diff --git a/src/app/page.tsx b/src/app/page.tsx index ed4d072..a72b5bb 100644 --- a/src/app/page.tsx +++ b/src/app/page.tsx @@ -50,30 +50,30 @@ export default function LandingPage() { background={{ variant: "plain" }} leftCarouselItems={[ { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png", imageAlt: "SecureLayer cloud security dashboard" + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png?_wi=1", imageAlt: "SecureLayer cloud security dashboard" }, { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png", imageAlt: "Real-time vulnerability scanning" + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png?_wi=1", imageAlt: "Real-time vulnerability scanning" }, { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png", imageAlt: "Infrastructure security scanning" + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png?_wi=1", imageAlt: "Infrastructure security scanning" }, { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png", imageAlt: "Cloud compliance monitoring" + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png?_wi=2", imageAlt: "Cloud compliance monitoring" } ]} rightCarouselItems={[ { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png", imageAlt: "IAM risk detection" + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png?_wi=1", imageAlt: "IAM risk detection" }, { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-kubernetes-configurat-1772813600953-7370905a.png", imageAlt: "Kubernetes RBAC monitoring" + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-kubernetes-configurat-1772813600953-7370905a.png?_wi=1", imageAlt: "Kubernetes RBAC monitoring" }, { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png", imageAlt: "Security findings dashboard" + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png?_wi=2", imageAlt: "Security findings dashboard" }, { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png", imageAlt: "Access control analysis" + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png?_wi=2", imageAlt: "Access control analysis" } ]} buttons={[ @@ -122,13 +122,13 @@ export default function LandingPage() { tagAnimation="slide-up" features={[ { - id: "01", title: "Infrastructure Security Scanning", description: "Automated scanning across AWS, Azure, and Google Cloud detects misconfigurations before they become breaches. Real-time monitoring with continuous compliance.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png", imageAlt: "Infrastructure security scanning" + id: "01", title: "Infrastructure Security Scanning", description: "Automated scanning across AWS, Azure, and Google Cloud detects misconfigurations before they become breaches. Real-time monitoring with continuous compliance.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png?_wi=2", imageAlt: "Infrastructure security scanning" }, { - id: "02", title: "IAM Risk Detection", description: "Advanced analysis identifies overprivileged accounts, unused credentials, and permission drift. Automatic recommendations for principle of least privilege.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png", imageAlt: "IAM risk detection" + id: "02", title: "IAM Risk Detection", description: "Advanced analysis identifies overprivileged accounts, unused credentials, and permission drift. Automatic recommendations for principle of least privilege.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-depicting-iam-risk-detec-1772813601598-98add8b9.png?_wi=3", imageAlt: "IAM risk detection" }, { - id: "03", title: "Kubernetes Configuration Monitoring", description: "RBAC policy analysis and workload security monitoring ensure your Kubernetes clusters maintain security best practices and compliance standards.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-kubernetes-configurat-1772813600953-7370905a.png", imageAlt: "Kubernetes configuration monitoring" + id: "03", title: "Kubernetes Configuration Monitoring", description: "RBAC policy analysis and workload security monitoring ensure your Kubernetes clusters maintain security best practices and compliance standards.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-kubernetes-configurat-1772813600953-7370905a.png?_wi=2", imageAlt: "Kubernetes configuration monitoring" } ]} gridVariant="three-columns-all-equal-width" @@ -147,13 +147,13 @@ export default function LandingPage() { tagAnimation="slide-up" features={[ { - id: "01", title: "Live Scanning Demo", description: "Watch SecureLayer scan cloud infrastructure in real time, detecting misconfigurations and vulnerabilities as they happen across your multi-cloud environment.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png", imageAlt: "Live scanning demonstration" + id: "01", title: "Live Scanning Demo", description: "Watch SecureLayer scan cloud infrastructure in real time, detecting misconfigurations and vulnerabilities as they happen across your multi-cloud environment.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/an-illustration-of-infrastructure-securi-1772813600646-01e2bdee.png?_wi=3", imageAlt: "Live scanning demonstration" }, { - id: "02", title: "Risk Assessment & Remediation", description: "See how our platform prioritizes risks, provides context-aware remediation steps, and integrates with your DevOps workflows for faster risk mitigation.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png", imageAlt: "Risk assessment interface" + id: "02", title: "Risk Assessment & Remediation", description: "See how our platform prioritizes risks, provides context-aware remediation steps, and integrates with your DevOps workflows for faster risk mitigation.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-detailed-product-ui-screenshot-showing-1772813602104-80b6ad6e.png?_wi=3", imageAlt: "Risk assessment interface" }, { - id: "03", title: "Custom Integration Discussion", description: "Our security engineers will discuss how SecureLayer integrates with your existing tools, workflows, and security posture. Tailored to your infrastructure.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png", imageAlt: "Integration discussion" + id: "03", title: "Custom Integration Discussion", description: "Our security engineers will discuss how SecureLayer integrates with your existing tools, workflows, and security posture. Tailored to your infrastructure.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AT19jJLPJImbQJ779hA1Z3b4Oi/a-modern-cloud-security-dashboard-interf-1772813601037-6a78e892.png?_wi=3", imageAlt: "Integration discussion" } ]} gridVariant="three-columns-all-equal-width"