||||
{ label: "Pricing", href: "#metrics" },
|
{ label: "Threat Intelligence", href: "#metrics" },
|
||||||
{ label: "Integrations", href: "#" },
|
{ label: "API Integration", href: "#" },
|
||||||
{ label: "Documentation", href: "#" }
|
{ label: "Documentation", href: "#" }
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
title: "Security", items: [
|
title: "Detection", items: [
|
||||||
{ label: "Security Reports", href: "#" },
|
{ label: "Threat Reports", href: "#" },
|
||||||
{ label: "Compliance", href: "#" },
|
{ label: "Malware Analysis", href: "#" },
|
||||||
{ label: "Threat Intelligence", href: "#" },
|
{ label: "Threat Database", href: "#" },
|
||||||
{ label: "Bug Bounty", href: "#" }
|
{ label: "Security Feed", href: "#" }
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@@ -276,7 +276,7 @@ export default function LandingPage() {
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
]}
|
]}
|
||||||
copyrightText="© 2025 ThreatShield Security. All rights reserved."
|
copyrightText="© 2025 FileThreatScan. All rights reserved."
|
||||||
/>
|
/>
|
||||||
</div>
|
</div>
|
||||||
</ThemeProvider>
|
</ThemeProvider>
|
||||||
|
|||||||
Reference in New Issue
Block a user