Merge version_3 into main #2

Merged
bender merged 2 commits from version_3 into main 2026-03-04 01:48:20 +00:00
2 changed files with 75 additions and 75 deletions

View File

@@ -14,15 +14,15 @@ const dmSans = DM_Sans({
});
export const metadata: Metadata = {
title: "Runtime File Antivirus Scanner | Real-Time Threat Detection", description: "ThreatShield: Advanced runtime antivirus scanning that detects threats as files execute. Enterprise-grade protection with 99.7% accuracy and sub-50ms response.", keywords: "antivirus, runtime scanning, malware detection, cybersecurity, endpoint protection, real-time threat detection", openGraph: {
title: "ThreatShield - Runtime Antivirus Scanner", description: "Detect threats in real-time as code executes. Advanced heuristic analysis protects your systems before damage occurs.", type: "website", siteName: "ThreatShield", images: [
title: "VirusTotal Alternative | Runtime File Threat Detection", description: "Advanced runtime threat detection scanner for files and executables. Analyze malware in real-time with behavioral analysis, sandboxing, and instant threat identification.", keywords: "file scanner, malware analysis, threat detection, runtime scanning, file analyzer, executable analysis, virus detection, malware detection, endpoint security", openGraph: {
title: "Runtime File Threat Detection Scanner", description: "Scan files and detect threats in real-time with advanced behavioral analysis and threat intelligence.", type: "website", siteName: "FileThreatScan", images: [
{
url: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-modern-sleek-cybersecurity-dashboard-i-1772588505362-50975afa.png", alt: "A modern, sleek cybersecurity dashboard interface showing real-time threat detection and runtime fil"
url: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-modern-sleek-cybersecurity-dashboard-i-1772588505362-50975afa.png", alt: "Advanced file threat detection and malware analysis dashboard"
}
]
},
twitter: {
card: "summary_large_image", title: "ThreatShield - Real-Time Runtime Antivirus", description: "Enterprise-grade runtime threat detection and analysis. Catch sophisticated malware before it can execute.", images: [
card: "summary_large_image", title: "Runtime File Threat Detection Scanner", description: "Analyze files for threats with advanced behavioral detection and threat intelligence.", images: [
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-modern-sleek-cybersecurity-dashboard-i-1772588505362-50975afa.png"
]
},

View File

@@ -11,7 +11,7 @@ import MetricCardTwo from '@/components/sections/metrics/MetricCardTwo';
import FaqSplitMedia from '@/components/sections/faq/FaqSplitMedia';
import ContactCenter from '@/components/sections/contact/ContactCenter';
import FooterBaseCard from '@/components/sections/footer/FooterBaseCard';
import { Award, CheckCircle, HelpCircle, Lock, Shield, Sparkles, TrendingUp, Zap } from 'lucide-react';
import { Award, CheckCircle, HelpCircle, Lock, Zap, Sparkles, TrendingUp, AlertTriangle } from 'lucide-react';
export default function LandingPage() {
return (
@@ -29,45 +29,45 @@ export default function LandingPage() {
>
<div id="nav" data-section="nav">
<NavbarStyleCentered
brandName="ThreatShield"
brandName="FileThreatScan"
navItems={[
{ name: "Features", id: "features" },
{ name: "Security", id: "comparison" },
{ name: "Pricing", id: "metrics" },
{ name: "FAQ", id: "faq" },
{ name: "Scanner", id: "scanner" },
{ name: "Detection", id: "comparison" },
{ name: "Threat Intel", id: "metrics" },
{ name: "Help", id: "faq" },
{ name: "Contact", id: "contact" }
]}
button={{ text: "Start Free Trial", href: "contact" }}
button={{ text: "Scan Now", href: "contact" }}
/>
</div>
<div id="hero" data-section="hero">
<HeroBillboardTestimonial
title="Real-Time Antivirus Runtime Scanning"
description="Detect and neutralize threats instantly as files execute. Advanced heuristic analysis protects your system before damage occurs."
tag="Enterprise Security"
tagIcon={Shield}
title="Scan Files for Runtime Threats in Seconds"
description="Upload and analyze any file for malware, trojans, and advanced threats. Get instant results from multiple antivirus engines and behavioral detection systems."
tag="Multi-Engine Analysis"
tagIcon={AlertTriangle}
tagAnimation="slide-up"
background={{ variant: "glowing-orb" }}
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-modern-sleek-cybersecurity-dashboard-i-1772588505362-50975afa.png"
imageAlt="Runtime antivirus dashboard with threat detection"
imageAlt="File threat detection and analysis dashboard"
mediaAnimation="slide-up"
testimonials={[
{
name: "James Mitchell", handle: "IT Director, SecureBank Corp", testimonial: "ThreatShield caught a zero-day exploit that our legacy system missed. Exactly what we needed.", rating: 5,
name: "Alex Thompson", handle: "Security Researcher, CyberLabs", testimonial: "The most comprehensive file analysis I've used. Catches malware that others miss.", rating: 5,
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-m-1772588501456-97a7303b.png"
},
{
name: "Sarah Chen", handle: "Security Lead, TechVentures", testimonial: "The runtime scanning is incredibly fast. No performance degradation on our servers.", rating: 5,
name: "Maria Rodriguez", handle: "IT Security Manager, TechCorp", testimonial: "Reliable threat detection with zero false positives in our testing. Essential tool.", rating: 5,
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-f-1772588501586-40d6d943.png"
},
{
name: "David Rodriguez", handle: "CISO, Enterprise Solutions Inc", testimonial: "We replaced three other tools with ThreatShield. Better protection, lower cost.", rating: 5,
name: "James Liu", handle: "Malware Analyst, SecureNet", testimonial: "Fast, accurate, and incredibly detailed threat reports. Best-in-class analysis.", rating: 5,
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-m-1772588502151-b7a38d8c.png"
}
]}
buttons={[
{ text: "Download Now", href: "contact" },
{ text: "Scan Your Files", href: "contact" },
{ text: "Learn More", href: "comparison" }
]}
buttonAnimation="slide-up"
@@ -75,17 +75,17 @@ export default function LandingPage() {
/>
</div>
<div id="about" data-section="about">
<div id="scanner" data-section="scanner">
<MediaAbout
title="Advanced Runtime Protection"
description="Traditional antivirus scans files on access. ThreatShield goes deeper—analyzing behavior and patterns as code executes. Catch sophisticated malware before it can establish persistence or steal data."
tag="How It Works"
title="Deep File Analysis Engine"
description="Unlike basic file scanners, our runtime threat detection analyzes file behavior, code patterns, and execution chains. Detect zero-day exploits, ransomware, trojans, and sophisticated malware in real-time as files execute or are scanned."
tag="Advanced Analysis"
tagIcon={Zap}
tagAnimation="slide-up"
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/an-advanced-runtime-protection-system-vi-1772588502551-0c2eb711.png"
imageAlt="Runtime file scanning analysis interface"
imageAlt="File analysis and threat detection interface"
buttons={[
{ text: "Explore Features", href: "features" }
{ text: "Start Analysis", href: "contact" }
]}
buttonAnimation="slide-up"
useInvertedBackground={false}
@@ -94,19 +94,19 @@ export default function LandingPage() {
<div id="comparison" data-section="comparison">
<FeatureCardSixteen
title="Why Runtime Scanning Matters"
description="See how ThreatShield's runtime approach outpaces traditional file-based detection"
tag="Security Advantage"
title="Superior File Threat Detection"
description="See why our multi-engine approach outperforms traditional single-engine file scanners"
tag="Threat Detection Advantage"
tagIcon={CheckCircle}
tagAnimation="slide-up"
negativeCard={{
items: [
"File-based scanning only", "Misses behavioral threats", "Delayed detection", "High false positives", "Manual threat updates"
"Single antivirus engine", "No behavioral analysis", "Missed zero-day threats", "Limited sandbox testing", "Slow analysis times"
]
}}
positiveCard={{
items: [
"Real-time execution monitoring", "Behavioral threat detection", "Instant threat response", "AI-powered accuracy", "Auto-updated threat signatures"
"70+ antivirus engines", "Advanced behavioral detection", "Zero-day threat identification", "Full sandboxing environment", "Results in under 30 seconds"
]
}}
animationType="slide-up"
@@ -117,33 +117,33 @@ export default function LandingPage() {
<div id="testimonials" data-section="testimonials">
<TestimonialCardSixteen
title="Trusted by Security Professionals"
description="Leading enterprises rely on ThreatShield to protect critical infrastructure and sensitive data"
tag="Client Stories"
title="Trusted by Security Teams Worldwide"
description="Organizations and security professionals rely on our file threat detection for critical infrastructure and sensitive data protection"
tag="User Success Stories"
tagIcon={Award}
tagAnimation="slide-up"
testimonials={[
{
id: "1", name: "Emily Watson", role: "Senior Security Analyst", company: "Financial Services Corp", rating: 5,
id: "1", name: "Sarah Mitchell", role: "Chief Security Officer", company: "Global Financial Corp", rating: 5,
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-f-1772588501732-58a276ac.png"
},
{
id: "2", name: "Marcus Johnson", role: "Infrastructure Lead", company: "Healthcare Systems Ltd", rating: 5,
id: "2", name: "David Chen", role: "Infrastructure Architect", company: "Healthcare Solutions Ltd", rating: 5,
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-m-1772588501708-f6201ebc.png"
},
{
id: "3", name: "Lisa Park", role: "CTO", company: "E-Commerce Solutions", rating: 5,
id: "3", name: "Jennifer Walsh", role: "Threat Intelligence Lead", company: "Enterprise Security Systems", rating: 5,
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-f-1772588501778-2743ff8a.png"
},
{
id: "4", name: "Thomas Mueller", role: "Security Director", company: "Government Agency", rating: 5,
id: "4", name: "Robert King", role: "Security Operations Director", company: "Government Defense Agency", rating: 5,
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-professional-corporate-headshot-of-a-m-1772588502525-9df4f53d.png"
}
]}
kpiItems={[
{ value: "99.7%", label: "Threat Detection Rate" },
{ value: "<50ms", label: "Average Response Time" },
{ value: "1M+", label: "Threats Blocked Daily" }
{ value: "70+", label: "Antivirus Engines" },
{ value: "<30s", label: "Average Scan Time" },
{ value: "1B+", label: "Files Analyzed" }
]}
animationType="slide-up"
textboxLayout="default"
@@ -153,9 +153,9 @@ export default function LandingPage() {
<div id="social-proof" data-section="social-proof">
<SocialProofOne
title="Enterprise Confidence"
description="Securing the world's most demanding infrastructure"
tag="Industry Leaders"
title="Global Security Leadership"
description="Protecting organizations and individuals worldwide with threat intelligence"
tag="Trusted Partners"
tagIcon={Sparkles}
tagAnimation="slide-up"
textboxLayout="default"
@@ -171,16 +171,16 @@ export default function LandingPage() {
<div id="metrics" data-section="metrics">
<MetricCardTwo
title="Industry-Leading Performance"
description="Proven results in real-world deployments"
tag="Performance Metrics"
title="Industry-Leading Threat Intelligence"
description="Proven detection capabilities with advanced multi-engine analysis"
tag="Performance & Reliability"
tagIcon={TrendingUp}
tagAnimation="slide-up"
metrics={[
{ id: "1", value: "2.3M+", description: "Unique Threats Catalogued" },
{ id: "2", value: "500K+", description: "Enterprise Installations" },
{ id: "3", value: "24/7", description: "Continuous Monitoring Active" },
{ id: "4", value: "99.9%", description: "Platform Uptime SLA" }
{ id: "1", value: "1B+", description: "Files Analyzed" },
{ id: "2", value: "70+", description: "Antivirus Engines" },
{ id: "3", value: "24/7", description: "Threat Detection" },
{ id: "4", value: "99.9%", description: "Accuracy Rate" }
]}
gridVariant="uniform-all-items-equal"
animationType="slide-up"
@@ -192,29 +192,29 @@ export default function LandingPage() {
<div id="faq" data-section="faq">
<FaqSplitMedia
title="Common Questions"
description="Everything you need to know about ThreatShield runtime scanning"
tag="Help Center"
description="Everything you need to know about our file threat detection and analysis capabilities"
tag="File Scanner Help"
tagIcon={HelpCircle}
tagAnimation="slide-up"
faqs={[
{
id: "1", title: "How does runtime scanning differ from traditional antivirus?", content: "Traditional antivirus scans files when they're accessed or on a schedule. Runtime scanning monitors code execution in real-time, detecting threats based on behavior patterns. This catches sophisticated malware that disguises itself as legitimate files."
id: "1", title: "How does your file scanner detect threats?", content: "Our scanner uses 70+ antivirus engines plus behavioral analysis to detect threats. We analyze file structure, code patterns, execution behavior, and compare against threat intelligence databases. This multi-engine approach catches threats that single-engine scanners miss."
},
{
id: "2", title: "Will runtime scanning slow down my system?", content: "ThreatShield uses optimized heuristics with minimal CPU overhead (typically <3%). Most users report no noticeable performance impact while maintaining continuous protection."
id: "2", title: "What file types can be scanned?", content: "We analyze all file types including executables (.exe, .dll), documents (.pdf, .doc), archives (.zip, .rar), scripts (.js, .vbs), and more. Our sandbox environment safely tests suspicious files without risk."
},
{
id: "3", title: "What platforms does ThreatShield support?", content: "ThreatShield is available for Windows Server 2016+, Linux distributions (Ubuntu, CentOS, RHEL), and cloud environments (AWS, Azure, GCP). Unified management across all platforms."
id: "3", title: "Is my uploaded file private and secure?", content: "Yes. Uploaded files are analyzed in isolated sandbox environments. We follow strict privacy policies - files are automatically deleted after analysis, and we never share your files with third parties unless you explicitly allow it."
},
{
id: "4", title: "How are threat signatures updated?", content: "Threat signatures are updated automatically multiple times daily via our threat intelligence network. No manual intervention required. Enterprise customers can also customize update policies."
id: "4", title: "How long does a file scan take?", content: "Most file scans complete in under 30 seconds. Time may vary based on file size and complexity. Large files or those requiring deep behavioral analysis may take 1-2 minutes. Results are usually instant."
},
{
id: "5", title: "Can ThreatShield integrate with my existing security stack?", content: "Yes. ThreatShield offers REST APIs, SIEM integrations, and plugins for Splunk, ELK, and other platforms. Full documentation and support team assistance available."
id: "5", title: "Can I integrate this into my security workflow?", content: "Yes. We offer REST APIs, webhook integrations, and plugins for popular security tools. Our threat intelligence feed can integrate with SIEM systems, EDR solutions, and custom security workflows."
}
]}
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ASa68rQ2xOUR4SjtZqFPYfC95l/a-security-operations-center-soc-with-mu-1772588502350-3b59a4e6.png"
imageAlt="Security operations center monitoring threats"
imageAlt="Threat analysis and reporting interface"
mediaAnimation="slide-up"
faqsAnimation="slide-up"
textboxLayout="default"
@@ -226,37 +226,37 @@ export default function LandingPage() {
<div id="contact" data-section="contact">
<ContactCenter
tag="Get Started"
title="Secure Your Systems Today"
description="Start a free 30-day trial of ThreatShield runtime antivirus. No credit card required. Full access to all enterprise features."
tag="Ready to Scan"
title="Protect Your Files Today"
description="Upload files now for instant threat analysis. Get comprehensive reports with detailed threat intelligence. Free for individual files, flexible plans for enterprises."
tagIcon={Lock}
tagAnimation="slide-up"
background={{ variant: "downward-rays-animated" }}
useInvertedBackground={false}
inputPlaceholder="Enter your work email"
buttonText="Start Free Trial"
termsText="We'll send you a download link and setup guide. Your data is secure and never shared."
inputPlaceholder="Enter your email"
buttonText="Start Scanning"
termsText="We'll send you a link to begin file analysis. Your data is protected and never shared."
/>
</div>
<div id="footer" data-section="footer">
<FooterBaseCard
logoText="ThreatShield"
logoText="FileThreatScan"
columns={[
{
title: "Product", items: [
{ label: "Features", href: "#features" },
{ label: "Pricing", href: "#metrics" },
{ label: "Integrations", href: "#" },
{ label: "File Scanner", href: "#scanner" },
{ label: "Threat Intelligence", href: "#metrics" },
{ label: "API Integration", href: "#" },
{ label: "Documentation", href: "#" }
]
},
{
title: "Security", items: [
{ label: "Security Reports", href: "#" },
{ label: "Compliance", href: "#" },
{ label: "Threat Intelligence", href: "#" },
{ label: "Bug Bounty", href: "#" }
title: "Detection", items: [
{ label: "Threat Reports", href: "#" },
{ label: "Malware Analysis", href: "#" },
{ label: "Threat Database", href: "#" },
{ label: "Security Feed", href: "#" }
]
},
{
@@ -276,7 +276,7 @@ export default function LandingPage() {
]
}
]}
copyrightText="© 2025 ThreatShield Security. All rights reserved."
copyrightText="© 2025 FileThreatScan. All rights reserved."
/>
</div>
</ThemeProvider>