Merge version_1 into main #2
@@ -18,7 +18,7 @@ export default function LandingPage() {
|
||||
borderRadius="pill"
|
||||
contentWidth="mediumSmall"
|
||||
sizing="mediumSizeLargeTitles"
|
||||
background="noise"
|
||||
background="circleGradient"
|
||||
cardStyle="glass-depth"
|
||||
primaryButtonStyle="primary-glow"
|
||||
secondaryButtonStyle="radial-glow"
|
||||
@@ -47,33 +47,33 @@ export default function LandingPage() {
|
||||
tag="Cloud Security Platform"
|
||||
tagIcon={Shield}
|
||||
tagAnimation="slide-up"
|
||||
background={{ variant: "noise" }}
|
||||
background={{ variant: "plain" }}
|
||||
leftCarouselItems={[
|
||||
{
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png?_wi=1", imageAlt: "SecureLayer cloud security dashboard"
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png", imageAlt: "SecureLayer cloud security dashboard"
|
||||
},
|
||||
{
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png?_wi=1", imageAlt: "Real-time vulnerability scanning"
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png", imageAlt: "Real-time vulnerability scanning"
|
||||
},
|
||||
{
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png?_wi=1", imageAlt: "Infrastructure security scanning"
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png", imageAlt: "Infrastructure security scanning"
|
||||
},
|
||||
{
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png?_wi=2", imageAlt: "Cloud compliance monitoring"
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png", imageAlt: "Cloud compliance monitoring"
|
||||
}
|
||||
]}
|
||||
rightCarouselItems={[
|
||||
{
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png?_wi=1", imageAlt: "IAM risk detection"
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png", imageAlt: "IAM risk detection"
|
||||
},
|
||||
{
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-kubernetes-configurat-1772813600953-7370905a.png?_wi=1", imageAlt: "Kubernetes RBAC monitoring"
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-kubernetes-configurat-1772813600953-7370905a.png", imageAlt: "Kubernetes RBAC monitoring"
|
||||
},
|
||||
{
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png?_wi=2", imageAlt: "Security findings dashboard"
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png", imageAlt: "Security findings dashboard"
|
||||
},
|
||||
{
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png?_wi=2", imageAlt: "Access control analysis"
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png", imageAlt: "Access control analysis"
|
||||
}
|
||||
]}
|
||||
buttons={[
|
||||
@@ -122,13 +122,13 @@ export default function LandingPage() {
|
||||
tagAnimation="slide-up"
|
||||
features={[
|
||||
{
|
||||
id: "01", title: "Infrastructure Security Scanning", description: "Automated scanning across AWS, Azure, and Google Cloud detects misconfigurations before they become breaches. Real-time monitoring with continuous compliance.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png?_wi=2", imageAlt: "Infrastructure security scanning"
|
||||
id: "01", title: "Infrastructure Security Scanning", description: "Automated scanning across AWS, Azure, and Google Cloud detects misconfigurations before they become breaches. Real-time monitoring with continuous compliance.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png", imageAlt: "Infrastructure security scanning"
|
||||
},
|
||||
{
|
||||
id: "02", title: "IAM Risk Detection", description: "Advanced analysis identifies overprivileged accounts, unused credentials, and permission drift. Automatic recommendations for principle of least privilege.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png?_wi=3", imageAlt: "IAM risk detection"
|
||||
id: "02", title: "IAM Risk Detection", description: "Advanced analysis identifies overprivileged accounts, unused credentials, and permission drift. Automatic recommendations for principle of least privilege.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png", imageAlt: "IAM risk detection"
|
||||
},
|
||||
{
|
||||
id: "03", title: "Kubernetes Configuration Monitoring", description: "RBAC policy analysis and workload security monitoring ensure your Kubernetes clusters maintain security best practices and compliance standards.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-kubernetes-configurat-1772813600953-7370905a.png?_wi=2", imageAlt: "Kubernetes configuration monitoring"
|
||||
id: "03", title: "Kubernetes Configuration Monitoring", description: "RBAC policy analysis and workload security monitoring ensure your Kubernetes clusters maintain security best practices and compliance standards.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-kubernetes-configurat-1772813600953-7370905a.png", imageAlt: "Kubernetes configuration monitoring"
|
||||
}
|
||||
]}
|
||||
gridVariant="three-columns-all-equal-width"
|
||||
@@ -147,13 +147,13 @@ export default function LandingPage() {
|
||||
tagAnimation="slide-up"
|
||||
features={[
|
||||
{
|
||||
id: "01", title: "Live Scanning Demo", description: "Watch SecureLayer scan cloud infrastructure in real time, detecting misconfigurations and vulnerabilities as they happen across your multi-cloud environment.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png?_wi=3", imageAlt: "Live scanning demonstration"
|
||||
id: "01", title: "Live Scanning Demo", description: "Watch SecureLayer scan cloud infrastructure in real time, detecting misconfigurations and vulnerabilities as they happen across your multi-cloud environment.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png", imageAlt: "Live scanning demonstration"
|
||||
},
|
||||
{
|
||||
id: "02", title: "Risk Assessment & Remediation", description: "See how our platform prioritizes risks, provides context-aware remediation steps, and integrates with your DevOps workflows for faster risk mitigation.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png?_wi=3", imageAlt: "Risk assessment interface"
|
||||
id: "02", title: "Risk Assessment & Remediation", description: "See how our platform prioritizes risks, provides context-aware remediation steps, and integrates with your DevOps workflows for faster risk mitigation.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png", imageAlt: "Risk assessment interface"
|
||||
},
|
||||
{
|
||||
id: "03", title: "Custom Integration Discussion", description: "Our security engineers will discuss how SecureLayer integrates with your existing tools, workflows, and security posture. Tailored to your infrastructure.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png?_wi=3", imageAlt: "Integration discussion"
|
||||
id: "03", title: "Custom Integration Discussion", description: "Our security engineers will discuss how SecureLayer integrates with your existing tools, workflows, and security posture. Tailored to your infrastructure.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png", imageAlt: "Integration discussion"
|
||||
}
|
||||
]}
|
||||
gridVariant="three-columns-all-equal-width"
|
||||
|
||||
Reference in New Issue
Block a user