Merge version_2 into main #4
1419
src/app/layout.tsx
1419
src/app/layout.tsx
File diff suppressed because it is too large
Load Diff
@@ -36,7 +36,8 @@ export default function LandingPage() {
|
||||
{ name: "Contact", id: "contact" },
|
||||
]}
|
||||
button={{
|
||||
text: "Get Started", href: "https://demo.secureai.com"}}
|
||||
text: "Get Started", href: "https://demo.secureai.com"
|
||||
}}
|
||||
/>
|
||||
</div>
|
||||
|
||||
@@ -56,16 +57,20 @@ export default function LandingPage() {
|
||||
testimonials={[
|
||||
{
|
||||
name: "Sarah Chen", handle: "CISO, TechCorp Global", testimonial: "SecureAI reduced our threat detection time by 87%. The AI engine catches threats we'd miss manually.", rating: 5,
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-confident-fem-1773109739730-ba513f7f.png?_wi=1"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-confident-fem-1773109739730-ba513f7f.png?_wi=1"
|
||||
},
|
||||
{
|
||||
name: "Michael Rodriguez", handle: "Security Director, FinanceNet", testimonial: "Outstanding platform. The automated incident response saved us during a critical breach attempt.", rating: 5,
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-male-it-secur-1773109739376-e11ef082.png?_wi=1"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-male-it-secur-1773109739376-e11ef082.png?_wi=1"
|
||||
},
|
||||
{
|
||||
name: "Jennifer Walsh", handle: "Enterprise Architect, CloudScale Inc", testimonial: "The zero-trust implementation was seamless. Best security investment we've made.", rating: 5,
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-confident-fem-1773109739591-f23f9ff2.png?_wi=1"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-confident-fem-1773109739591-f23f9ff2.png?_wi=1"
|
||||
},
|
||||
{
|
||||
name: "David Park", handle: "Security Operations Manager, RetailHub", testimonial: "Finally, a platform that understands real-world security challenges. Highly recommended.", rating: 5,
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-male-security-1773109739524-c8374d11.png?_wi=1"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-male-security-1773109739524-c8374d11.png?_wi=1"
|
||||
},
|
||||
]}
|
||||
useInvertedBackground={false}
|
||||
background={{ variant: "glowing-orb" }}
|
||||
@@ -83,16 +88,20 @@ export default function LandingPage() {
|
||||
features={[
|
||||
{
|
||||
id: 1,
|
||||
title: "AI-Powered Threat Detection", description: "Machine learning models analyze network patterns and identify anomalies in milliseconds with 99.9% accuracy", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/an-advanced-ai-neural-network-visualizat-1773109742068-453087e4.png", imageAlt: "AI neural network threat detection"},
|
||||
title: "AI-Powered Threat Detection", description: "Detects threats 87% faster with 99.9% accuracy. Machine learning models analyze network patterns and identify anomalies in milliseconds.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/an-advanced-ai-neural-network-visualizat-1773109742068-453087e4.png", imageAlt: "AI neural network threat detection"
|
||||
},
|
||||
{
|
||||
id: 2,
|
||||
title: "Zero-Trust Security", description: "Never trust, always verify. Our architecture validates every access request across your entire network infrastructure", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/a-sophisticated-zero-trust-security-arch-1773109741009-0c3ca813.png", imageAlt: "Zero-trust security architecture"},
|
||||
title: "Zero-Trust Security", description: "Validates 100% of access requests across your entire network infrastructure. Never trust, always verify with every transaction.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/a-sophisticated-zero-trust-security-arch-1773109741009-0c3ca813.png", imageAlt: "Zero-trust security architecture"
|
||||
},
|
||||
{
|
||||
id: 3,
|
||||
title: "Automated Incident Response", description: "Respond to threats instantly with automated workflows that contain breaches before impact occurs", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/an-automated-threat-response-and-inciden-1773109746488-2950fcd1.png", imageAlt: "Automated threat response workflow"},
|
||||
title: "Automated Incident Response", description: "Responds in 47ms average from detection to containment. Automated workflows contain breaches before impact occurs.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/an-automated-threat-response-and-inciden-1773109746488-2950fcd1.png", imageAlt: "Automated threat response workflow"
|
||||
},
|
||||
{
|
||||
id: 4,
|
||||
title: "Threat Intelligence", description: "Real-time intelligence feeds provide context on emerging threats and vulnerability landscapes", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/a-cutting-edge-cybersecurity-dashboard-w-1773109740728-43d85b10.png?_wi=2", imageAlt: "Threat intelligence dashboard"},
|
||||
title: "Threat Intelligence", description: "Protects 500+ enterprise clients worldwide with real-time intelligence feeds on emerging threats and vulnerabilities.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/a-cutting-edge-cybersecurity-dashboard-w-1773109740728-43d85b10.png?_wi=2", imageAlt: "Threat intelligence dashboard"
|
||||
},
|
||||
]}
|
||||
buttons={[{ text: "Explore Features", href: "#features" }]}
|
||||
/>
|
||||
@@ -109,11 +118,14 @@ export default function LandingPage() {
|
||||
animationType="slide-up"
|
||||
metrics={[
|
||||
{
|
||||
id: "1", value: "500+", title: "Enterprise Clients", description: "Organizations protecting critical infrastructure", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/a-professional-cybersecurity-expert-team-1773109740452-35f5a666.png", imageAlt: "Enterprise clients protected globally"},
|
||||
id: "1", value: "500+", title: "Enterprise Clients", description: "Organizations protecting critical infrastructure", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/a-professional-cybersecurity-expert-team-1773109740452-35f5a666.png", imageAlt: "Enterprise clients protected globally"
|
||||
},
|
||||
{
|
||||
id: "2", value: "99.9%", title: "Threat Detection Rate", description: "AI-driven accuracy in identifying advanced threats", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/an-enterprise-data-center-or-cloud-infra-1773109739977-5dbee40c.png", imageAlt: "Threat detection effectiveness"},
|
||||
id: "2", value: "99.9%", title: "Threat Detection Rate", description: "AI-driven accuracy in identifying advanced threats", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/an-enterprise-data-center-or-cloud-infra-1773109739977-5dbee40c.png", imageAlt: "Threat detection effectiveness"
|
||||
},
|
||||
{
|
||||
id: "3", value: "47ms", title: "Avg Response Time", description: "Automated incident response from detection to containment", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/a-cutting-edge-cybersecurity-dashboard-w-1773109740728-43d85b10.png?_wi=3", imageAlt: "Incident response automation"},
|
||||
id: "3", value: "47ms", title: "Avg Response Time", description: "Automated incident response from detection to containment", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/a-cutting-edge-cybersecurity-dashboard-w-1773109740728-43d85b10.png?_wi=3", imageAlt: "Incident response automation"
|
||||
},
|
||||
]}
|
||||
/>
|
||||
</div>
|
||||
@@ -130,16 +142,20 @@ export default function LandingPage() {
|
||||
testimonials={[
|
||||
{
|
||||
id: "1", name: "Sarah Chen", role: "Chief Information Security Officer", company: "TechCorp Global", rating: 5,
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-confident-fem-1773109739730-ba513f7f.png?_wi=2"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-confident-fem-1773109739730-ba513f7f.png?_wi=2"
|
||||
},
|
||||
{
|
||||
id: "2", name: "Michael Rodriguez", role: "Security Director", company: "FinanceNet Solutions", rating: 5,
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-male-it-secur-1773109739376-e11ef082.png?_wi=2"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-male-it-secur-1773109739376-e11ef082.png?_wi=2"
|
||||
},
|
||||
{
|
||||
id: "3", name: "Jennifer Walsh", role: "Enterprise Architect", company: "CloudScale Inc", rating: 5,
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-confident-fem-1773109739591-f23f9ff2.png?_wi=2"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-confident-fem-1773109739591-f23f9ff2.png?_wi=2"
|
||||
},
|
||||
{
|
||||
id: "4", name: "David Park", role: "Security Operations Manager", company: "RetailHub Corporation", rating: 5,
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-male-security-1773109739524-c8374d11.png?_wi=2"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajch3l9nDNryRaG617sD5RJtkv/professional-headshot-of-a-male-security-1773109739524-c8374d11.png?_wi=2"
|
||||
},
|
||||
]}
|
||||
kpiItems={[
|
||||
{ value: "87%", label: "Faster threat detection" },
|
||||
@@ -164,17 +180,23 @@ export default function LandingPage() {
|
||||
mediaPosition="left"
|
||||
faqs={[
|
||||
{
|
||||
id: "1", title: "How quickly can we deploy SecureAI?", content: "Most deployments are completed within 2-4 weeks. Our integration team works with your infrastructure team to ensure seamless integration with existing security tools and minimal disruption to operations."},
|
||||
id: "1", title: "How quickly can we deploy SecureAI?", content: "Most deployments are completed within 2-4 weeks. Our integration team works with your infrastructure team to ensure seamless integration with existing security tools and minimal disruption to operations."
|
||||
},
|
||||
{
|
||||
id: "2", title: "Does SecureAI work with our existing security tools?", content: "Yes. SecureAI is designed to integrate with leading SIEM platforms, threat intelligence feeds, and security orchestration tools. Our API supports custom integrations for specialized environments."},
|
||||
id: "2", title: "Does SecureAI work with our existing security tools?", content: "Yes. SecureAI is designed to integrate with leading SIEM platforms, threat intelligence feeds, and security orchestration tools. Our API supports custom integrations for specialized environments."
|
||||
},
|
||||
{
|
||||
id: "3", title: "What compliance standards does SecureAI support?", content: "SecureAI meets requirements for SOC 2, ISO 27001, HIPAA, PCI-DSS, and GDPR. We provide detailed compliance reporting and audit trails for all regulatory requirements."},
|
||||
id: "3", title: "What compliance standards does SecureAI support?", content: "SecureAI meets requirements for SOC 2, ISO 27001, HIPAA, PCI-DSS, and GDPR. We provide detailed compliance reporting and audit trails for all regulatory requirements."
|
||||
},
|
||||
{
|
||||
id: "4", title: "How does the AI model improve over time?", content: "Our machine learning models are continuously trained on emerging threats and your organization's unique environment. The AI adapts to your specific threat landscape for increasingly accurate detection."},
|
||||
id: "4", title: "How does the AI model improve over time?", content: "Our machine learning models are continuously trained on emerging threats and your organization's unique environment. The AI adapts to your specific threat landscape for increasingly accurate detection."
|
||||
},
|
||||
{
|
||||
id: "5", title: "What support do you provide after deployment?", content: "We offer 24/7/365 support with dedicated security engineers, quarterly security reviews, threat briefings, and continuous platform updates. Premium tiers include personalized threat hunting services."},
|
||||
id: "5", title: "What support do you provide after deployment?", content: "We offer 24/7/365 support with dedicated security engineers, quarterly security reviews, threat briefings, and continuous platform updates. Premium tiers include personalized threat hunting services."
|
||||
},
|
||||
{
|
||||
id: "6", title: "Can we customize the platform for our needs?", content: "Absolutely. Enterprise customers can customize threat detection rules, response workflows, compliance templates, and integrate custom data sources to match their unique security requirements."}
|
||||
id: "6", title: "Can we customize the platform for our needs?", content: "Absolutely. Enterprise customers can customize threat detection rules, response workflows, compliance templates, and integrate custom data sources to match their unique security requirements."
|
||||
}
|
||||
]}
|
||||
/>
|
||||
</div>
|
||||
@@ -184,19 +206,24 @@ export default function LandingPage() {
|
||||
ctaTitle="Ready to Transform Your Security?"
|
||||
ctaDescription="Join enterprise leaders protecting their most critical assets with AI-powered cybersecurity"
|
||||
ctaButton={{
|
||||
text: "Schedule Security Consultation", href: "https://calendly.com/secureai"}}
|
||||
text: "Schedule Security Consultation", href: "https://calendly.com/secureai"
|
||||
}}
|
||||
ctaIcon={Zap}
|
||||
useInvertedBackground={true}
|
||||
animationType="slide-up"
|
||||
faqs={[
|
||||
{
|
||||
id: "1", title: "What's included in a consultation?", content: "A 30-minute session with our security strategist to assess your current environment, identify threats, and recommend a tailored SecureAI deployment strategy."},
|
||||
id: "1", title: "What's included in a consultation?", content: "A 30-minute session with our security strategist to assess your current environment, identify threats, and recommend a tailored SecureAI deployment strategy."
|
||||
},
|
||||
{
|
||||
id: "2", title: "How long is the trial period?", content: "Our free trial provides 30 days of full platform access with all enterprise features enabled. No credit card required. You'll get a dedicated onboarding specialist."},
|
||||
id: "2", title: "How long is the trial period?", content: "Our free trial provides 30 days of full platform access with all enterprise features enabled. No credit card required. You'll get a dedicated onboarding specialist."
|
||||
},
|
||||
{
|
||||
id: "3", title: "What are the typical costs?", content: "Pricing scales with organization size and threat environment complexity. Enterprise customers typically see ROI within 6-12 months through reduced incident response costs and prevented breaches."},
|
||||
id: "3", title: "What are the typical costs?", content: "Pricing scales with organization size and threat environment complexity. Enterprise customers typically see ROI within 6-12 months through reduced incident response costs and prevented breaches."
|
||||
},
|
||||
{
|
||||
id: "4", title: "Can we migrate from our current solution?", content: "Our migration team specializes in seamless transitions from competing platforms. We handle data migration, rule conversion, and parallel operation to ensure continuity."}
|
||||
id: "4", title: "Can we migrate from our current solution?", content: "Our migration team specializes in seamless transitions from competing platforms. We handle data migration, rule conversion, and parallel operation to ensure continuity."
|
||||
}
|
||||
]}
|
||||
/>
|
||||
</div>
|
||||
|
||||
Reference in New Issue
Block a user