8 Commits

Author SHA1 Message Date
dbf165e45e Merge version_3 into main
Merge version_3 into main
2026-03-10 02:51:12 +00:00
cde8e18faa Update src/app/page.tsx 2026-03-10 02:51:08 +00:00
034dcc2002 Merge version_2 into main
Merge version_2 into main
2026-03-10 02:49:26 +00:00
db9c8487b1 Update src/app/page.tsx 2026-03-10 02:49:22 +00:00
0d05935e83 Update src/app/layout.tsx 2026-03-10 02:49:22 +00:00
7bc6105b37 Merge version_1 into main
Merge version_1 into main
2026-03-10 02:32:06 +00:00
41be473914 Merge version_1 into main
Merge version_1 into main
2026-03-10 02:31:21 +00:00
a109cd41ab Merge version_1 into main
Merge version_1 into main
2026-03-10 02:29:54 +00:00
2 changed files with 61 additions and 1441 deletions

File diff suppressed because it is too large Load Diff

View File

@@ -36,7 +36,8 @@ export default function LandingPage() {
{ name: "Contact", id: "contact" }, { name: "Contact", id: "contact" },
]} ]}
button={{ button={{
text: "Get Started", href: "https://demo.secureai.com"}} text: "Get Started", href: "https://demo.secureai.com"
}}
/> />
</div> </div>
@@ -56,16 +57,20 @@ export default function LandingPage() {
testimonials={[ testimonials={[
{ {
name: "Sarah Chen", handle: "CISO, TechCorp Global", testimonial: "SecureAI reduced our threat detection time by 87%. The AI engine catches threats we'd miss manually.", rating: 5, name: "Sarah Chen", handle: "CISO, TechCorp Global", testimonial: "SecureAI reduced our threat detection time by 87%. The AI engine catches threats we'd miss manually.", rating: 5,
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-confident-fem-1773109739730-ba513f7f.png?_wi=1"}, imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-confident-fem-1773109739730-ba513f7f.png?_wi=1"
},
{ {
name: "Michael Rodriguez", handle: "Security Director, FinanceNet", testimonial: "Outstanding platform. The automated incident response saved us during a critical breach attempt.", rating: 5, name: "Michael Rodriguez", handle: "Security Director, FinanceNet", testimonial: "Outstanding platform. The automated incident response saved us during a critical breach attempt.", rating: 5,
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-male-it-secur-1773109739376-e11ef082.png?_wi=1"}, imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-male-it-secur-1773109739376-e11ef082.png?_wi=1"
},
{ {
name: "Jennifer Walsh", handle: "Enterprise Architect, CloudScale Inc", testimonial: "The zero-trust implementation was seamless. Best security investment we've made.", rating: 5, name: "Jennifer Walsh", handle: "Enterprise Architect, CloudScale Inc", testimonial: "The zero-trust implementation was seamless. Best security investment we've made.", rating: 5,
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-confident-fem-1773109739591-f23f9ff2.png?_wi=1"}, imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-confident-fem-1773109739591-f23f9ff2.png?_wi=1"
},
{ {
name: "David Park", handle: "Security Operations Manager, RetailHub", testimonial: "Finally, a platform that understands real-world security challenges. Highly recommended.", rating: 5, name: "David Park", handle: "Security Operations Manager, RetailHub", testimonial: "Finally, a platform that understands real-world security challenges. Highly recommended.", rating: 5,
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-male-security-1773109739524-c8374d11.png?_wi=1"}, imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-male-security-1773109739524-c8374d11.png?_wi=1"
},
]} ]}
useInvertedBackground={false} useInvertedBackground={false}
background={{ variant: "glowing-orb" }} background={{ variant: "glowing-orb" }}
@@ -83,16 +88,20 @@ export default function LandingPage() {
features={[ features={[
{ {
id: 1, id: 1,
title: "AI-Powered Threat Detection", description: "Machine learning models analyze network patterns and identify anomalies in milliseconds with 99.9% accuracy", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/an-advanced-ai-neural-network-visualizat-1773109742068-453087e4.png", imageAlt: "AI neural network threat detection"}, title: "AI-Powered Threat Detection", description: "Detects threats 87% faster with 99.9% accuracy. Machine learning models analyze network patterns and identify anomalies in milliseconds.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/an-advanced-ai-neural-network-visualizat-1773109742068-453087e4.png", imageAlt: "AI neural network threat detection"
},
{ {
id: 2, id: 2,
title: "Zero-Trust Security", description: "Never trust, always verify. Our architecture validates every access request across your entire network infrastructure", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/a-sophisticated-zero-trust-security-arch-1773109741009-0c3ca813.png", imageAlt: "Zero-trust security architecture"}, title: "Zero-Trust Security", description: "Validates 100% of access requests across your entire network infrastructure. Never trust, always verify with every transaction.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/a-sophisticated-zero-trust-security-arch-1773109741009-0c3ca813.png", imageAlt: "Zero-trust security architecture"
},
{ {
id: 3, id: 3,
title: "Automated Incident Response", description: "Respond to threats instantly with automated workflows that contain breaches before impact occurs", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/an-automated-threat-response-and-inciden-1773109746488-2950fcd1.png", imageAlt: "Automated threat response workflow"}, title: "Automated Incident Response", description: "Responds in 47ms average from detection to containment. Automated workflows contain breaches before impact occurs.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/an-automated-threat-response-and-inciden-1773109746488-2950fcd1.png", imageAlt: "Automated threat response workflow"
},
{ {
id: 4, id: 4,
title: "Threat Intelligence", description: "Real-time intelligence feeds provide context on emerging threats and vulnerability landscapes", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/a-cutting-edge-cybersecurity-dashboard-w-1773109740728-43d85b10.png?_wi=2", imageAlt: "Threat intelligence dashboard"}, title: "Threat Intelligence", description: "Protects 500+ enterprise clients worldwide with real-time intelligence feeds on emerging threats and vulnerabilities.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/a-cutting-edge-cybersecurity-dashboard-w-1773109740728-43d85b10.png?_wi=2", imageAlt: "Threat intelligence dashboard"
},
]} ]}
buttons={[{ text: "Explore Features", href: "#features" }]} buttons={[{ text: "Explore Features", href: "#features" }]}
/> />
@@ -109,11 +118,14 @@ export default function LandingPage() {
animationType="slide-up" animationType="slide-up"
metrics={[ metrics={[
{ {
id: "1", value: "500+", title: "Enterprise Clients", description: "Organizations protecting critical infrastructure", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/a-professional-cybersecurity-expert-team-1773109740452-35f5a666.png", imageAlt: "Enterprise clients protected globally"}, id: "1", value: "500+", title: "Enterprise Clients", description: "Organizations protecting critical infrastructure", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/a-professional-cybersecurity-expert-team-1773109740452-35f5a666.png", imageAlt: "Enterprise clients protected globally"
},
{ {
id: "2", value: "99.9%", title: "Threat Detection Rate", description: "AI-driven accuracy in identifying advanced threats", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/an-enterprise-data-center-or-cloud-infra-1773109739977-5dbee40c.png", imageAlt: "Threat detection effectiveness"}, id: "2", value: "99.9%", title: "Threat Detection Rate", description: "AI-driven accuracy in identifying advanced threats", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/an-enterprise-data-center-or-cloud-infra-1773109739977-5dbee40c.png", imageAlt: "Threat detection effectiveness"
},
{ {
id: "3", value: "47ms", title: "Avg Response Time", description: "Automated incident response from detection to containment", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/a-cutting-edge-cybersecurity-dashboard-w-1773109740728-43d85b10.png?_wi=3", imageAlt: "Incident response automation"}, id: "3", value: "47ms", title: "Avg Response Time", description: "Automated incident response from detection to containment", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/a-cutting-edge-cybersecurity-dashboard-w-1773109740728-43d85b10.png?_wi=3", imageAlt: "Incident response automation"
},
]} ]}
/> />
</div> </div>
@@ -130,20 +142,24 @@ export default function LandingPage() {
testimonials={[ testimonials={[
{ {
id: "1", name: "Sarah Chen", role: "Chief Information Security Officer", company: "TechCorp Global", rating: 5, id: "1", name: "Sarah Chen", role: "Chief Information Security Officer", company: "TechCorp Global", rating: 5,
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-confident-fem-1773109739730-ba513f7f.png?_wi=2"}, imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-confident-fem-1773109739730-ba513f7f.png?_wi=2"
},
{ {
id: "2", name: "Michael Rodriguez", role: "Security Director", company: "FinanceNet Solutions", rating: 5, id: "2", name: "Michael Rodriguez", role: "Security Director", company: "FinanceNet Solutions", rating: 5,
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-male-it-secur-1773109739376-e11ef082.png?_wi=2"}, imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-male-it-secur-1773109739376-e11ef082.png?_wi=2"
},
{ {
id: "3", name: "Jennifer Walsh", role: "Enterprise Architect", company: "CloudScale Inc", rating: 5, id: "3", name: "Jennifer Walsh", role: "Enterprise Architect", company: "CloudScale Inc", rating: 5,
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-confident-fem-1773109739591-f23f9ff2.png?_wi=2"}, imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-confident-fem-1773109739591-f23f9ff2.png?_wi=2"
},
{ {
id: "4", name: "David Park", role: "Security Operations Manager", company: "RetailHub Corporation", rating: 5, id: "4", name: "David Park", role: "Security Operations Manager", company: "RetailHub Corporation", rating: 5,
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-male-security-1773109739524-c8374d11.png?_wi=2"}, imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-male-security-1773109739524-c8374d11.png?_wi=2"
},
]} ]}
kpiItems={[ kpiItems={[
{ value: "500+", label: "Enterprise Clients" },
{ value: "87%", label: "Faster threat detection" }, { value: "87%", label: "Faster threat detection" },
{ value: "92%", label: "Operational efficiency gains" },
{ value: "4.8/5", label: "Average client satisfaction" }, { value: "4.8/5", label: "Average client satisfaction" },
]} ]}
/> />
@@ -164,17 +180,23 @@ export default function LandingPage() {
mediaPosition="left" mediaPosition="left"
faqs={[ faqs={[
{ {
id: "1", title: "How quickly can we deploy SecureAI?", content: "Most deployments are completed within 2-4 weeks. Our integration team works with your infrastructure team to ensure seamless integration with existing security tools and minimal disruption to operations."}, id: "1", title: "How quickly can we deploy SecureAI?", content: "Most deployments are completed within 2-4 weeks. Our integration team works with your infrastructure team to ensure seamless integration with existing security tools and minimal disruption to operations."
},
{ {
id: "2", title: "Does SecureAI work with our existing security tools?", content: "Yes. SecureAI is designed to integrate with leading SIEM platforms, threat intelligence feeds, and security orchestration tools. Our API supports custom integrations for specialized environments."}, id: "2", title: "Does SecureAI work with our existing security tools?", content: "Yes. SecureAI is designed to integrate with leading SIEM platforms, threat intelligence feeds, and security orchestration tools. Our API supports custom integrations for specialized environments."
},
{ {
id: "3", title: "What compliance standards does SecureAI support?", content: "SecureAI meets requirements for SOC 2, ISO 27001, HIPAA, PCI-DSS, and GDPR. We provide detailed compliance reporting and audit trails for all regulatory requirements."}, id: "3", title: "What compliance standards does SecureAI support?", content: "SecureAI meets requirements for SOC 2, ISO 27001, HIPAA, PCI-DSS, and GDPR. We provide detailed compliance reporting and audit trails for all regulatory requirements."
},
{ {
id: "4", title: "How does the AI model improve over time?", content: "Our machine learning models are continuously trained on emerging threats and your organization's unique environment. The AI adapts to your specific threat landscape for increasingly accurate detection."}, id: "4", title: "How does the AI model improve over time?", content: "Our machine learning models are continuously trained on emerging threats and your organization's unique environment. The AI adapts to your specific threat landscape for increasingly accurate detection."
},
{ {
id: "5", title: "What support do you provide after deployment?", content: "We offer 24/7/365 support with dedicated security engineers, quarterly security reviews, threat briefings, and continuous platform updates. Premium tiers include personalized threat hunting services."}, id: "5", title: "What support do you provide after deployment?", content: "We offer 24/7/365 support with dedicated security engineers, quarterly security reviews, threat briefings, and continuous platform updates. Premium tiers include personalized threat hunting services."
},
{ {
id: "6", title: "Can we customize the platform for our needs?", content: "Absolutely. Enterprise customers can customize threat detection rules, response workflows, compliance templates, and integrate custom data sources to match their unique security requirements."} id: "6", title: "Can we customize the platform for our needs?", content: "Absolutely. Enterprise customers can customize threat detection rules, response workflows, compliance templates, and integrate custom data sources to match their unique security requirements."
}
]} ]}
/> />
</div> </div>
@@ -184,19 +206,24 @@ export default function LandingPage() {
ctaTitle="Ready to Transform Your Security?" ctaTitle="Ready to Transform Your Security?"
ctaDescription="Join enterprise leaders protecting their most critical assets with AI-powered cybersecurity" ctaDescription="Join enterprise leaders protecting their most critical assets with AI-powered cybersecurity"
ctaButton={{ ctaButton={{
text: "Schedule Security Consultation", href: "https://calendly.com/secureai"}} text: "Schedule Security Consultation", href: "https://calendly.com/secureai"
}}
ctaIcon={Zap} ctaIcon={Zap}
useInvertedBackground={true} useInvertedBackground={true}
animationType="slide-up" animationType="slide-up"
faqs={[ faqs={[
{ {
id: "1", title: "What's included in a consultation?", content: "A 30-minute session with our security strategist to assess your current environment, identify threats, and recommend a tailored SecureAI deployment strategy."}, id: "1", title: "What's included in a consultation?", content: "A 30-minute session with our security strategist to assess your current environment, identify threats, and recommend a tailored SecureAI deployment strategy."
},
{ {
id: "2", title: "How long is the trial period?", content: "Our free trial provides 30 days of full platform access with all enterprise features enabled. No credit card required. You'll get a dedicated onboarding specialist."}, id: "2", title: "How long is the trial period?", content: "Our free trial provides 30 days of full platform access with all enterprise features enabled. No credit card required. You'll get a dedicated onboarding specialist."
},
{ {
id: "3", title: "What are the typical costs?", content: "Pricing scales with organization size and threat environment complexity. Enterprise customers typically see ROI within 6-12 months through reduced incident response costs and prevented breaches."}, id: "3", title: "What are the typical costs?", content: "Pricing scales with organization size and threat environment complexity. Enterprise customers typically see ROI within 6-12 months through reduced incident response costs and prevented breaches."
},
{ {
id: "4", title: "Can we migrate from our current solution?", content: "Our migration team specializes in seamless transitions from competing platforms. We handle data migration, rule conversion, and parallel operation to ensure continuity."} id: "4", title: "Can we migrate from our current solution?", content: "Our migration team specializes in seamless transitions from competing platforms. We handle data migration, rule conversion, and parallel operation to ensure continuity."
}
]} ]}
/> />
</div> </div>