Merge version_1 into main #1

Merged
bender merged 1 commits from version_1 into main 2026-03-04 10:31:02 +00:00

View File

@@ -48,24 +48,30 @@ export default function LandingPage() {
tag="Enterprise Security"
tagIcon={Shield}
tagAnimation="slide-up"
background={{ variant: "floatingGradient" }}
background={{ variant: "sparkles-gradient" }}
buttons={[
{ text: "Explore Our Services", href: "#services" },
{ text: "Get Started", href: "#contact" },
]}
mediaItems={[
{
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/a-modern-sleek-cybersecurity-dashboard-i-1772620127603-dd037a7d.png", imageAlt: "Advanced Security Dashboard"},
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/a-modern-sleek-cybersecurity-dashboard-i-1772620127603-dd037a7d.png", imageAlt: "Advanced Security Dashboard"
},
{
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/advanced-threat-analysis-visualization-s-1772620128024-ac7ab622.png", imageAlt: "Real-time Threat Analysis"},
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/advanced-threat-analysis-visualization-s-1772620128024-ac7ab622.png", imageAlt: "Real-time Threat Analysis"
},
{
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/ai-powered-security-monitoring-system-in-1772620128486-231d2b65.png", imageAlt: "AI Monitoring System"},
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/ai-powered-security-monitoring-system-in-1772620128486-231d2b65.png", imageAlt: "AI Monitoring System"
},
{
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/data-protection-and-encryption-interface-1772620128649-2d897cf8.png", imageAlt: "Data Protection Interface"},
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/data-protection-and-encryption-interface-1772620128649-2d897cf8.png", imageAlt: "Data Protection Interface"
},
{
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/compliance-management-dashboard-showing--1772620128732-9410e7b4.png", imageAlt: "Compliance Management Suite"},
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/compliance-management-dashboard-showing--1772620128732-9410e7b4.png", imageAlt: "Compliance Management Suite"
},
{
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/incident-response-center-showing-active--1772620128402-9af62160.png", imageAlt: "Incident Response Center"},
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/incident-response-center-showing-active--1772620128402-9af62160.png", imageAlt: "Incident Response Center"
},
]}
/>
</div>
@@ -79,13 +85,17 @@ export default function LandingPage() {
tagAnimation="slide-up"
features={[
{
id: "01", title: "Cybersecurity Training", description: "Empower your team with social engineering awareness, data protection compliance, and ISO 27001 certification programs.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/cybersecurity-training-platform-interfac-1772620130773-f6366d5c.png"},
id: "01", title: "Cybersecurity Training", description: "Empower your team with social engineering awareness, data protection compliance, and ISO 27001 certification programs.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/cybersecurity-training-platform-interfac-1772620130773-f6366d5c.png"
},
{
id: "02", title: "Security Testing", description: "Identify vulnerabilities through penetration testing and comprehensive risk analysis before threats can exploit them.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/penetration-testing-and-vulnerability-as-1772620128636-8d8bca6b.png"},
id: "02", title: "Security Testing", description: "Identify vulnerabilities through penetration testing and comprehensive risk analysis before threats can exploit them.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/penetration-testing-and-vulnerability-as-1772620128636-8d8bca6b.png"
},
{
id: "03", title: "Security Operations", description: "24/7 SOC services with AI-powered threat monitoring and rapid incident response capabilities.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/security-operations-center-soc-control-r-1772620128422-e019c043.png"},
id: "03", title: "Security Operations", description: "24/7 SOC services with AI-powered threat monitoring and rapid incident response capabilities.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/security-operations-center-soc-control-r-1772620128422-e019c043.png"
},
{
id: "04", title: "Risk & Vendor Management", description: "Comprehensive vendor risk assessment and enterprise risk management for supply chain security.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/enterprise-risk-and-vendor-management-da-1772620129120-7e6e5b85.png"},
id: "04", title: "Risk & Vendor Management", description: "Comprehensive vendor risk assessment and enterprise risk management for supply chain security.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/enterprise-risk-and-vendor-management-da-1772620129120-7e6e5b85.png"
},
]}
gridVariant="two-columns-alternating-heights"
animationType="slide-up"
@@ -104,13 +114,17 @@ export default function LandingPage() {
tagAnimation="slide-up"
features={[
{
id: "01", title: "AI-Powered Detection", description: "Machine learning algorithms identify emerging threats in real-time with 99.8% accuracy.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/machine-learning-threat-detection-system-1772620128677-8d716ed6.png"},
id: "01", title: "AI-Powered Detection", description: "Machine learning algorithms identify emerging threats in real-time with 99.8% accuracy.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/machine-learning-threat-detection-system-1772620128677-8d716ed6.png"
},
{
id: "02", title: "24/7 Expert Monitoring", description: "Dedicated security analysts backed by AI provide continuous threat monitoring and incident response.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/24-7-security-monitoring-center-with-mul-1772620129019-8dbeda46.png"},
id: "02", title: "24/7 Expert Monitoring", description: "Dedicated security analysts backed by AI provide continuous threat monitoring and incident response.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/24-7-security-monitoring-center-with-mul-1772620129019-8dbeda46.png"
},
{
id: "03", title: "Compliance Excellence", description: "Achieve and maintain ISO 27001, GDPR, HIPAA, and other regulatory compliance requirements.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/compliance-management-system-showing-mul-1772620129053-c15e27f3.png"},
id: "03", title: "Compliance Excellence", description: "Achieve and maintain ISO 27001, GDPR, HIPAA, and other regulatory compliance requirements.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/compliance-management-system-showing-mul-1772620129053-c15e27f3.png"
},
{
id: "04", title: "Custom Solutions", description: "Tailored security frameworks designed specifically for your industry and risk profile.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/customizable-security-framework-interfac-1772620129853-315a8560.png"},
id: "04", title: "Custom Solutions", description: "Tailored security frameworks designed specifically for your industry and risk profile.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/customizable-security-framework-interfac-1772620129853-315a8560.png"
},
]}
gridVariant="bento-grid"
animationType="scale-rotate"
@@ -130,19 +144,23 @@ export default function LandingPage() {
metrics={[
{
id: "1", value: "500+", title: "Enterprises Protected", items: [
"Global coverage across 45+ countries", "Fortune 500 clients among our portfolio"],
"Global coverage across 45+ countries", "Fortune 500 clients among our portfolio"
]
},
{
id: "2", value: "99.8%", title: "Threat Detection Accuracy", items: [
"AI-powered continuous learning", "Zero-day vulnerability detection"],
"AI-powered continuous learning", "Zero-day vulnerability detection"
]
},
{
id: "3", value: "15min", title: "Average Response Time", items: [
"Fastest incident containment", "Minimized damage exposure"],
"Fastest incident containment", "Minimized damage exposure"
]
},
{
id: "4", value: "100%", title: "Compliance Achievement", items: [
"All regulatory standards met", "Continuous audit readiness"],
"All regulatory standards met", "Continuous audit readiness"
]
},
]}
animationType="slide-up"
@@ -163,17 +181,23 @@ export default function LandingPage() {
useInvertedBackground={false}
testimonials={[
{
id: "1", name: "Sarah Chen", handle: "CISO, TechCorp Global", testimonial: "CyberGuard AI transformed our security operations. The AI-powered threat detection caught threats we'd never identified before. Exceptional service.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-a-confident-asi-1772620127320-4d037e99.png", imageAlt: "Sarah Chen"},
id: "1", name: "Sarah Chen", handle: "CISO, TechCorp Global", testimonial: "CyberGuard AI transformed our security operations. The AI-powered threat detection caught threats we'd never identified before. Exceptional service.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-a-confident-asi-1772620127320-4d037e99.png", imageAlt: "Sarah Chen"
},
{
id: "2", name: "Michael Rodriguez", handle: "Chief Security Officer, FinanceHub", testimonial: "Their compliance expertise helped us achieve ISO 27001 in record time. The training programs are world-class and actually engaging.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-a-composed-lati-1772620129977-795318a5.png", imageAlt: "Michael Rodriguez"},
id: "2", name: "Michael Rodriguez", handle: "Chief Security Officer, FinanceHub", testimonial: "Their compliance expertise helped us achieve ISO 27001 in record time. The training programs are world-class and actually engaging.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-a-composed-lati-1772620129977-795318a5.png", imageAlt: "Michael Rodriguez"
},
{
id: "3", name: "Emily Watson", handle: "IT Director, Healthcare Solutions", testimonial: "The 24/7 SOC support gives us peace of mind. Their incident response is faster and more effective than our previous provider. Highly recommended.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-a-competent-cau-1772620127288-be724292.png", imageAlt: "Emily Watson"},
id: "3", name: "Emily Watson", handle: "IT Director, Healthcare Solutions", testimonial: "The 24/7 SOC support gives us peace of mind. Their incident response is faster and more effective than our previous provider. Highly recommended.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-a-competent-cau-1772620127288-be724292.png", imageAlt: "Emily Watson"
},
{
id: "4", name: "David Kim", handle: "Risk Manager, RetailMax International", testimonial: "Vendor risk management simplified. Their platform gives us visibility into our entire supply chain security posture. Game-changing.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-an-accomplished-1772620127671-d1fe11f1.png", imageAlt: "David Kim"},
id: "4", name: "David Kim", handle: "Risk Manager, RetailMax International", testimonial: "Vendor risk management simplified. Their platform gives us visibility into our entire supply chain security posture. Game-changing.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-an-accomplished-1772620127671-d1fe11f1.png", imageAlt: "David Kim"
},
{
id: "5", name: "Lisa Patel", handle: "VP Security, CloudScale Inc", testimonial: "The penetration testing caught critical vulnerabilities in our infrastructure. Professional team, actionable insights, real value delivered.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-a-confident-ind-1772620127192-e8410745.png", imageAlt: "Lisa Patel"},
id: "5", name: "Lisa Patel", handle: "VP Security, CloudScale Inc", testimonial: "The penetration testing caught critical vulnerabilities in our infrastructure. Professional team, actionable insights, real value delivered.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-a-confident-ind-1772620127192-e8410745.png", imageAlt: "Lisa Patel"
},
{
id: "6", name: "James Thompson", handle: "Chief Risk Officer, Enterprise Bank", testimonial: "Best investment in cybersecurity we've made. Their proactive approach and AI capabilities have reduced our risk profile significantly.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-an-experienced--1772620127767-c9f1f7dd.png", imageAlt: "James Thompson"},
id: "6", name: "James Thompson", handle: "Chief Risk Officer, Enterprise Bank", testimonial: "Best investment in cybersecurity we've made. Their proactive approach and AI capabilities have reduced our risk profile significantly.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-headshot-of-an-experienced--1772620127767-c9f1f7dd.png", imageAlt: "James Thompson"
},
]}
speed={40}
/>
@@ -189,10 +213,12 @@ export default function LandingPage() {
textboxLayout="default"
buttonAnimation="opacity"
useInvertedBackground={true}
names=[
"TechCorp Global", "FinanceHub International", "Healthcare Solutions", "RetailMax Corp", "CloudScale Inc", "Enterprise Bank", "InnovateLabs", "SecureNet Systems"]
names={[
"TechCorp Global", "FinanceHub International", "Healthcare Solutions", "RetailMax Corp", "CloudScale Inc", "Enterprise Bank", "InnovateLabs", "SecureNet Systems"
]}
logos={[
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/modern-tech-company-logo-design-for-tech-1772620126233-6155c7d3.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-finance-company-logo-for-fi-1772620127492-72a948d2.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/healthcare-solutions-company-logo-design-1772620126455-bfdb2276.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/retail-corporation-logo-for-retailmax-co-1772620126591-55b3ef79.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/cloud-infrastructure-company-logo-clouds-1772620128035-47154fff.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/enterprise-banking-logo-design-professio-1772620128620-33a751a9.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/innovation-focused-company-logo-innovate-1772620128875-7c8f4f5b.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/cybersecurity-company-logo-securenet-sys-1772620127478-f169a73f.png"]}
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/modern-tech-company-logo-design-for-tech-1772620126233-6155c7d3.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/professional-finance-company-logo-for-fi-1772620127492-72a948d2.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/healthcare-solutions-company-logo-design-1772620126455-bfdb2276.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/retail-corporation-logo-for-retailmax-co-1772620126591-55b3ef79.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/cloud-infrastructure-company-logo-clouds-1772620128035-47154fff.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/enterprise-banking-logo-design-professio-1772620128620-33a751a9.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/innovation-focused-company-logo-innovate-1772620128875-7c8f4f5b.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ATcVo69J87tmaBCX2GYPIrsC6x/cybersecurity-company-logo-securenet-sys-1772620127478-f169a73f.png"
]}
speed={40}
showCard={true}
/>
@@ -208,17 +234,23 @@ export default function LandingPage() {
animationType="smooth"
faqs={[
{
id: "1", title: "How quickly can you detect threats?", content: "Our AI-powered monitoring systems detect threats in real-time, typically within minutes. Our average response time is 15 minutes from detection to containment."},
id: "1", title: "How quickly can you detect threats?", content: "Our AI-powered monitoring systems detect threats in real-time, typically within minutes. Our average response time is 15 minutes from detection to containment."
},
{
id: "2", title: "Do you provide compliance training?", content: "Yes, we offer comprehensive training programs including Social Engineering Awareness, Data Protection & GDPR Compliance, and ISO/IEC 27001 Certification courses tailored to your organization."},
id: "2", title: "Do you provide compliance training?", content: "Yes, we offer comprehensive training programs including Social Engineering Awareness, Data Protection & GDPR Compliance, and ISO/IEC 27001 Certification courses tailored to your organization."
},
{
id: "3", title: "What is included in your SOC services?", content: "Our 24/7 Security Operations Center provides continuous threat monitoring, incident response, threat analysis, and reporting with our team of expert security analysts supported by AI technology."},
id: "3", title: "What is included in your SOC services?", content: "Our 24/7 Security Operations Center provides continuous threat monitoring, incident response, threat analysis, and reporting with our team of expert security analysts supported by AI technology."
},
{
id: "4", title: "Can you help us achieve compliance?", content: "Absolutely. We specialize in helping organizations achieve and maintain ISO 27001, GDPR, HIPAA, and other regulatory compliance requirements through our comprehensive consulting and training programs."},
id: "4", title: "Can you help us achieve compliance?", content: "Absolutely. We specialize in helping organizations achieve and maintain ISO 27001, GDPR, HIPAA, and other regulatory compliance requirements through our comprehensive consulting and training programs."
},
{
id: "5", title: "How do you assess vendor security?", content: "Our vendor risk assessment process includes security questionnaire analysis, infrastructure review, compliance verification, and ongoing monitoring to ensure your supply chain remains secure."},
id: "5", title: "How do you assess vendor security?", content: "Our vendor risk assessment process includes security questionnaire analysis, infrastructure review, compliance verification, and ongoing monitoring to ensure your supply chain remains secure."
},
{
id: "6", title: "What makes your AI different?", content: "Our proprietary AI algorithms are trained on millions of threat signatures and behavioral patterns, enabling 99.8% detection accuracy with minimal false positives and continuous learning capabilities."},
id: "6", title: "What makes your AI different?", content: "Our proprietary AI algorithms are trained on millions of threat signatures and behavioral patterns, enabling 99.8% detection accuracy with minimal false positives and continuous learning capabilities."
},
]}
/>
</div>
@@ -228,18 +260,22 @@ export default function LandingPage() {
ctaTitle="Ready to Transform Your Security?"
ctaDescription="Schedule a consultation with our security experts to discuss your organization's unique needs and how CyberGuard AI can protect your enterprise."
ctaButton={{
text: "Book a Demo", href: "https://calendly.com/cyberguard"}}
text: "Book a Demo", href: "https://calendly.com/cyberguard"
}}
ctaIcon={Phone}
useInvertedBackground={true}
animationType="slide-up"
accordionAnimationType="smooth"
faqs={[
{
id: "1", title: "What is your typical implementation timeline?", content: "Implementation typically takes 2-4 weeks depending on your organization's size and existing infrastructure. Our team manages the entire process with minimal disruption to your operations."},
id: "1", title: "What is your typical implementation timeline?", content: "Implementation typically takes 2-4 weeks depending on your organization's size and existing infrastructure. Our team manages the entire process with minimal disruption to your operations."
},
{
id: "2", title: "Do you offer 24/7 support?", content: "Yes, our enterprise support is available 24/7/365 with dedicated account managers and on-call security experts to address any concerns or incidents immediately."},
id: "2", title: "Do you offer 24/7 support?", content: "Yes, our enterprise support is available 24/7/365 with dedicated account managers and on-call security experts to address any concerns or incidents immediately."
},
{
id: "3", title: "Can you integrate with our existing systems?", content: "Absolutely. Our platform integrates seamlessly with industry-standard security tools, SIEM solutions, and existing infrastructure through API connections and native integrations."},
id: "3", title: "Can you integrate with our existing systems?", content: "Absolutely. Our platform integrates seamlessly with industry-standard security tools, SIEM solutions, and existing infrastructure through API connections and native integrations."
},
]}
/>
</div>
@@ -251,13 +287,16 @@ export default function LandingPage() {
socialLinks={[
{
icon: Linkedin,
href: "https://linkedin.com/company/cyberguard-ai", ariaLabel: "LinkedIn"},
href: "https://linkedin.com/company/cyberguard-ai", ariaLabel: "LinkedIn"
},
{
icon: Twitter,
href: "https://twitter.com/cyberguard_ai", ariaLabel: "Twitter"},
href: "https://twitter.com/cyberguard_ai", ariaLabel: "Twitter"
},
{
icon: Mail,
href: "mailto:hello@cyberguard.ai", ariaLabel: "Email"},
href: "mailto:hello@cyberguard.ai", ariaLabel: "Email"
},
]}
/>
</div>