From 9b39f203448b1ffbc3bd319c05ffacb7f52365e0 Mon Sep 17 00:00:00 2001 From: bender Date: Wed, 4 Mar 2026 10:30:57 +0000 Subject: [PATCH] Update src/app/page.tsx --- src/app/page.tsx | 121 +++++++++++++++++++++++++++++++---------------- 1 file changed, 80 insertions(+), 41 deletions(-) diff --git a/src/app/page.tsx b/src/app/page.tsx index 70c9ee3..cc2af87 100644 --- a/src/app/page.tsx +++ b/src/app/page.tsx @@ -48,24 +48,30 @@ export default function LandingPage() { tag="Enterprise Security" tagIcon={Shield} tagAnimation="slide-up" - background={{ variant: "floatingGradient" }} + background={{ variant: "sparkles-gradient" }} buttons={[ { text: "Explore Our Services", href: "#services" }, { text: "Get Started", href: "#contact" }, ]} mediaItems={[ { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/a-modern-sleek-cybersecurity-dashboard-i-1772620127603-dd037a7d.png", imageAlt: "Advanced Security Dashboard"}, + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/a-modern-sleek-cybersecurity-dashboard-i-1772620127603-dd037a7d.png", imageAlt: "Advanced Security Dashboard" + }, { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/advanced-threat-analysis-visualization-s-1772620128024-ac7ab622.png", imageAlt: "Real-time Threat Analysis"}, + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/advanced-threat-analysis-visualization-s-1772620128024-ac7ab622.png", imageAlt: "Real-time Threat Analysis" + }, { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/ai-powered-security-monitoring-system-in-1772620128486-231d2b65.png", imageAlt: "AI Monitoring System"}, + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/ai-powered-security-monitoring-system-in-1772620128486-231d2b65.png", imageAlt: "AI Monitoring System" + }, { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/data-protection-and-encryption-interface-1772620128649-2d897cf8.png", imageAlt: "Data Protection Interface"}, + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/data-protection-and-encryption-interface-1772620128649-2d897cf8.png", imageAlt: "Data Protection Interface" + }, { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/compliance-management-dashboard-showing--1772620128732-9410e7b4.png", imageAlt: "Compliance Management Suite"}, + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/compliance-management-dashboard-showing--1772620128732-9410e7b4.png", imageAlt: "Compliance Management Suite" + }, { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/incident-response-center-showing-active--1772620128402-9af62160.png", imageAlt: "Incident Response Center"}, + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/incident-response-center-showing-active--1772620128402-9af62160.png", imageAlt: "Incident Response Center" + }, ]} /> @@ -79,13 +85,17 @@ export default function LandingPage() { tagAnimation="slide-up" features={[ { - id: "01", title: "Cybersecurity Training", description: "Empower your team with social engineering awareness, data protection compliance, and ISO 27001 certification programs.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/cybersecurity-training-platform-interfac-1772620130773-f6366d5c.png"}, + id: "01", title: "Cybersecurity Training", description: "Empower your team with social engineering awareness, data protection compliance, and ISO 27001 certification programs.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/cybersecurity-training-platform-interfac-1772620130773-f6366d5c.png" + }, { - id: "02", title: "Security Testing", description: "Identify vulnerabilities through penetration testing and comprehensive risk analysis before threats can exploit them.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/penetration-testing-and-vulnerability-as-1772620128636-8d8bca6b.png"}, + id: "02", title: "Security Testing", description: "Identify vulnerabilities through penetration testing and comprehensive risk analysis before threats can exploit them.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/penetration-testing-and-vulnerability-as-1772620128636-8d8bca6b.png" + }, { - id: "03", title: "Security Operations", description: "24/7 SOC services with AI-powered threat monitoring and rapid incident response capabilities.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/security-operations-center-soc-control-r-1772620128422-e019c043.png"}, + id: "03", title: "Security Operations", description: "24/7 SOC services with AI-powered threat monitoring and rapid incident response capabilities.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/security-operations-center-soc-control-r-1772620128422-e019c043.png" + }, { - id: "04", title: "Risk & Vendor Management", description: "Comprehensive vendor risk assessment and enterprise risk management for supply chain security.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/enterprise-risk-and-vendor-management-da-1772620129120-7e6e5b85.png"}, + id: "04", title: "Risk & Vendor Management", description: "Comprehensive vendor risk assessment and enterprise risk management for supply chain security.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/enterprise-risk-and-vendor-management-da-1772620129120-7e6e5b85.png" + }, ]} gridVariant="two-columns-alternating-heights" animationType="slide-up" @@ -104,13 +114,17 @@ export default function LandingPage() { tagAnimation="slide-up" features={[ { - id: "01", title: "AI-Powered Detection", description: "Machine learning algorithms identify emerging threats in real-time with 99.8% accuracy.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/machine-learning-threat-detection-system-1772620128677-8d716ed6.png"}, + id: "01", title: "AI-Powered Detection", description: "Machine learning algorithms identify emerging threats in real-time with 99.8% accuracy.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/machine-learning-threat-detection-system-1772620128677-8d716ed6.png" + }, { - id: "02", title: "24/7 Expert Monitoring", description: "Dedicated security analysts backed by AI provide continuous threat monitoring and incident response.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/24-7-security-monitoring-center-with-mul-1772620129019-8dbeda46.png"}, + id: "02", title: "24/7 Expert Monitoring", description: "Dedicated security analysts backed by AI provide continuous threat monitoring and incident response.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/24-7-security-monitoring-center-with-mul-1772620129019-8dbeda46.png" + }, { - id: "03", title: "Compliance Excellence", description: "Achieve and maintain ISO 27001, GDPR, HIPAA, and other regulatory compliance requirements.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/compliance-management-system-showing-mul-1772620129053-c15e27f3.png"}, + id: "03", title: "Compliance Excellence", description: "Achieve and maintain ISO 27001, GDPR, HIPAA, and other regulatory compliance requirements.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/compliance-management-system-showing-mul-1772620129053-c15e27f3.png" + }, { - id: "04", title: "Custom Solutions", description: "Tailored security frameworks designed specifically for your industry and risk profile.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/customizable-security-framework-interfac-1772620129853-315a8560.png"}, + id: "04", title: "Custom Solutions", description: "Tailored security frameworks designed specifically for your industry and risk profile.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/customizable-security-framework-interfac-1772620129853-315a8560.png" + }, ]} gridVariant="bento-grid" animationType="scale-rotate" @@ -130,19 +144,23 @@ export default function LandingPage() { metrics={[ { id: "1", value: "500+", title: "Enterprises Protected", items: [ - "Global coverage across 45+ countries", "Fortune 500 clients among our portfolio"], + "Global coverage across 45+ countries", "Fortune 500 clients among our portfolio" + ] }, { id: "2", value: "99.8%", title: "Threat Detection Accuracy", items: [ - "AI-powered continuous learning", "Zero-day vulnerability detection"], + "AI-powered continuous learning", "Zero-day vulnerability detection" + ] }, { id: "3", value: "15min", title: "Average Response Time", items: [ - "Fastest incident containment", "Minimized damage exposure"], + "Fastest incident containment", "Minimized damage exposure" + ] }, { id: "4", value: "100%", title: "Compliance Achievement", items: [ - "All regulatory standards met", "Continuous audit readiness"], + "All regulatory standards met", "Continuous audit readiness" + ] }, ]} animationType="slide-up" @@ -163,17 +181,23 @@ export default function LandingPage() { useInvertedBackground={false} testimonials={[ { - id: "1", name: "Sarah Chen", handle: "CISO, TechCorp Global", testimonial: "CyberGuard AI transformed our security operations. The AI-powered threat detection caught threats we'd never identified before. Exceptional service.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-a-confident-asi-1772620127320-4d037e99.png", imageAlt: "Sarah Chen"}, + id: "1", name: "Sarah Chen", handle: "CISO, TechCorp Global", testimonial: "CyberGuard AI transformed our security operations. The AI-powered threat detection caught threats we'd never identified before. Exceptional service.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-a-confident-asi-1772620127320-4d037e99.png", imageAlt: "Sarah Chen" + }, { - id: "2", name: "Michael Rodriguez", handle: "Chief Security Officer, FinanceHub", testimonial: "Their compliance expertise helped us achieve ISO 27001 in record time. The training programs are world-class and actually engaging.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-a-composed-lati-1772620129977-795318a5.png", imageAlt: "Michael Rodriguez"}, + id: "2", name: "Michael Rodriguez", handle: "Chief Security Officer, FinanceHub", testimonial: "Their compliance expertise helped us achieve ISO 27001 in record time. The training programs are world-class and actually engaging.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-a-composed-lati-1772620129977-795318a5.png", imageAlt: "Michael Rodriguez" + }, { - id: "3", name: "Emily Watson", handle: "IT Director, Healthcare Solutions", testimonial: "The 24/7 SOC support gives us peace of mind. Their incident response is faster and more effective than our previous provider. Highly recommended.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-a-competent-cau-1772620127288-be724292.png", imageAlt: "Emily Watson"}, + id: "3", name: "Emily Watson", handle: "IT Director, Healthcare Solutions", testimonial: "The 24/7 SOC support gives us peace of mind. Their incident response is faster and more effective than our previous provider. Highly recommended.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-a-competent-cau-1772620127288-be724292.png", imageAlt: "Emily Watson" + }, { - id: "4", name: "David Kim", handle: "Risk Manager, RetailMax International", testimonial: "Vendor risk management simplified. Their platform gives us visibility into our entire supply chain security posture. Game-changing.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-an-accomplished-1772620127671-d1fe11f1.png", imageAlt: "David Kim"}, + id: "4", name: "David Kim", handle: "Risk Manager, RetailMax International", testimonial: "Vendor risk management simplified. Their platform gives us visibility into our entire supply chain security posture. Game-changing.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-an-accomplished-1772620127671-d1fe11f1.png", imageAlt: "David Kim" + }, { - id: "5", name: "Lisa Patel", handle: "VP Security, CloudScale Inc", testimonial: "The penetration testing caught critical vulnerabilities in our infrastructure. Professional team, actionable insights, real value delivered.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-a-confident-ind-1772620127192-e8410745.png", imageAlt: "Lisa Patel"}, + id: "5", name: "Lisa Patel", handle: "VP Security, CloudScale Inc", testimonial: "The penetration testing caught critical vulnerabilities in our infrastructure. Professional team, actionable insights, real value delivered.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-a-confident-ind-1772620127192-e8410745.png", imageAlt: "Lisa Patel" + }, { - id: "6", name: "James Thompson", handle: "Chief Risk Officer, Enterprise Bank", testimonial: "Best investment in cybersecurity we've made. Their proactive approach and AI capabilities have reduced our risk profile significantly.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-an-experienced--1772620127767-c9f1f7dd.png", imageAlt: "James Thompson"}, + id: "6", name: "James Thompson", handle: "Chief Risk Officer, Enterprise Bank", testimonial: "Best investment in cybersecurity we've made. Their proactive approach and AI capabilities have reduced our risk profile significantly.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-an-experienced--1772620127767-c9f1f7dd.png", imageAlt: "James Thompson" + }, ]} speed={40} /> @@ -189,10 +213,12 @@ export default function LandingPage() { textboxLayout="default" buttonAnimation="opacity" useInvertedBackground={true} - names=[ - "TechCorp Global", "FinanceHub International", "Healthcare Solutions", "RetailMax Corp", "CloudScale Inc", "Enterprise Bank", "InnovateLabs", "SecureNet Systems"] + names={[ + "TechCorp Global", "FinanceHub International", "Healthcare Solutions", "RetailMax Corp", "CloudScale Inc", "Enterprise Bank", "InnovateLabs", "SecureNet Systems" + ]} logos={[ - "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/modern-tech-company-logo-design-for-tech-1772620126233-6155c7d3.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-finance-company-logo-for-fi-1772620127492-72a948d2.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/healthcare-solutions-company-logo-design-1772620126455-bfdb2276.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/retail-corporation-logo-for-retailmax-co-1772620126591-55b3ef79.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/cloud-infrastructure-company-logo-clouds-1772620128035-47154fff.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/enterprise-banking-logo-design-professio-1772620128620-33a751a9.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/innovation-focused-company-logo-innovate-1772620128875-7c8f4f5b.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/cybersecurity-company-logo-securenet-sys-1772620127478-f169a73f.png"]} + "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/modern-tech-company-logo-design-for-tech-1772620126233-6155c7d3.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-finance-company-logo-for-fi-1772620127492-72a948d2.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/healthcare-solutions-company-logo-design-1772620126455-bfdb2276.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/retail-corporation-logo-for-retailmax-co-1772620126591-55b3ef79.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/cloud-infrastructure-company-logo-clouds-1772620128035-47154fff.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/enterprise-banking-logo-design-professio-1772620128620-33a751a9.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/innovation-focused-company-logo-innovate-1772620128875-7c8f4f5b.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/cybersecurity-company-logo-securenet-sys-1772620127478-f169a73f.png" + ]} speed={40} showCard={true} /> @@ -208,17 +234,23 @@ export default function LandingPage() { animationType="smooth" faqs={[ { - id: "1", title: "How quickly can you detect threats?", content: "Our AI-powered monitoring systems detect threats in real-time, typically within minutes. Our average response time is 15 minutes from detection to containment."}, + id: "1", title: "How quickly can you detect threats?", content: "Our AI-powered monitoring systems detect threats in real-time, typically within minutes. Our average response time is 15 minutes from detection to containment." + }, { - id: "2", title: "Do you provide compliance training?", content: "Yes, we offer comprehensive training programs including Social Engineering Awareness, Data Protection & GDPR Compliance, and ISO/IEC 27001 Certification courses tailored to your organization."}, + id: "2", title: "Do you provide compliance training?", content: "Yes, we offer comprehensive training programs including Social Engineering Awareness, Data Protection & GDPR Compliance, and ISO/IEC 27001 Certification courses tailored to your organization." + }, { - id: "3", title: "What is included in your SOC services?", content: "Our 24/7 Security Operations Center provides continuous threat monitoring, incident response, threat analysis, and reporting with our team of expert security analysts supported by AI technology."}, + id: "3", title: "What is included in your SOC services?", content: "Our 24/7 Security Operations Center provides continuous threat monitoring, incident response, threat analysis, and reporting with our team of expert security analysts supported by AI technology." + }, { - id: "4", title: "Can you help us achieve compliance?", content: "Absolutely. We specialize in helping organizations achieve and maintain ISO 27001, GDPR, HIPAA, and other regulatory compliance requirements through our comprehensive consulting and training programs."}, + id: "4", title: "Can you help us achieve compliance?", content: "Absolutely. We specialize in helping organizations achieve and maintain ISO 27001, GDPR, HIPAA, and other regulatory compliance requirements through our comprehensive consulting and training programs." + }, { - id: "5", title: "How do you assess vendor security?", content: "Our vendor risk assessment process includes security questionnaire analysis, infrastructure review, compliance verification, and ongoing monitoring to ensure your supply chain remains secure."}, + id: "5", title: "How do you assess vendor security?", content: "Our vendor risk assessment process includes security questionnaire analysis, infrastructure review, compliance verification, and ongoing monitoring to ensure your supply chain remains secure." + }, { - id: "6", title: "What makes your AI different?", content: "Our proprietary AI algorithms are trained on millions of threat signatures and behavioral patterns, enabling 99.8% detection accuracy with minimal false positives and continuous learning capabilities."}, + id: "6", title: "What makes your AI different?", content: "Our proprietary AI algorithms are trained on millions of threat signatures and behavioral patterns, enabling 99.8% detection accuracy with minimal false positives and continuous learning capabilities." + }, ]} /> @@ -228,18 +260,22 @@ export default function LandingPage() { ctaTitle="Ready to Transform Your Security?" ctaDescription="Schedule a consultation with our security experts to discuss your organization's unique needs and how CyberGuard AI can protect your enterprise." ctaButton={{ - text: "Book a Demo", href: "https://calendly.com/cyberguard"}} + text: "Book a Demo", href: "https://calendly.com/cyberguard" + }} ctaIcon={Phone} useInvertedBackground={true} animationType="slide-up" accordionAnimationType="smooth" faqs={[ { - id: "1", title: "What is your typical implementation timeline?", content: "Implementation typically takes 2-4 weeks depending on your organization's size and existing infrastructure. Our team manages the entire process with minimal disruption to your operations."}, + id: "1", title: "What is your typical implementation timeline?", content: "Implementation typically takes 2-4 weeks depending on your organization's size and existing infrastructure. Our team manages the entire process with minimal disruption to your operations." + }, { - id: "2", title: "Do you offer 24/7 support?", content: "Yes, our enterprise support is available 24/7/365 with dedicated account managers and on-call security experts to address any concerns or incidents immediately."}, + id: "2", title: "Do you offer 24/7 support?", content: "Yes, our enterprise support is available 24/7/365 with dedicated account managers and on-call security experts to address any concerns or incidents immediately." + }, { - id: "3", title: "Can you integrate with our existing systems?", content: "Absolutely. Our platform integrates seamlessly with industry-standard security tools, SIEM solutions, and existing infrastructure through API connections and native integrations."}, + id: "3", title: "Can you integrate with our existing systems?", content: "Absolutely. Our platform integrates seamlessly with industry-standard security tools, SIEM solutions, and existing infrastructure through API connections and native integrations." + }, ]} /> @@ -251,13 +287,16 @@ export default function LandingPage() { socialLinks={[ { icon: Linkedin, - href: "https://linkedin.com/company/cyberguard-ai", ariaLabel: "LinkedIn"}, + href: "https://linkedin.com/company/cyberguard-ai", ariaLabel: "LinkedIn" + }, { icon: Twitter, - href: "https://twitter.com/cyberguard_ai", ariaLabel: "Twitter"}, + href: "https://twitter.com/cyberguard_ai", ariaLabel: "Twitter" + }, { icon: Mail, - href: "mailto:hello@cyberguard.ai", ariaLabel: "Email"}, + href: "mailto:hello@cyberguard.ai", ariaLabel: "Email" + }, ]} />