Update src/app/page.tsx
This commit is contained in:
@@ -73,17 +73,23 @@ export default function LandingPage() {
|
||||
buttonAnimation="slide-up"
|
||||
carouselItems={[
|
||||
{
|
||||
id: "1", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/modern-ai-security-dashboard-interface-w-1772841223948-e2c85504.png", imageAlt: "AI Defence Dashboard Interface"},
|
||||
id: "1", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/modern-ai-security-dashboard-interface-w-1772841223948-e2c85504.png", imageAlt: "AI Defence Dashboard Interface"
|
||||
},
|
||||
{
|
||||
id: "2", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/cybersecurity-threat-detection-visualiza-1772841225004-d7875ac7.png", imageAlt: "Real-time Threat Detection"},
|
||||
id: "2", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/cybersecurity-threat-detection-visualiza-1772841225004-d7875ac7.png", imageAlt: "Real-time Threat Detection"
|
||||
},
|
||||
{
|
||||
id: "3", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/security-analysis-platform-showing-detai-1772841224467-e81c5d4f.png", imageAlt: "Security Analysis Platform"},
|
||||
id: "3", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/security-analysis-platform-showing-detai-1772841224467-e81c5d4f.png", imageAlt: "Security Analysis Platform"
|
||||
},
|
||||
{
|
||||
id: "4", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/network-protection-system-interface-show-1772841224668-dde06bd8.png", imageAlt: "Network Protection System"},
|
||||
id: "4", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/network-protection-system-interface-show-1772841224668-dde06bd8.png", imageAlt: "Network Protection System"
|
||||
},
|
||||
{
|
||||
id: "5", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/ai-monitoring-interface-showing-machine--1772841227199-d1ed5fc8.png", imageAlt: "AI Monitoring Interface"},
|
||||
id: "5", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/ai-monitoring-interface-showing-machine--1772841227199-d1ed5fc8.png", imageAlt: "AI Monitoring Interface"
|
||||
},
|
||||
{
|
||||
id: "6", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/automated-threat-response-interface-show-1772841225107-a10ffebc.png", imageAlt: "Automated Threat Response"},
|
||||
id: "6", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/automated-threat-response-interface-show-1772841225107-a10ffebc.png", imageAlt: "Automated Threat Response"
|
||||
},
|
||||
]}
|
||||
autoPlay={true}
|
||||
autoPlayInterval={4000}
|
||||
@@ -151,22 +157,28 @@ export default function LandingPage() {
|
||||
features={[
|
||||
{
|
||||
id: "1", title: "Intelligent Threat Detection Engine", tags: ["AI", "Real-time", "24/7"],
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/advanced-threat-detection-system-visuali-1772841223792-e010cc78.png", imageAlt: "Threat Detection System"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/advanced-threat-detection-system-visuali-1772841223792-e010cc78.png", imageAlt: "Threat Detection System"
|
||||
},
|
||||
{
|
||||
id: "2", title: "Predictive Vulnerability Analysis", tags: ["ML", "Predictive", "Proactive"],
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/vulnerability-analysis-and-scanning-inte-1772841224680-4cfa6075.png", imageAlt: "Vulnerability Analysis"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/vulnerability-analysis-and-scanning-inte-1772841224680-4cfa6075.png", imageAlt: "Vulnerability Analysis"
|
||||
},
|
||||
{
|
||||
id: "3", title: "Automated Incident Response", tags: ["Automation", "Speed", "Efficiency"],
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/automated-incident-response-system-in-ac-1772841224654-1917bc40.png", imageAlt: "Incident Response System"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/automated-incident-response-system-in-ac-1772841224654-1917bc40.png", imageAlt: "Incident Response System"
|
||||
},
|
||||
{
|
||||
id: "4", title: "Behavioral Analytics Platform", tags: ["Analytics", "Insights", "Intelligence"],
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/behavioral-analytics-platform-showing-us-1772841224567-0575c019.png", imageAlt: "Behavioral Analytics"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/behavioral-analytics-platform-showing-us-1772841224567-0575c019.png", imageAlt: "Behavioral Analytics"
|
||||
},
|
||||
{
|
||||
id: "5", title: "API Security Gateway", tags: ["API", "Gateway", "Protection"],
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/api-security-gateway-interface-showing-a-1772841223895-2ff32303.png", imageAlt: "API Security Gateway"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/api-security-gateway-interface-showing-a-1772841223895-2ff32303.png", imageAlt: "API Security Gateway"
|
||||
},
|
||||
{
|
||||
id: "6", title: "Compliance Automation Suite", tags: ["Compliance", "Automated", "Auditable"],
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/compliance-automation-dashboard-showing--1772841224241-3ef271c5.png", imageAlt: "Compliance Automation"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/compliance-automation-dashboard-showing--1772841224241-3ef271c5.png", imageAlt: "Compliance Automation"
|
||||
},
|
||||
]}
|
||||
ariaLabel="Features Section"
|
||||
containerClassName="w-full"
|
||||
@@ -196,13 +208,17 @@ export default function LandingPage() {
|
||||
animationType="scale-rotate"
|
||||
metrics={[
|
||||
{
|
||||
id: "1", value: "99.97%", title: "Threat Detection Rate", description: "Zero-day threats caught before exploitation", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/performance-metrics-visualization-showin-1772841223743-41d91aa8.png", imageAlt: "Threat Detection Performance"},
|
||||
id: "1", value: "99.97%", title: "Threat Detection Rate", description: "Zero-day threats caught before exploitation", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/performance-metrics-visualization-showin-1772841223743-41d91aa8.png", imageAlt: "Threat Detection Performance"
|
||||
},
|
||||
{
|
||||
id: "2", value: "2.3ms", title: "Average Response Time", description: "Millisecond-level threat neutralization", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/response-time-performance-metrics-showin-1772841223506-ffcd8de1.png", imageAlt: "Response Time Metrics"},
|
||||
id: "2", value: "2.3ms", title: "Average Response Time", description: "Millisecond-level threat neutralization", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/response-time-performance-metrics-showin-1772841223506-ffcd8de1.png", imageAlt: "Response Time Metrics"
|
||||
},
|
||||
{
|
||||
id: "3", value: "500+", title: "Enterprise Clients", description: "Global organizations trusting Pymander", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/enterprise-client-network-visualization--1772841224274-18c10bf7.png", imageAlt: "Enterprise Client Base"},
|
||||
id: "3", value: "500+", title: "Enterprise Clients", description: "Global organizations trusting Pymander", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/enterprise-client-network-visualization--1772841224274-18c10bf7.png", imageAlt: "Enterprise Client Base"
|
||||
},
|
||||
{
|
||||
id: "4", value: "$2.4B", title: "Assets Protected", description: "Cumulative value secured annually", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/protected-assets-value-visualization-sho-1772841224552-301ba557.png", imageAlt: "Protected Assets Value"},
|
||||
id: "4", value: "$2.4B", title: "Assets Protected", description: "Cumulative value secured annually", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/protected-assets-value-visualization-sho-1772841224552-301ba557.png", imageAlt: "Protected Assets Value"
|
||||
},
|
||||
]}
|
||||
ariaLabel="Metrics Section"
|
||||
containerClassName="w-full"
|
||||
@@ -227,9 +243,11 @@ export default function LandingPage() {
|
||||
textboxLayout="default"
|
||||
useInvertedBackground={false}
|
||||
names={[
|
||||
"Microsoft", "Google", "Amazon", "Goldman Sachs", "JPMorgan Chase", "Cisco", "IBM", "Oracle"]}
|
||||
"Microsoft", "Google", "Amazon", "Goldman Sachs", "JPMorgan Chase", "Cisco", "IBM", "Oracle"
|
||||
]}
|
||||
logos={[
|
||||
"http://img.b2bpic.net/free-vector/gradient-colored-glass-logo-template_23-2149001606.jpg", "http://img.b2bpic.net/free-vector/modern-conectivity-logo-template_23-2147934056.jpg", "http://img.b2bpic.net/free-photo/woman-holding-laptop-her-lap-shopping-bags_23-2148674983.jpg", "http://img.b2bpic.net/free-vector/gradient-accounting-logo-template_23-2148854301.jpg", "http://img.b2bpic.net/free-vector/pack-president-s-day-labels_23-2148402886.jpg", "http://img.b2bpic.net/free-vector/artificial-intelligence-elements-collection-flat-style_23-2147869043.jpg", "http://img.b2bpic.net/free-vector/flat-design-technology-landing-page-template_23-2149200405.jpg", "http://img.b2bpic.net/free-vector/logo-company-called-company_779267-2432.jpg"]}
|
||||
"http://img.b2bpic.net/free-vector/gradient-colored-glass-logo-template_23-2149001606.jpg", "http://img.b2bpic.net/free-vector/modern-conectivity-logo-template_23-2147934056.jpg", "http://img.b2bpic.net/free-photo/woman-holding-laptop-her-lap-shopping-bags_23-2148674983.jpg", "http://img.b2bpic.net/free-vector/gradient-accounting-logo-template_23-2148854301.jpg", "http://img.b2bpic.net/free-vector/pack-president-s-day-labels_23-2148402886.jpg", "http://img.b2bpic.net/free-vector/artificial-intelligence-elements-collection-flat-style_23-2147869043.jpg", "http://img.b2bpic.net/free-vector/flat-design-technology-landing-page-template_23-2149200405.jpg", "http://img.b2bpic.net/free-vector/logo-company-called-company_779267-2432.jpg"
|
||||
]}
|
||||
speed={40}
|
||||
showCard={true}
|
||||
ariaLabel="Social Proof Section"
|
||||
@@ -255,17 +273,20 @@ export default function LandingPage() {
|
||||
{
|
||||
id: "starter", badge: "For Growing Teams", badgeIcon: Zap,
|
||||
price: "$5,000/mo", subtitle: "Essential AI defence for emerging threats", features: [
|
||||
"Up to 10 systems monitored", "Real-time threat detection", "24/5 support", "Monthly threat reports", "Basic incident response"],
|
||||
"Up to 10 systems monitored", "Real-time threat detection", "24/5 support", "Monthly threat reports", "Basic incident response"
|
||||
],
|
||||
},
|
||||
{
|
||||
id: "professional", badge: "Most Popular", badgeIcon: Star,
|
||||
price: "$15,000/mo", subtitle: "Comprehensive security for enterprises", features: [
|
||||
"Unlimited systems monitored", "Advanced AI threat detection", "24/7 premium support", "Real-time threat intelligence", "Automated incident response", "Custom integrations", "Quarterly security reviews"],
|
||||
"Unlimited systems monitored", "Advanced AI threat detection", "24/7 premium support", "Real-time threat intelligence", "Automated incident response", "Custom integrations", "Quarterly security reviews"
|
||||
],
|
||||
},
|
||||
{
|
||||
id: "enterprise", badge: "Maximum Protection", badgeIcon: Crown,
|
||||
price: "Custom", subtitle: "White-glove security for critical infrastructure", features: [
|
||||
"Unlimited everything", "Dedicated security team", "On-premise deployment option", "Custom AI model training", "Priority threat response (< 1min)", "Compliance auditing included", "Penetration testing included"],
|
||||
"Unlimited everything", "Dedicated security team", "On-premise deployment option", "Custom AI model training", "Priority threat response (< 1min)", "Compliance auditing included", "Penetration testing included"
|
||||
],
|
||||
},
|
||||
]}
|
||||
ariaLabel="Pricing Section"
|
||||
@@ -298,22 +319,28 @@ export default function LandingPage() {
|
||||
testimonials={[
|
||||
{
|
||||
id: "1", name: "Sarah Chen", role: "Chief Security Officer", company: "Global Finance Corp", rating: 5,
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/professional-headshot-of-a-female-cybers-1772841223921-245a4750.png"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/professional-headshot-of-a-female-cybers-1772841223921-245a4750.png"
|
||||
},
|
||||
{
|
||||
id: "2", name: "James Mitchell", role: "Head of Cybersecurity", company: "TechCorp Industries", rating: 5,
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/professional-headshot-of-a-male-cybersec-1772841222864-50e23afd.png"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/professional-headshot-of-a-male-cybersec-1772841222864-50e23afd.png"
|
||||
},
|
||||
{
|
||||
id: "3", name: "Elena Rodriguez", role: "Director of IT Security", company: "Healthcare Systems Inc", rating: 5,
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/professional-headshot-of-a-female-it-sec-1772841224225-cd497c8c.png"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/professional-headshot-of-a-female-it-sec-1772841224225-cd497c8c.png"
|
||||
},
|
||||
{
|
||||
id: "4", name: "David Kumar", role: "Risk Management Officer", company: "Insurance & Assurance Group", rating: 5,
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/professional-headshot-of-a-male-risk-man-1772841222828-6828b56f.png"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/professional-headshot-of-a-male-risk-man-1772841222828-6828b56f.png"
|
||||
},
|
||||
{
|
||||
id: "5", name: "Maria Gonzalez", role: "Security Engineering Lead", company: "Cloud Infrastructure Solutions", rating: 5,
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/professional-headshot-of-a-female-securi-1772841223175-fcc2d0d5.png"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/professional-headshot-of-a-female-securi-1772841223175-fcc2d0d5.png"
|
||||
},
|
||||
{
|
||||
id: "6", name: "Thomas Anderson", role: "Chief Technology Officer", company: "Enterprise Systems Ltd", rating: 5,
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/professional-headshot-of-a-male-cto-in-b-1772841223291-e9d4bb79.png"},
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Aaqco4UdDCp2hctCTmfyC30nAH/professional-headshot-of-a-male-cto-in-b-1772841223291-e9d4bb79.png"
|
||||
},
|
||||
]}
|
||||
kpiItems={[
|
||||
{ value: "180+", label: "Security Incidents Prevented" },
|
||||
@@ -342,17 +369,23 @@ export default function LandingPage() {
|
||||
<FaqSplitText
|
||||
faqs={[
|
||||
{
|
||||
id: "1", title: "How does Pymander's AI detect zero-day threats?", content: "Pymander uses advanced machine learning models trained on millions of threat signatures and behavioral patterns. Our AI doesn't rely on known threat definitions—instead, it analyzes behavior anomalies, network patterns, and system activities to identify previously unseen attack vectors in real-time."},
|
||||
id: "1", title: "How does Pymander's AI detect zero-day threats?", content: "Pymander uses advanced machine learning models trained on millions of threat signatures and behavioral patterns. Our AI doesn't rely on known threat definitions—instead, it analyzes behavior anomalies, network patterns, and system activities to identify previously unseen attack vectors in real-time."
|
||||
},
|
||||
{
|
||||
id: "2", title: "Is Pymander compliant with major security standards?", content: "Yes. Pymander maintains full compliance with ISO 27001, SOC 2 Type II, GDPR, HIPAA, and PCI DSS. Our platform is regularly audited by third-party security firms and we provide comprehensive compliance reporting tailored to your organization's requirements."},
|
||||
id: "2", title: "Is Pymander compliant with major security standards?", content: "Yes. Pymander maintains full compliance with ISO 27001, SOC 2 Type II, GDPR, HIPAA, and PCI DSS. Our platform is regularly audited by third-party security firms and we provide comprehensive compliance reporting tailored to your organization's requirements."
|
||||
},
|
||||
{
|
||||
id: "3", title: "How quickly does Pymander respond to threats?", content: "Average response time is 2.3 milliseconds from threat detection to neutralization. This sub-second latency prevents most attacks from causing any damage. For enterprise plans, we guarantee response times under 1 minute for critical threats with dedicated response teams."},
|
||||
id: "3", title: "How quickly does Pymander respond to threats?", content: "Average response time is 2.3 milliseconds from threat detection to neutralization. This sub-second latency prevents most attacks from causing any damage. For enterprise plans, we guarantee response times under 1 minute for critical threats with dedicated response teams."
|
||||
},
|
||||
{
|
||||
id: "4", title: "Can we deploy Pymander on-premises?", content: "Enterprise customers can request on-premises deployment. We offer both cloud and hybrid deployment models with identical feature sets. On-premises deployments include dedicated infrastructure, custom configurations, and your choice of monitoring location."},
|
||||
id: "4", title: "Can we deploy Pymander on-premises?", content: "Enterprise customers can request on-premises deployment. We offer both cloud and hybrid deployment models with identical feature sets. On-premises deployments include dedicated infrastructure, custom configurations, and your choice of monitoring location."
|
||||
},
|
||||
{
|
||||
id: "5", title: "How does Pymander integrate with our existing security tools?", content: "Pymander integrates with 200+ security platforms including SIEM systems, firewalls, and endpoint protection tools. We provide REST APIs, webhook support, and pre-built connectors for popular platforms. Integration typically takes 24-48 hours to fully implement."},
|
||||
id: "5", title: "How does Pymander integrate with our existing security tools?", content: "Pymander integrates with 200+ security platforms including SIEM systems, firewalls, and endpoint protection tools. We provide REST APIs, webhook support, and pre-built connectors for popular platforms. Integration typically takes 24-48 hours to fully implement."
|
||||
},
|
||||
{
|
||||
id: "6", title: "What support is included with Pymander?", content: "All plans include email support. Professional and Enterprise plans include 24/7 phone support, dedicated success managers, and quarterly security reviews. Enterprise customers also receive an assigned security team available for emergencies at any time."},
|
||||
id: "6", title: "What support is included with Pymander?", content: "All plans include email support. Professional and Enterprise plans include 24/7 phone support, dedicated success managers, and quarterly security reviews. Enterprise customers also receive an assigned security team available for emergencies at any time."
|
||||
},
|
||||
]}
|
||||
sideTitle="Frequently Asked Questions"
|
||||
sideDescription="Everything you need to know about Pymander's AI defence platform"
|
||||
|
||||
Reference in New Issue
Block a user