Merge version_1 into main #2

Merged
bender merged 2 commits from version_1 into main 2026-03-03 14:09:50 +00:00
2 changed files with 34 additions and 48 deletions

View File

@@ -22,22 +22,21 @@ const inter = Inter({
export const metadata: Metadata = {
title: "Dragonfly Ops - Practical Cybersecurity Expertise", description: "100% hands-on cybersecurity operators. Tactical incident response, real-world expertise, proven results. For VCs, founders, and security-critical companies.", keywords: "cybersecurity, incident response, tactical security, hands-on operators, security expertise", metadataBase: new URL("https://dragonflyop.com"),
alternates: {
canonical: "https://dragonflyop.com"
},
canonical: "https://dragonflyop.com"},
openGraph: {
title: "Dragonfly Ops - Practical Cybersecurity Expertise", description: "Tactical incident response from battle-tested operators. 24/7 security operations for VCs and founders.", type: "website", siteName: "Dragonfly Ops", url: "https://dragonflyop.com", images: [
{
url: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARCSPnFH48UWw1pXuy7BCmuGdR/a-diverse-team-of-cybersecurity-professi-1772546436401-6e5bd574.png", alt: "Dragonfly Ops tactical team"
}
]
url: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARCSPnFH48UWw1pXuy7BCmuGdR/a-diverse-team-of-cybersecurity-professi-1772546436401-6e5bd574.png", alt: "Dragonfly Ops tactical team"},
],
},
twitter: {
card: "summary_large_image", title: "Dragonfly Ops - Practical Cybersecurity Expertise", description: "100% hands-on operators. Real expertise. Real results.", images: ["https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARCSPnFH48UWw1pXuy7BCmuGdR/a-diverse-team-of-cybersecurity-professi-1772546436401-6e5bd574.png"]
card: "summary_large_image", title: "Dragonfly Ops - Practical Cybersecurity Expertise", description: "100% hands-on operators. Real expertise. Real results.", images: [
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARCSPnFH48UWw1pXuy7BCmuGdR/a-diverse-team-of-cybersecurity-professi-1772546436401-6e5bd574.png"],
},
robots: {
index: true,
follow: true
}
follow: true,
},
};
export default function RootLayout({

View File

@@ -33,7 +33,7 @@ export default function LandingPage() {
{ name: "Problem", id: "problem" },
{ name: "Solution", id: "solution" },
{ name: "How It Works", id: "how-it-works" },
{ name: "FAQ", id: "faq" }
{ name: "FAQ", id: "faq" },
]}
button={{ text: "Find Operator", href: "#contact" }}
className="sticky top-0 z-50"
@@ -47,7 +47,7 @@ export default function LandingPage() {
description="Practical cybersecurity expertise. 100% hands-on operators, zero theory."
buttons={[
{ text: "Find Your Operator", href: "#contact" },
{ text: "See How It Works", href: "#how-it-works" }
{ text: "See How It Works", href: "#how-it-works" },
]}
buttonAnimation="slide-up"
background={{ variant: "sparkles-gradient" }}
@@ -80,8 +80,7 @@ export default function LandingPage() {
<div id="social-proof" data-section="social-proof">
<SocialProofOne
names={[
"Sequoia Capital", "Andreessen Horowitz", "Y Combinator", "Stripe", "Figma", "Notion", "Scale AI"
]}
"Sequoia Capital", "Andreessen Horowitz", "Y Combinator", "Stripe", "Figma", "Notion", "Scale AI"]}
title="Trusted by leading organizations"
description="Companies that demand real security expertise choose Dragonfly Ops."
tag="Proven Track Record"
@@ -100,28 +99,22 @@ export default function LandingPage() {
features={[
{
icon: Zap,
title: "Hands-On Operators", description: "Every team member has executed real incidents, made tactical decisions under pressure, and knows what works in production."
},
title: "Hands-On Operators", description: "Every team member has executed real incidents, made tactical decisions under pressure, and knows what works in production."},
{
icon: Shield,
title: "Battle-Tested", description: "Years of real-world incident response across Fortune 500s, startups, and critical infrastructure. Experience you can trust."
},
title: "Battle-Tested", description: "Years of real-world incident response across Fortune 500s, startups, and critical infrastructure. Experience you can trust."},
{
icon: Target,
title: "Tactical Focus", description: "We skip the theory and consultancy fluff. Direct action on your most critical threats, today."
},
title: "Tactical Focus", description: "We skip the theory and consultancy fluff. Direct action on your most critical threats, today."},
{
icon: AlertCircle,
title: "24/7 Response", description: "Always-on operations team ready to respond to threats at any hour. Your security doesn't sleep."
},
title: "24/7 Response", description: "Always-on operations team ready to respond to threats at any hour. Your security doesn't sleep."},
{
icon: TrendingUp,
title: "Measurable Outcomes", description: "Real metrics. Real ROI. You get visibility into every decision and its impact on your security posture."
},
title: "Measurable Outcomes", description: "Real metrics. Real ROI. You get visibility into every decision and its impact on your security posture."},
{
icon: Users,
title: "Strategic Partnership", description: "We're not vendors. We're an extension of your team, aligned with your business goals and security outcomes."
}
title: "Strategic Partnership", description: "We're not vendors. We're an extension of your team, aligned with your business goals and security outcomes."},
]}
tag="Why Dragonfly Ops"
animationType="slide-up"
@@ -140,17 +133,17 @@ export default function LandingPage() {
tag="How It Works"
metrics={[
{
id: "1", value: "1", title: "Assess", description: "Deep dive into your environment, threats, and operational readiness.", icon: Eye
id: "1", value: "1", title: "Assess", description: "Deep dive into your environment, threats, and operational readiness.", icon: Eye,
},
{
id: "2", value: "2", title: "Deploy", description: "Activate tactical response, coordinate operators, execute containment.", icon: Rocket
id: "2", value: "2", title: "Deploy", description: "Activate tactical response, coordinate operators, execute containment.", icon: Rocket,
},
{
id: "3", value: "3", title: "Monitor", description: "Real-time oversight, continuous threat hunting, active defense.", icon: Activity
id: "3", value: "3", title: "Monitor", description: "Real-time oversight, continuous threat hunting, active defense.", icon: Activity,
},
{
id: "4", value: "4", title: "Fortify", description: "Harden systems, establish continuous monitoring, build resilience.", icon: Lock
}
id: "4", value: "4", title: "Fortify", description: "Harden systems, establish continuous monitoring, build resilience.", icon: Lock,
},
]}
gridVariant="uniform-all-items-equal"
animationType="slide-up"
@@ -169,23 +162,17 @@ export default function LandingPage() {
tag="FAQ"
faqs={[
{
id: "1", title: "What makes Dragonfly Ops different from traditional cybersecurity consultants?", content: "We're operators first, consultants never. 100% of our team has hands-on incident response experience. We don't theorize—we execute. When threats emerge, our team moves fast and decisive based on battlefield expertise, not playbooks."
},
id: "1", title: "What makes Dragonfly Ops different from traditional cybersecurity consultants?", content: "We're operators first, consultants never. 100% of our team has hands-on incident response experience. We don't theorize—we execute. When threats emerge, our team moves fast and decisive based on battlefield expertise, not playbooks."},
{
id: "2", title: "What types of organizations do you work with?", content: "We partner with VCs and founders building security-critical products, Series A-C companies scaling their security operations, and established organizations needing real operational expertise. Whether you're a high-growth startup or an enterprise, we have operators ready to engage."
},
id: "2", title: "What types of organizations do you work with?", content: "We partner with VCs and founders building security-critical products, Series A-C companies scaling their security operations, and established organizations needing real operational expertise. Whether you're a high-growth startup or an enterprise, we have operators ready to engage."},
{
id: "3", title: "How fast can you respond to a security incident?", content: "Our team operates 24/7. Initial response typically begins within minutes of engagement. We prioritize speed and tactical effectiveness—getting your incident under control is our first objective."
},
id: "3", title: "How fast can you respond to a security incident?", content: "Our team operates 24/7. Initial response typically begins within minutes of engagement. We prioritize speed and tactical effectiveness—getting your incident under control is our first objective."},
{
id: "4", title: "Do you provide ongoing monitoring or just incident response?", content: "Both. We can engage as your active security operations team, managing continuous threat hunting and monitoring. Or we can deploy for specific incidents. Your choice. We're flexible and outcomes-focused."
},
id: "4", title: "Do you provide ongoing monitoring or just incident response?", content: "Both. We can engage as your active security operations team, managing continuous threat hunting and monitoring. Or we can deploy for specific incidents. Your choice. We're flexible and outcomes-focused."},
{
id: "5", title: "How do you measure success?", content: "Real metrics: mean time to detect (MTTD), mean time to respond (MTTR), threat containment effectiveness, and security posture improvements. We give you visibility into every decision and its measurable impact."
},
id: "5", title: "How do you measure success?", content: "Real metrics: mean time to detect (MTTD), mean time to respond (MTTR), threat containment effectiveness, and security posture improvements. We give you visibility into every decision and its measurable impact."},
{
id: "6", title: "What's the engagement model?", content: "We're flexible. Whether you need dedicated operators, on-call rapid response, incident retainers, or strategic security partnerships—we design engagements around your needs and budget. Talk to us about what works best for your organization."
}
id: "6", title: "What's the engagement model?", content: "We're flexible. Whether you need dedicated operators, on-call rapid response, incident retainers, or strategic security partnerships—we design engagements around your needs and budget. Talk to us about what works best for your organization."},
]}
faqsAnimation="slide-up"
textboxLayout="default"
@@ -218,23 +205,23 @@ export default function LandingPage() {
title: "Product", items: [
{ label: "Capabilities", href: "#solution" },
{ label: "How It Works", href: "#how-it-works" },
{ label: "Pricing", href: "#" }
]
{ label: "Pricing", href: "#" },
],
},
{
title: "Company", items: [
{ label: "About", href: "#" },
{ label: "Blog", href: "#" },
{ label: "Careers", href: "#" }
]
{ label: "Careers", href: "#" },
],
},
{
title: "Legal", items: [
{ label: "Privacy", href: "#" },
{ label: "Terms", href: "#" },
{ label: "Contact", href: "#contact" }
]
}
{ label: "Contact", href: "#contact" },
],
},
]}
className="border-t border-accent py-16"
logoTextClassName="text-2xl font-extrabold"