Merge version_1 into main #3

Merged
bender merged 1 commits from version_1 into main 2026-03-03 14:10:40 +00:00

View File

@@ -80,7 +80,8 @@ export default function LandingPage() {
<div id="social-proof" data-section="social-proof">
<SocialProofOne
names={[
"Sequoia Capital", "Andreessen Horowitz", "Y Combinator", "Stripe", "Figma", "Notion", "Scale AI"]}
"Sequoia Capital", "Andreessen Horowitz", "Y Combinator", "Stripe", "Figma", "Notion", "Scale AI"
]}
title="Trusted by leading organizations"
description="Companies that demand real security expertise choose Dragonfly Ops."
tag="Proven Track Record"
@@ -99,22 +100,28 @@ export default function LandingPage() {
features={[
{
icon: Zap,
title: "Hands-On Operators", description: "Every team member has executed real incidents, made tactical decisions under pressure, and knows what works in production."},
title: "Hands-On Operators", description: "Every team member has executed real incidents, made tactical decisions under pressure, and knows what works in production."
},
{
icon: Shield,
title: "Battle-Tested", description: "Years of real-world incident response across Fortune 500s, startups, and critical infrastructure. Experience you can trust."},
title: "Battle-Tested", description: "Years of real-world incident response across Fortune 500s, startups, and critical infrastructure. Experience you can trust."
},
{
icon: Target,
title: "Tactical Focus", description: "We skip the theory and consultancy fluff. Direct action on your most critical threats, today."},
title: "Tactical Focus", description: "We skip the theory and consultancy fluff. Direct action on your most critical threats, today."
},
{
icon: AlertCircle,
title: "24/7 Response", description: "Always-on operations team ready to respond to threats at any hour. Your security doesn't sleep."},
title: "24/7 Response", description: "Always-on operations team ready to respond to threats at any hour. Your security doesn't sleep."
},
{
icon: TrendingUp,
title: "Measurable Outcomes", description: "Real metrics. Real ROI. You get visibility into every decision and its impact on your security posture."},
title: "Measurable Outcomes", description: "Real metrics. Real ROI. You get visibility into every decision and its impact on your security posture."
},
{
icon: Users,
title: "Strategic Partnership", description: "We're not vendors. We're an extension of your team, aligned with your business goals and security outcomes."},
title: "Strategic Partnership", description: "We're not vendors. We're an extension of your team, aligned with your business goals and security outcomes."
},
]}
tag="Why Dragonfly Ops"
animationType="slide-up"
@@ -162,17 +169,23 @@ export default function LandingPage() {
tag="FAQ"
faqs={[
{
id: "1", title: "What makes Dragonfly Ops different from traditional cybersecurity consultants?", content: "We're operators first, consultants never. 100% of our team has hands-on incident response experience. We don't theorize—we execute. When threats emerge, our team moves fast and decisive based on battlefield expertise, not playbooks."},
id: "1", title: "What makes Dragonfly Ops different from traditional cybersecurity consultants?", content: "We're operators first, consultants never. 100% of our team has hands-on incident response experience. We don't theorize—we execute. When threats emerge, our team moves fast and decisive based on battlefield expertise, not playbooks."
},
{
id: "2", title: "What types of organizations do you work with?", content: "We partner with VCs and founders building security-critical products, Series A-C companies scaling their security operations, and established organizations needing real operational expertise. Whether you're a high-growth startup or an enterprise, we have operators ready to engage."},
id: "2", title: "What types of organizations do you work with?", content: "We partner with VCs and founders building security-critical products, Series A-C companies scaling their security operations, and established organizations needing real operational expertise. Whether you're a high-growth startup or an enterprise, we have operators ready to engage."
},
{
id: "3", title: "How fast can you respond to a security incident?", content: "Our team operates 24/7. Initial response typically begins within minutes of engagement. We prioritize speed and tactical effectiveness—getting your incident under control is our first objective."},
id: "3", title: "How fast can you respond to a security incident?", content: "Our team operates 24/7. Initial response typically begins within minutes of engagement. We prioritize speed and tactical effectiveness—getting your incident under control is our first objective."
},
{
id: "4", title: "Do you provide ongoing monitoring or just incident response?", content: "Both. We can engage as your active security operations team, managing continuous threat hunting and monitoring. Or we can deploy for specific incidents. Your choice. We're flexible and outcomes-focused."},
id: "4", title: "Do you provide ongoing monitoring or just incident response?", content: "Both. We can engage as your active security operations team, managing continuous threat hunting and monitoring. Or we can deploy for specific incidents. Your choice. We're flexible and outcomes-focused."
},
{
id: "5", title: "How do you measure success?", content: "Real metrics: mean time to detect (MTTD), mean time to respond (MTTR), threat containment effectiveness, and security posture improvements. We give you visibility into every decision and its measurable impact."},
id: "5", title: "How do you measure success?", content: "Real metrics: mean time to detect (MTTD), mean time to respond (MTTR), threat containment effectiveness, and security posture improvements. We give you visibility into every decision and its measurable impact."
},
{
id: "6", title: "What's the engagement model?", content: "We're flexible. Whether you need dedicated operators, on-call rapid response, incident retainers, or strategic security partnerships—we design engagements around your needs and budget. Talk to us about what works best for your organization."},
id: "6", title: "What's the engagement model?", content: "We're flexible. Whether you need dedicated operators, on-call rapid response, incident retainers, or strategic security partnerships—we design engagements around your needs and budget. Talk to us about what works best for your organization."
},
]}
faqsAnimation="slide-up"
textboxLayout="default"