Merge version_1 into main #2

Merged
bender merged 1 commits from version_1 into main 2026-03-06 16:16:01 +00:00

View File

@@ -18,7 +18,7 @@ export default function LandingPage() {
borderRadius="pill"
contentWidth="mediumSmall"
sizing="mediumSizeLargeTitles"
background="noise"
background="circleGradient"
cardStyle="glass-depth"
primaryButtonStyle="primary-glow"
secondaryButtonStyle="radial-glow"
@@ -47,33 +47,33 @@ export default function LandingPage() {
tag="Cloud Security Platform"
tagIcon={Shield}
tagAnimation="slide-up"
background={{ variant: "noise" }}
background={{ variant: "plain" }}
leftCarouselItems={[
{
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png?_wi=1", imageAlt: "SecureLayer cloud security dashboard"
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png", imageAlt: "SecureLayer cloud security dashboard"
},
{
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png?_wi=1", imageAlt: "Real-time vulnerability scanning"
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png", imageAlt: "Real-time vulnerability scanning"
},
{
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png?_wi=1", imageAlt: "Infrastructure security scanning"
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png", imageAlt: "Infrastructure security scanning"
},
{
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png?_wi=2", imageAlt: "Cloud compliance monitoring"
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png", imageAlt: "Cloud compliance monitoring"
}
]}
rightCarouselItems={[
{
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png?_wi=1", imageAlt: "IAM risk detection"
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png", imageAlt: "IAM risk detection"
},
{
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-kubernetes-configurat-1772813600953-7370905a.png?_wi=1", imageAlt: "Kubernetes RBAC monitoring"
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-kubernetes-configurat-1772813600953-7370905a.png", imageAlt: "Kubernetes RBAC monitoring"
},
{
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png?_wi=2", imageAlt: "Security findings dashboard"
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png", imageAlt: "Security findings dashboard"
},
{
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png?_wi=2", imageAlt: "Access control analysis"
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png", imageAlt: "Access control analysis"
}
]}
buttons={[
@@ -122,13 +122,13 @@ export default function LandingPage() {
tagAnimation="slide-up"
features={[
{
id: "01", title: "Infrastructure Security Scanning", description: "Automated scanning across AWS, Azure, and Google Cloud detects misconfigurations before they become breaches. Real-time monitoring with continuous compliance.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png?_wi=2", imageAlt: "Infrastructure security scanning"
id: "01", title: "Infrastructure Security Scanning", description: "Automated scanning across AWS, Azure, and Google Cloud detects misconfigurations before they become breaches. Real-time monitoring with continuous compliance.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png", imageAlt: "Infrastructure security scanning"
},
{
id: "02", title: "IAM Risk Detection", description: "Advanced analysis identifies overprivileged accounts, unused credentials, and permission drift. Automatic recommendations for principle of least privilege.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png?_wi=3", imageAlt: "IAM risk detection"
id: "02", title: "IAM Risk Detection", description: "Advanced analysis identifies overprivileged accounts, unused credentials, and permission drift. Automatic recommendations for principle of least privilege.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png", imageAlt: "IAM risk detection"
},
{
id: "03", title: "Kubernetes Configuration Monitoring", description: "RBAC policy analysis and workload security monitoring ensure your Kubernetes clusters maintain security best practices and compliance standards.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-kubernetes-configurat-1772813600953-7370905a.png?_wi=2", imageAlt: "Kubernetes configuration monitoring"
id: "03", title: "Kubernetes Configuration Monitoring", description: "RBAC policy analysis and workload security monitoring ensure your Kubernetes clusters maintain security best practices and compliance standards.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-kubernetes-configurat-1772813600953-7370905a.png", imageAlt: "Kubernetes configuration monitoring"
}
]}
gridVariant="three-columns-all-equal-width"
@@ -147,13 +147,13 @@ export default function LandingPage() {
tagAnimation="slide-up"
features={[
{
id: "01", title: "Live Scanning Demo", description: "Watch SecureLayer scan cloud infrastructure in real time, detecting misconfigurations and vulnerabilities as they happen across your multi-cloud environment.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png?_wi=3", imageAlt: "Live scanning demonstration"
id: "01", title: "Live Scanning Demo", description: "Watch SecureLayer scan cloud infrastructure in real time, detecting misconfigurations and vulnerabilities as they happen across your multi-cloud environment.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png", imageAlt: "Live scanning demonstration"
},
{
id: "02", title: "Risk Assessment & Remediation", description: "See how our platform prioritizes risks, provides context-aware remediation steps, and integrates with your DevOps workflows for faster risk mitigation.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png?_wi=3", imageAlt: "Risk assessment interface"
id: "02", title: "Risk Assessment & Remediation", description: "See how our platform prioritizes risks, provides context-aware remediation steps, and integrates with your DevOps workflows for faster risk mitigation.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png", imageAlt: "Risk assessment interface"
},
{
id: "03", title: "Custom Integration Discussion", description: "Our security engineers will discuss how SecureLayer integrates with your existing tools, workflows, and security posture. Tailored to your infrastructure.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png?_wi=3", imageAlt: "Integration discussion"
id: "03", title: "Custom Integration Discussion", description: "Our security engineers will discuss how SecureLayer integrates with your existing tools, workflows, and security posture. Tailored to your infrastructure.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png", imageAlt: "Integration discussion"
}
]}
gridVariant="three-columns-all-equal-width"