Update src/app/page.tsx

This commit is contained in:
2026-03-07 08:18:04 +00:00
parent 00b1d6b284
commit c24d06e80f

View File

@@ -21,8 +21,7 @@ export default function HomePage() {
const footerColumns = [
{
title: "Product",
items: [
title: "Product", items: [
{ label: "Features", href: "#features" },
{ label: "Security", href: "#metrics" },
{ label: "Pricing", href: "#" },
@@ -30,8 +29,7 @@ export default function HomePage() {
],
},
{
title: "Company",
items: [
title: "Company", items: [
{ label: "About Us", href: "#" },
{ label: "Blog", href: "#" },
{ label: "Careers", href: "#" },
@@ -39,8 +37,7 @@ export default function HomePage() {
],
},
{
title: "Resources",
items: [
title: "Resources", items: [
{ label: "API Docs", href: "#" },
{ label: "Security Guide", href: "#" },
{ label: "FAQ", href: "#faq" },
@@ -48,8 +45,7 @@ export default function HomePage() {
],
},
{
title: "Legal",
items: [
title: "Legal", items: [
{ label: "Privacy Policy", href: "#" },
{ label: "Terms of Service", href: "#" },
{ label: "Cookie Policy", href: "#" },
@@ -65,7 +61,7 @@ export default function HomePage() {
borderRadius="rounded"
contentWidth="compact"
sizing="largeSmallSizeMediumTitles"
background="noiseDiagonalGradient"
background="circleGradient"
cardStyle="gradient-radial"
primaryButtonStyle="gradient"
secondaryButtonStyle="radial-glow"
@@ -79,7 +75,7 @@ export default function HomePage() {
<HeroBillboardGallery
title="Enterprise-Grade Secure Authentication"
description="Experience peace of mind with our military-grade encryption, two-factor authentication, and industry-leading security practices designed to protect your sensitive data."
background={{ variant: "noiseDiagonalGradient" }}
background={{ variant: "animated-grid" }}
tag="Security First"
tagIcon={Shield}
tagAnimation="slide-up"
@@ -90,25 +86,15 @@ export default function HomePage() {
buttonAnimation="blur-reveal"
mediaItems={[
{
imageSrc: "http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg?_wi=1",
imageAlt: "Secure authentication dashboard interface",
},
imageSrc: "http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg", imageAlt: "Secure authentication dashboard interface"},
{
imageSrc: "http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg?_wi=1",
imageAlt: "Encryption security technology",
},
imageSrc: "http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg", imageAlt: "Encryption security technology"},
{
imageSrc: "http://img.b2bpic.net/free-photo/register-sign-up-membership-concept_53876-121221.jpg?_wi=1",
imageAlt: "Two-factor authentication verification",
},
imageSrc: "http://img.b2bpic.net/free-photo/register-sign-up-membership-concept_53876-121221.jpg", imageAlt: "Two-factor authentication verification"},
{
imageSrc: "http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg?_wi=1",
imageAlt: "Session management dashboard",
},
imageSrc: "http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg", imageAlt: "Session management dashboard"},
{
imageSrc: "http://img.b2bpic.net/free-photo/top-view-keyboard-with-lock-metal-chain_23-2148578114.jpg?_wi=1",
imageAlt: "Password hashing cryptographic process",
},
imageSrc: "http://img.b2bpic.net/free-photo/top-view-keyboard-with-lock-metal-chain_23-2148578114.jpg", imageAlt: "Password hashing cryptographic process"},
]}
mediaAnimation="slide-up"
/>
@@ -124,67 +110,43 @@ export default function HomePage() {
features={[
{
id: 1,
title: "Bcrypt Password Hashing",
description:
"Industry-standard password hashing with automatic salt generation. Passwords are irreversibly encrypted, ensuring even if data is compromised, passwords remain secure.",
phoneOne: {
title: "Bcrypt Password Hashing", description:
"Industry-standard password hashing with automatic salt generation. Passwords are irreversibly encrypted, ensuring even if data is compromised, passwords remain secure.", phoneOne: {
imageSrc:
"http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg?_wi=2",
imageAlt: "Encryption security technology",
},
"http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg", imageAlt: "Encryption security technology"},
phoneTwo: {
imageSrc:
"http://img.b2bpic.net/free-photo/top-view-keyboard-with-lock-metal-chain_23-2148578114.jpg?_wi=2",
imageAlt: "Password hashing cryptographic security",
},
"http://img.b2bpic.net/free-photo/top-view-keyboard-with-lock-metal-chain_23-2148578114.jpg", imageAlt: "Password hashing cryptographic security"},
},
{
id: 2,
title: "Two-Factor Authentication",
description:
"Add an extra layer of security with OTP (One-Time Password) verification. Users receive unique codes via SMS or authenticator apps for account verification.",
phoneOne: {
title: "Two-Factor Authentication", description:
"Add an extra layer of security with OTP (One-Time Password) verification. Users receive unique codes via SMS or authenticator apps for account verification.", phoneOne: {
imageSrc:
"http://img.b2bpic.net/free-photo/register-sign-up-membership-concept_53876-121221.jpg?_wi=2",
imageAlt: "Two-factor authentication phone verification",
},
"http://img.b2bpic.net/free-photo/register-sign-up-membership-concept_53876-121221.jpg", imageAlt: "Two-factor authentication phone verification"},
phoneTwo: {
imageSrc:
"http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg?_wi=2",
imageAlt: "Session management user activity monitor",
},
"http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg", imageAlt: "Session management user activity monitor"},
},
{
id: 3,
title: "Session Management",
description:
"Track active sessions, manage device access, and revoke suspicious sessions in real-time. Monitor login attempts and geographic locations for enhanced security.",
phoneOne: {
title: "Session Management", description:
"Track active sessions, manage device access, and revoke suspicious sessions in real-time. Monitor login attempts and geographic locations for enhanced security.", phoneOne: {
imageSrc:
"http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg?_wi=3",
imageAlt: "Session management user activity monitor",
},
"http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg", imageAlt: "Session management user activity monitor"},
phoneTwo: {
imageSrc:
"http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg?_wi=2",
imageAlt: "Secure authentication dashboard interface",
},
"http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg", imageAlt: "Secure authentication dashboard interface"},
},
{
id: 4,
title: "SQL Injection Protection",
description:
"Parameterized queries and input validation prevent SQL injection attacks. All user inputs are sanitized and validated before database operations.",
phoneOne: {
title: "SQL Injection Protection", description:
"Parameterized queries and input validation prevent SQL injection attacks. All user inputs are sanitized and validated before database operations.", phoneOne: {
imageSrc:
"http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg?_wi=3",
imageAlt: "Secure authentication dashboard interface",
},
"http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg", imageAlt: "Secure authentication dashboard interface"},
phoneTwo: {
imageSrc:
"http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg?_wi=3",
imageAlt: "Encryption security technology",
},
"http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg", imageAlt: "Encryption security technology"},
},
]}
showStepNumbers={true}
@@ -200,29 +162,17 @@ export default function HomePage() {
description="Proven security infrastructure trusted by enterprises and startups worldwide."
metrics={[
{
id: "1",
icon: Lock,
title: "256-Bit Encryption",
value: "AES-256",
},
id: "1", icon: Lock,
title: "256-Bit Encryption", value: "AES-256"},
{
id: "2",
icon: Shield,
title: "Security Uptime",
value: "99.99%",
},
id: "2", icon: Shield,
title: "Security Uptime", value: "99.99%"},
{
id: "3",
icon: Zap,
title: "Authentication Speed",
value: "<100ms",
},
id: "3", icon: Zap,
title: "Authentication Speed", value: "<100ms"},
{
id: "4",
icon: Users,
title: "Active Users",
value: "500K+",
},
id: "4", icon: Users,
title: "Active Users", value: "500K+"},
]}
animationType="blur-reveal"
textboxLayout="default"
@@ -239,41 +189,23 @@ export default function HomePage() {
tagAnimation="slide-up"
faqs={[
{
id: "1",
title: "How secure is your authentication system?",
content:
"Our system uses military-grade AES-256 encryption, industry-standard bcrypt password hashing, and two-factor authentication. All data transmissions are encrypted via TLS/SSL protocols. We maintain SOC 2 Type II compliance and undergo regular security audits.",
},
id: "1", title: "How secure is your authentication system?", content:
"Our system uses military-grade AES-256 encryption, industry-standard bcrypt password hashing, and two-factor authentication. All data transmissions are encrypted via TLS/SSL protocols. We maintain SOC 2 Type II compliance and undergo regular security audits."},
{
id: "2",
title: "What happens if I forget my password?",
content:
"You can use our secure password reset feature. We'll send a verification email with a time-limited reset link. For added security, you may need to verify your identity through two-factor authentication before creating a new password.",
},
id: "2", title: "What happens if I forget my password?", content:
"You can use our secure password reset feature. We'll send a verification email with a time-limited reset link. For added security, you may need to verify your identity through two-factor authentication before creating a new password."},
{
id: "3",
title: "Can I use two-factor authentication on multiple devices?",
content:
"Yes! You can register multiple authenticator apps or phone numbers for 2FA. Each device receives OTP codes independently. This provides flexibility while maintaining security across all your devices.",
},
id: "3", title: "Can I use two-factor authentication on multiple devices?", content:
"Yes! You can register multiple authenticator apps or phone numbers for 2FA. Each device receives OTP codes independently. This provides flexibility while maintaining security across all your devices."},
{
id: "4",
title: "How do I manage my active sessions?",
content:
"Access your dashboard's Session Management page to view all active sessions. You can see device type, location, and last activity. Revoke any suspicious sessions with a single click.",
},
id: "4", title: "How do I manage my active sessions?", content:
"Access your dashboard's Session Management page to view all active sessions. You can see device type, location, and last activity. Revoke any suspicious sessions with a single click."},
{
id: "5",
title: "What is SQL injection protection?",
content:
"We use parameterized queries and input validation to prevent SQL injection attacks. All user inputs are sanitized before being processed, ensuring malicious code cannot access or manipulate the database.",
},
id: "5", title: "What is SQL injection protection?", content:
"We use parameterized queries and input validation to prevent SQL injection attacks. All user inputs are sanitized before being processed, ensuring malicious code cannot access or manipulate the database."},
{
id: "6",
title: "How often is my password hashed?",
content:
"Your password is hashed immediately upon registration and during login. The hash is never stored in plain text. Each hash includes a unique salt generated using cryptographic random functions, making rainbow table attacks ineffective.",
},
id: "6", title: "How often is my password hashed?", content:
"Your password is hashed immediately upon registration and during login. The hash is never stored in plain text. Each hash includes a unique salt generated using cryptographic random functions, making rainbow table attacks ineffective."},
]}
faqsAnimation="slide-up"
textboxLayout="default"