Update src/app/page.tsx
This commit is contained in:
293
src/app/page.tsx
293
src/app/page.tsx
@@ -32,21 +32,13 @@ export default function LandingPage() {
|
||||
<NavbarLayoutFloatingOverlay
|
||||
navItems={[
|
||||
{
|
||||
name: "Overview",
|
||||
id: "about",
|
||||
},
|
||||
name: "Overview", id: "about"},
|
||||
{
|
||||
name: "Features",
|
||||
id: "features",
|
||||
},
|
||||
name: "Features", id: "features"},
|
||||
{
|
||||
name: "Metrics",
|
||||
id: "metrics",
|
||||
},
|
||||
name: "Metrics", id: "metrics"},
|
||||
{
|
||||
name: "Contact",
|
||||
id: "contact",
|
||||
},
|
||||
name: "Contact", id: "contact"},
|
||||
]}
|
||||
brandName="QSecure Shield"
|
||||
/>
|
||||
@@ -56,102 +48,55 @@ export default function LandingPage() {
|
||||
<HeroSplitTestimonial
|
||||
useInvertedBackground={true}
|
||||
background={{
|
||||
variant: "sparkles-gradient",
|
||||
}}
|
||||
variant: "sparkles-gradient"}}
|
||||
title="QuantumSafe Encryption, Demonstrated Live"
|
||||
description="Experience BB84 quantum key distribution in action. See how QSecure Shield protects your data against both classical and quantum threats with an interactive, containerized POC."
|
||||
testimonials={[
|
||||
{
|
||||
name: "Dr. Sarah V.",
|
||||
handle: "@quantum_lead",
|
||||
testimonial: "The BB84 implementation is the most transparent POC I have tested.",
|
||||
rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/fractal-cosmic-lights-wallpaper_1017-2739.jpg?_wi=1",
|
||||
imageAlt: "quantum physics abstract background",
|
||||
},
|
||||
name: "Dr. Sarah V.", handle: "@quantum_lead", testimonial: "The BB84 implementation is the most transparent POC I have tested.", rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/fractal-cosmic-lights-wallpaper_1017-2739.jpg?_wi=1", imageAlt: "quantum physics abstract background"},
|
||||
{
|
||||
name: "Mark D.",
|
||||
handle: "@cto_enterprise",
|
||||
testimonial: "A breakthrough in demonstrating quantum-safe architecture ROI.",
|
||||
rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/technology-background-texture_23-2148105507.jpg?_wi=1",
|
||||
imageAlt: "quantum physics abstract background",
|
||||
},
|
||||
name: "Mark D.", handle: "@cto_enterprise", testimonial: "A breakthrough in demonstrating quantum-safe architecture ROI.", rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/technology-background-texture_23-2148105507.jpg?_wi=1", imageAlt: "quantum physics abstract background"},
|
||||
{
|
||||
name: "Elena K.",
|
||||
handle: "@sec_architect",
|
||||
testimonial: "Finally, a POC that effectively bridges theory and practice.",
|
||||
rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-concept-secure-data-transfer_23-2152001135.jpg?_wi=1",
|
||||
imageAlt: "quantum physics abstract background",
|
||||
},
|
||||
name: "Elena K.", handle: "@sec_architect", testimonial: "Finally, a POC that effectively bridges theory and practice.", rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-concept-secure-data-transfer_23-2152001135.jpg?_wi=1", imageAlt: "quantum physics abstract background"},
|
||||
{
|
||||
name: "James L.",
|
||||
handle: "@quantum_dev",
|
||||
testimonial: "Seamless containerization and highly intuitive documentation.",
|
||||
rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/desktop-pc-wooden-desk-showcases-infographics-client-reach-data_482257-126353.jpg?_wi=1",
|
||||
imageAlt: "quantum physics abstract background",
|
||||
},
|
||||
name: "James L.", handle: "@quantum_dev", testimonial: "Seamless containerization and highly intuitive documentation.", rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/desktop-pc-wooden-desk-showcases-infographics-client-reach-data_482257-126353.jpg?_wi=1", imageAlt: "quantum physics abstract background"},
|
||||
{
|
||||
name: "Sofia R.",
|
||||
handle: "@sec_researcher",
|
||||
testimonial: "An essential tool for the next generation of encryption testing.",
|
||||
rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg?_wi=1",
|
||||
imageAlt: "quantum physics abstract background",
|
||||
},
|
||||
name: "Sofia R.", handle: "@sec_researcher", testimonial: "An essential tool for the next generation of encryption testing.", rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg?_wi=1", imageAlt: "quantum physics abstract background"},
|
||||
]}
|
||||
buttons={[
|
||||
{
|
||||
text: "Launch Interactive Demo",
|
||||
},
|
||||
text: "Launch Interactive Demo"},
|
||||
]}
|
||||
imageSrc="http://img.b2bpic.net/free-photo/fractal-cosmic-lights-wallpaper_1017-2739.jpg?_wi=2"
|
||||
mediaAnimation="blur-reveal"
|
||||
avatars={[
|
||||
{
|
||||
src: "http://img.b2bpic.net/free-photo/handsome-confident-man_1098-18449.jpg",
|
||||
alt: "Handsome confident man",
|
||||
},
|
||||
src: "http://img.b2bpic.net/free-photo/handsome-confident-man_1098-18449.jpg", alt: "Handsome confident man"},
|
||||
{
|
||||
src: "http://img.b2bpic.net/free-photo/smiling-millennial-man-looking-camera-cafe-headshot-portrait_1163-5163.jpg",
|
||||
alt: "Smiling millennial man looking at camera in cafe, headshot portrait",
|
||||
},
|
||||
src: "http://img.b2bpic.net/free-photo/smiling-millennial-man-looking-camera-cafe-headshot-portrait_1163-5163.jpg", alt: "Smiling millennial man looking at camera in cafe, headshot portrait"},
|
||||
{
|
||||
src: "http://img.b2bpic.net/free-photo/young-businessman-happy-expression_1194-1625.jpg",
|
||||
alt: "young businessman happy expression",
|
||||
},
|
||||
src: "http://img.b2bpic.net/free-photo/young-businessman-happy-expression_1194-1625.jpg", alt: "young businessman happy expression"},
|
||||
{
|
||||
src: "http://img.b2bpic.net/free-photo/close-up-portrait-handsome-bearded-male-wearing-stylish-sui_613910-12116.jpg",
|
||||
alt: "Close-up portrait of a handsome bearded male wearing stylish sui",
|
||||
},
|
||||
src: "http://img.b2bpic.net/free-photo/close-up-portrait-handsome-bearded-male-wearing-stylish-sui_613910-12116.jpg", alt: "Close-up portrait of a handsome bearded male wearing stylish sui"},
|
||||
{
|
||||
src: "http://img.b2bpic.net/free-photo/close-up-portrait-business-woman-smiling-camera-after-reading-mails-laptop-sitting-desk-start-up-company-late-night-focused-employee-using-technology-network-wireless-doing-overtime_482257-13419.jpg",
|
||||
alt: "Close up portrait of business woman smiling at camera after reading mails on laptop sitting at desk in start-up company late at night.",
|
||||
},
|
||||
src: "http://img.b2bpic.net/free-photo/close-up-portrait-business-woman-smiling-camera-after-reading-mails-laptop-sitting-desk-start-up-company-late-night-focused-employee-using-technology-network-wireless-doing-overtime_482257-13419.jpg", alt: "Close up portrait of business woman smiling at camera after reading mails on laptop sitting at desk in start-up company late at night."},
|
||||
]}
|
||||
marqueeItems={[
|
||||
{
|
||||
type: "text",
|
||||
text: "Quantum Security",
|
||||
},
|
||||
type: "text", text: "Quantum Security"},
|
||||
{
|
||||
type: "text",
|
||||
text: "BB84 Protocol",
|
||||
},
|
||||
type: "text", text: "BB84 Protocol"},
|
||||
{
|
||||
type: "text",
|
||||
text: "Zero-Latency",
|
||||
},
|
||||
type: "text", text: "Zero-Latency"},
|
||||
{
|
||||
type: "text",
|
||||
text: "Infrastructure Ready",
|
||||
},
|
||||
type: "text", text: "Infrastructure Ready"},
|
||||
{
|
||||
type: "text",
|
||||
text: "Verified Integrity",
|
||||
},
|
||||
type: "text", text: "Verified Integrity"},
|
||||
]}
|
||||
/>
|
||||
</div>
|
||||
@@ -163,17 +108,11 @@ export default function LandingPage() {
|
||||
description="QSecure Shield offers a full-stack, quantum-safe testing environment. Our POC demonstrates how current data infrastructure can transition seamlessly to quantum-resistant encryption without operational downtime."
|
||||
metrics={[
|
||||
{
|
||||
value: "100%",
|
||||
title: "Quantum Resistance",
|
||||
},
|
||||
value: "100%", title: "Quantum Resistance"},
|
||||
{
|
||||
value: "0ms",
|
||||
title: "Protocol Latency",
|
||||
},
|
||||
value: "0ms", title: "Protocol Latency"},
|
||||
{
|
||||
value: "24/7",
|
||||
title: "Availability",
|
||||
},
|
||||
value: "24/7", title: "Availability"},
|
||||
]}
|
||||
imageSrc="http://img.b2bpic.net/free-photo/technology-background-texture_23-2148105507.jpg?_wi=2"
|
||||
mediaAnimation="slide-up"
|
||||
@@ -188,38 +127,17 @@ export default function LandingPage() {
|
||||
useInvertedBackground={true}
|
||||
features={[
|
||||
{
|
||||
id: "f1",
|
||||
title: "BB84 Implementation",
|
||||
author: "Security Team",
|
||||
description: "Interactive protocol simulation showcasing true quantum key distribution.",
|
||||
tags: [
|
||||
"Quantum",
|
||||
"BB84",
|
||||
],
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-concept-secure-data-transfer_23-2152001135.jpg?_wi=2",
|
||||
},
|
||||
id: "f1", title: "BB84 Implementation", author: "Security Team", description: "Interactive protocol simulation showcasing true quantum key distribution.", tags: [
|
||||
"Quantum", "BB84"],
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-concept-secure-data-transfer_23-2152001135.jpg?_wi=2"},
|
||||
{
|
||||
id: "f2",
|
||||
title: "Real-time Monitoring",
|
||||
author: "Ops Core",
|
||||
description: "Live container metrics and key exchange performance analytics dashboard.",
|
||||
tags: [
|
||||
"Monitoring",
|
||||
"Analytics",
|
||||
],
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/desktop-pc-wooden-desk-showcases-infographics-client-reach-data_482257-126353.jpg?_wi=2",
|
||||
},
|
||||
id: "f2", title: "Real-time Monitoring", author: "Ops Core", description: "Live container metrics and key exchange performance analytics dashboard.", tags: [
|
||||
"Monitoring", "Analytics"],
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/desktop-pc-wooden-desk-showcases-infographics-client-reach-data_482257-126353.jpg?_wi=2"},
|
||||
{
|
||||
id: "f3",
|
||||
title: "Multi-Threat Shielding",
|
||||
author: "Security Engineering",
|
||||
description: "Protects against both legacy decryption and emerging quantum threats.",
|
||||
tags: [
|
||||
"Protection",
|
||||
"Safety",
|
||||
],
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg?_wi=2",
|
||||
},
|
||||
id: "f3", title: "Multi-Threat Shielding", author: "Security Engineering", description: "Protects against both legacy decryption and emerging quantum threats.", tags: [
|
||||
"Protection", "Safety"],
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg?_wi=2"},
|
||||
]}
|
||||
title="Built for Security Decision-Makers"
|
||||
description="Leverage our battle-tested implementation to validate your organization's transition to a post-quantum infrastructure."
|
||||
@@ -233,26 +151,11 @@ export default function LandingPage() {
|
||||
useInvertedBackground={false}
|
||||
metrics={[
|
||||
{
|
||||
id: "m1",
|
||||
value: "12.5 Gbps",
|
||||
title: "Throughput",
|
||||
description: "Maximum encrypted data throughput in POC environment.",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/3d-flowing-particles-network-communications-design_1048-15848.jpg",
|
||||
},
|
||||
id: "m1", value: "12.5 Gbps", title: "Throughput", description: "Maximum encrypted data throughput in POC environment.", imageSrc: "http://img.b2bpic.net/free-photo/3d-flowing-particles-network-communications-design_1048-15848.jpg"},
|
||||
{
|
||||
id: "m2",
|
||||
value: "< 10ms",
|
||||
title: "Key Latency",
|
||||
description: "Minimal handshake overhead for key distribution protocols.",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/3d-abstract-techno-background-with-connecting-lines-dots_1048-11693.jpg",
|
||||
},
|
||||
id: "m2", value: "< 10ms", title: "Key Latency", description: "Minimal handshake overhead for key distribution protocols.", imageSrc: "http://img.b2bpic.net/free-photo/3d-abstract-techno-background-with-connecting-lines-dots_1048-11693.jpg"},
|
||||
{
|
||||
id: "m3",
|
||||
value: "99.99%",
|
||||
title: "Uptime",
|
||||
description: "Reliable availability under high-concurrency security loads.",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/professional-hacker-using-ransomware-phishing-tactics-compromise-networks_482257-121638.jpg",
|
||||
},
|
||||
id: "m3", value: "99.99%", title: "Uptime", description: "Reliable availability under high-concurrency security loads.", imageSrc: "http://img.b2bpic.net/free-photo/professional-hacker-using-ransomware-phishing-tactics-compromise-networks_482257-121638.jpg"},
|
||||
]}
|
||||
title="Proven Technical Performance"
|
||||
description="The QSecure architecture is engineered for enterprise-grade throughput and security requirements."
|
||||
@@ -264,14 +167,7 @@ export default function LandingPage() {
|
||||
textboxLayout="default"
|
||||
useInvertedBackground={true}
|
||||
names={[
|
||||
"Quantum Defense Lab",
|
||||
"Global Crypto Research",
|
||||
"Enterprise Sec Solutions",
|
||||
"Tech Infrastructure Corp",
|
||||
"Secure Data Dynamics",
|
||||
"Future Proof Labs",
|
||||
"Advanced Defense Systems",
|
||||
]}
|
||||
"Quantum Defense Lab", "Global Crypto Research", "Enterprise Sec Solutions", "Tech Infrastructure Corp", "Secure Data Dynamics", "Future Proof Labs", "Advanced Defense Systems"]}
|
||||
title="Trusted by Industry Leaders"
|
||||
description="We are collaborating with top-tier security labs and enterprise teams."
|
||||
/>
|
||||
@@ -283,20 +179,11 @@ export default function LandingPage() {
|
||||
useInvertedBackground={false}
|
||||
faqs={[
|
||||
{
|
||||
id: "q1",
|
||||
title: "How does the BB84 protocol work here?",
|
||||
content: "Our simulation maps the physical photon states to virtual key components while maintaining strict fidelity.",
|
||||
},
|
||||
id: "q1", title: "How does the BB84 protocol work here?", content: "Our simulation maps the physical photon states to virtual key components while maintaining strict fidelity."},
|
||||
{
|
||||
id: "q2",
|
||||
title: "Is this production ready?",
|
||||
content: "This is a full-stack Proof of Concept designed to validate feasibility before full enterprise integration.",
|
||||
},
|
||||
id: "q2", title: "Is this production ready?", content: "This is a full-stack Proof of Concept designed to validate feasibility before full enterprise integration."},
|
||||
{
|
||||
id: "q3",
|
||||
title: "Can I test it in my infrastructure?",
|
||||
content: "Yes, the solution is fully containerized and can be deployed for internal testing.",
|
||||
},
|
||||
id: "q3", title: "Can I test it in my infrastructure?", content: "Yes, the solution is fully containerized and can be deployed for internal testing."},
|
||||
]}
|
||||
imageSrc="http://img.b2bpic.net/free-photo/blockchain-technology-cartoon-illustration_23-2151572141.jpg"
|
||||
title="Common Technical Inquiries"
|
||||
@@ -313,45 +200,20 @@ export default function LandingPage() {
|
||||
useInvertedBackground={true}
|
||||
testimonials={[
|
||||
{
|
||||
id: "t1",
|
||||
name: "Alice M.",
|
||||
handle: "@techlead",
|
||||
testimonial: "The best POC I've seen in the quantum space.",
|
||||
rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/businessman-looking-away-holding-laptop_23-2148308516.jpg",
|
||||
},
|
||||
id: "t1", name: "Alice M.", handle: "@techlead", testimonial: "The best POC I've seen in the quantum space.", rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/businessman-looking-away-holding-laptop_23-2148308516.jpg"},
|
||||
{
|
||||
id: "t2",
|
||||
name: "Bob S.",
|
||||
handle: "@secops",
|
||||
testimonial: "Seamless integration, zero overhead.",
|
||||
rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/young-man-using-portable-notebook-cafe-sitting-table-by-window-typing-something-frowning_343059-118.jpg",
|
||||
},
|
||||
id: "t2", name: "Bob S.", handle: "@secops", testimonial: "Seamless integration, zero overhead.", rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/young-man-using-portable-notebook-cafe-sitting-table-by-window-typing-something-frowning_343059-118.jpg"},
|
||||
{
|
||||
id: "t3",
|
||||
name: "Charlie P.",
|
||||
handle: "@quantumfan",
|
||||
testimonial: "Finally, a practical approach to BB84.",
|
||||
rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/female-architect-walking-front-building_23-2147702500.jpg",
|
||||
},
|
||||
id: "t3", name: "Charlie P.", handle: "@quantumfan", testimonial: "Finally, a practical approach to BB84.", rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/female-architect-walking-front-building_23-2147702500.jpg"},
|
||||
{
|
||||
id: "t4",
|
||||
name: "Dana L.",
|
||||
handle: "@devops_expert",
|
||||
testimonial: "Robust and production-ready architecture.",
|
||||
rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/businessman-solving-startup-problems-with-laptop-archived-documents-looking-annual-statistics-report-find-issue-young-analyst-reviewing-papers-executive-strategy-plan_482257-65811.jpg",
|
||||
},
|
||||
id: "t4", name: "Dana L.", handle: "@devops_expert", testimonial: "Robust and production-ready architecture.", rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/businessman-solving-startup-problems-with-laptop-archived-documents-looking-annual-statistics-report-find-issue-young-analyst-reviewing-papers-executive-strategy-plan_482257-65811.jpg"},
|
||||
{
|
||||
id: "t5",
|
||||
name: "Eve W.",
|
||||
handle: "@ciso",
|
||||
testimonial: "This changes how we view data longevity.",
|
||||
rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/startup-worker-uses-laptop-open-space-reviewing-project-data-documents-workstation-executive-assistant-working-marketing-strategy-business-development-ai-developer_482257-65810.jpg",
|
||||
},
|
||||
id: "t5", name: "Eve W.", handle: "@ciso", testimonial: "This changes how we view data longevity.", rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/startup-worker-uses-laptop-open-space-reviewing-project-data-documents-workstation-executive-assistant-working-marketing-strategy-business-development-ai-developer_482257-65810.jpg"},
|
||||
]}
|
||||
showRating={true}
|
||||
title="What Security Experts Are Saying"
|
||||
@@ -366,19 +228,16 @@ export default function LandingPage() {
|
||||
description="Ready to test QSecure Shield in your environment? Request our technical documentation or POC access."
|
||||
inputs={[
|
||||
{
|
||||
name: "name",
|
||||
type: "text",
|
||||
placeholder: "Name",
|
||||
name: "name", type: "text", placeholder: "Name", required: true
|
||||
},
|
||||
{
|
||||
name: "email",
|
||||
type: "email",
|
||||
placeholder: "Email",
|
||||
name: "company", type: "text", placeholder: "Company", required: true
|
||||
},
|
||||
{
|
||||
name: "role",
|
||||
type: "text",
|
||||
placeholder: "Job Title",
|
||||
name: "email", type: "email", placeholder: "Email", required: true
|
||||
},
|
||||
{
|
||||
name: "role", type: "text", placeholder: "Job Title"
|
||||
},
|
||||
]}
|
||||
imageSrc="http://img.b2bpic.net/free-photo/binary-numbers_1048-4877.jpg"
|
||||
@@ -389,37 +248,23 @@ export default function LandingPage() {
|
||||
<FooterBase
|
||||
columns={[
|
||||
{
|
||||
title: "Platform",
|
||||
items: [
|
||||
title: "Platform", items: [
|
||||
{
|
||||
label: "About",
|
||||
href: "#about",
|
||||
},
|
||||
label: "About", href: "#about"},
|
||||
{
|
||||
label: "Features",
|
||||
href: "#features",
|
||||
},
|
||||
label: "Features", href: "#features"},
|
||||
{
|
||||
label: "Metrics",
|
||||
href: "#metrics",
|
||||
},
|
||||
label: "Metrics", href: "#metrics"},
|
||||
],
|
||||
},
|
||||
{
|
||||
title: "Company",
|
||||
items: [
|
||||
title: "Company", items: [
|
||||
{
|
||||
label: "Contact",
|
||||
href: "#contact",
|
||||
},
|
||||
label: "Contact", href: "#contact"},
|
||||
{
|
||||
label: "Security Policy",
|
||||
href: "#",
|
||||
},
|
||||
label: "Security Policy", href: "#"},
|
||||
{
|
||||
label: "Careers",
|
||||
href: "#",
|
||||
},
|
||||
label: "Careers", href: "#"},
|
||||
],
|
||||
},
|
||||
]}
|
||||
|
||||
Reference in New Issue
Block a user