Merge version_1 into main
Merge version_1 into main
This commit was merged in pull request #1.
This commit is contained in:
@@ -1,6 +1,6 @@
|
||||
"use client";
|
||||
|
||||
import { AlertCircle, ArrowLeftRight, CircleDollarSign, Database, House, Lock, Layers, Mail, MessageSquareText, Network, Send, Settings, Shield, Sparkles, TrendingUp, Zap } from "lucide-react";
|
||||
import { AlertCircle, ArrowLeftRight, CircleDollarSign, Database, House, Lock, Layers, Mail, MessageSquareText, Network, Send, Settings, Shield, Sparkles, TrendingUp, Zap, Search } from "lucide-react";
|
||||
import { ThemeProvider } from "@/providers/themeProvider/ThemeProvider";
|
||||
import NavbarStyleFullscreen from "@/components/navbar/NavbarStyleFullscreen/NavbarStyleFullscreen";
|
||||
import HeroBillboardDashboard from "@/components/sections/hero/HeroBillboardDashboard";
|
||||
@@ -69,13 +69,16 @@ export default function LandingPage() {
|
||||
stats: [
|
||||
{
|
||||
title: "Threats Tracked", values: [12450, 18920, 24567],
|
||||
description: "Active intelligence entries"},
|
||||
description: "Active intelligence entries"
|
||||
},
|
||||
{
|
||||
title: "Query Speed", values: [45, 68, 92],
|
||||
valuePrefix: "", valueSuffix: "ms", description: "Average response time"},
|
||||
valuePrefix: "", valueSuffix: "ms", description: "Average response time"
|
||||
},
|
||||
{
|
||||
title: "Data Sources", values: [324, 412, 589],
|
||||
description: "Integrated feeds"},
|
||||
description: "Integrated feeds"
|
||||
},
|
||||
],
|
||||
chartTitle: "Threat Detection Trend", chartData: [
|
||||
{ value: 65 },
|
||||
@@ -87,10 +90,12 @@ export default function LandingPage() {
|
||||
listTitle: "Recent Intelligence", listItems: [
|
||||
{
|
||||
icon: AlertCircle,
|
||||
title: "IP 192.168.1.1 - Flagged", status: "High Risk"},
|
||||
title: "IP 192.168.1.1 - Flagged", status: "High Risk"
|
||||
},
|
||||
{
|
||||
icon: Network,
|
||||
title: "Domain DNS Anomaly", status: "Active"},
|
||||
title: "Domain DNS Anomaly", status: "Active"
|
||||
},
|
||||
{ icon: Lock, title: "Hash Match - Malware", status: "Confirmed" },
|
||||
],
|
||||
}}
|
||||
@@ -111,10 +116,12 @@ export default function LandingPage() {
|
||||
features={[
|
||||
{
|
||||
title: "Advanced Search", description:
|
||||
"Query across IP addresses, domains, email addresses, file hashes, and more using powerful operators and filters.", bentoComponent: "animated-bar-chart"},
|
||||
"Query across IP addresses, domains, email addresses, file hashes, and more using powerful operators and filters.", bentoComponent: "animated-bar-chart"
|
||||
},
|
||||
{
|
||||
title: "Threat Intelligence", description:
|
||||
"Real-time threat actor tracking, malware signatures, vulnerability databases, and compromise indicators.", bentoComponent: "line-chart"},
|
||||
"Real-time threat actor tracking, malware signatures, vulnerability databases, and compromise indicators.", bentoComponent: "line-chart"
|
||||
},
|
||||
{
|
||||
title: "Data Aggregation", description:
|
||||
"Unified view across 500+ public and private intelligence feeds. Correlate data from multiple sources instantly.", bentoComponent: "icon-info-cards", items: [
|
||||
@@ -124,7 +131,8 @@ export default function LandingPage() {
|
||||
},
|
||||
{
|
||||
title: "Network Mapping", description:
|
||||
"Visualize infrastructure relationships, WHOIS data, DNS records, and BGP announcements on an interactive globe.", bentoComponent: "globe"},
|
||||
"Visualize infrastructure relationships, WHOIS data, DNS records, and BGP announcements on an interactive globe.", bentoComponent: "globe"
|
||||
},
|
||||
]}
|
||||
/>
|
||||
</div>
|
||||
@@ -159,27 +167,33 @@ export default function LandingPage() {
|
||||
{
|
||||
icon: Zap,
|
||||
title: "No Authentication", description:
|
||||
"Start investigating immediately without creating accounts or managing credentials. Intelligence should be accessible instantly."},
|
||||
"Start investigating immediately without creating accounts or managing credentials. Intelligence should be accessible instantly."
|
||||
},
|
||||
{
|
||||
icon: Database,
|
||||
title: "Comprehensive Data", description:
|
||||
"Access geolocation, WHOIS, DNS, SSL certificates, threat feeds, and behavioral analysis all in one place."},
|
||||
"Access geolocation, WHOIS, DNS, SSL certificates, threat feeds, and behavioral analysis all in one place."
|
||||
},
|
||||
{
|
||||
icon: Shield,
|
||||
title: "Trusted Sources", description:
|
||||
"Intelligence from verified feeds, academic research, and community-driven threat intelligence databases."},
|
||||
"Intelligence from verified feeds, academic research, and community-driven threat intelligence databases."
|
||||
},
|
||||
{
|
||||
icon: Layers,
|
||||
title: "Correlation Engine", description:
|
||||
"Automatically connect related indicators across different data types to reveal attack patterns and infrastructure."},
|
||||
"Automatically connect related indicators across different data types to reveal attack patterns and infrastructure."
|
||||
},
|
||||
{
|
||||
icon: Network,
|
||||
title: "Relationship Mapping", description:
|
||||
"Visualize connections between IPs, domains, email addresses, and organizational infrastructure."},
|
||||
"Visualize connections between IPs, domains, email addresses, and organizational infrastructure."
|
||||
},
|
||||
{
|
||||
icon: TrendingUp,
|
||||
title: "Trend Analysis", description:
|
||||
"Historical tracking of threat activity, emergence patterns, and evolution of attack infrastructure."},
|
||||
"Historical tracking of threat activity, emergence patterns, and evolution of attack infrastructure."
|
||||
},
|
||||
]}
|
||||
/>
|
||||
</div>
|
||||
@@ -194,22 +208,28 @@ export default function LandingPage() {
|
||||
testimonials={[
|
||||
{
|
||||
id: "1", name: "Marcus Chen", handle: "@threatintel_pro", testimonial:
|
||||
"Sentinel has cut our investigation time by 60%. No login barriers, no API rate limits. Pure intelligence, immediately accessible.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-cybersecurity-1772644480600-44b6f129.png", imageAlt: "Marcus Chen"},
|
||||
"Sentinel has cut our investigation time by 60%. No login barriers, no API rate limits. Pure intelligence, immediately accessible.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-cybersecurity-1772644480600-44b6f129.png", imageAlt: "Marcus Chen"
|
||||
},
|
||||
{
|
||||
id: "2", name: "Sarah Rodriguez", handle: "@security_analyst", testimonial:
|
||||
"The correlation engine is incredible. It automatically connects indicators I would have missed manually. Total game-changer for SOC operations.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-security-rese-1772644480227-d2f6c7b4.png", imageAlt: "Sarah Rodriguez"},
|
||||
"The correlation engine is incredible. It automatically connects indicators I would have missed manually. Total game-changer for SOC operations.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-security-rese-1772644480227-d2f6c7b4.png", imageAlt: "Sarah Rodriguez"
|
||||
},
|
||||
{
|
||||
id: "3", name: "David Kim", handle: "@ciso_insights", testimonial:
|
||||
"Finally, a threat intelligence platform that respects my time. Zero friction from start to insight. This is what modern OSINT should look like.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-an-it-director--1772644480328-3d4dece0.png", imageAlt: "David Kim"},
|
||||
"Finally, a threat intelligence platform that respects my time. Zero friction from start to insight. This is what modern OSINT should look like.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-an-it-director--1772644480328-3d4dece0.png", imageAlt: "David Kim"
|
||||
},
|
||||
{
|
||||
id: "4", name: "Jessica Turner", handle: "@threat_hunter", testimonial:
|
||||
"Sentinel's data aggregation is unmatched. 500+ sources coordinated seamlessly. I haven't found a better OSINT resource for rapid investigation.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-threat-intell-1772644481064-9c9b1c7e.png", imageAlt: "Jessica Turner"},
|
||||
"Sentinel's data aggregation is unmatched. 500+ sources coordinated seamlessly. I haven't found a better OSINT resource for rapid investigation.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-threat-intell-1772644481064-9c9b1c7e.png", imageAlt: "Jessica Turner"
|
||||
},
|
||||
{
|
||||
id: "5", name: "Alex Patel", handle: "@threat_ops", testimonial:
|
||||
"The no-auth approach is perfect for incident response. When seconds matter, Sentinel delivers intelligence without bureaucracy.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-soc-manager-c-1772644480619-9f4cc8ad.png", imageAlt: "Alex Patel"},
|
||||
"The no-auth approach is perfect for incident response. When seconds matter, Sentinel delivers intelligence without bureaucracy.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-soc-manager-c-1772644480619-9f4cc8ad.png", imageAlt: "Alex Patel"
|
||||
},
|
||||
{
|
||||
id: "6", name: "Emma White", handle: "@security_ops", testimonial:
|
||||
"Switching to Sentinel has elevated our threat hunting capabilities significantly. The intelligence quality is exceptional.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-security-oper-1772644481104-c0f74e61.png", imageAlt: "Emma White"},
|
||||
"Switching to Sentinel has elevated our threat hunting capabilities significantly. The intelligence quality is exceptional.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-security-oper-1772644481104-c0f74e61.png", imageAlt: "Emma White"
|
||||
},
|
||||
]}
|
||||
/>
|
||||
</div>
|
||||
@@ -229,7 +249,8 @@ export default function LandingPage() {
|
||||
{ text: "Learn More", href: "#" },
|
||||
],
|
||||
features: [
|
||||
"Unlimited searches", "500+ data sources", "IP and domain lookups", "WHOIS and DNS records", "Basic threat feeds", "Public API access"],
|
||||
"Unlimited searches", "500+ data sources", "IP and domain lookups", "WHOIS and DNS records", "Basic threat feeds", "Public API access"
|
||||
],
|
||||
},
|
||||
{
|
||||
id: "pro", badge: "Most Popular", badgeIcon: Sparkles,
|
||||
@@ -238,7 +259,8 @@ export default function LandingPage() {
|
||||
{ text: "Contact Sales", href: "#" },
|
||||
],
|
||||
features: [
|
||||
"Everything in Investigator", "Advanced correlation engine", "Behavioral analysis", "Custom threat feeds", "Email alerts", "Priority support", "Export reports", "Team collaboration"],
|
||||
"Everything in Investigator", "Advanced correlation engine", "Behavioral analysis", "Custom threat feeds", "Email alerts", "Priority support", "Export reports", "Team collaboration"
|
||||
],
|
||||
},
|
||||
{
|
||||
id: "enterprise", price: "Custom", name: "Enterprise Guardian", buttons: [
|
||||
@@ -246,7 +268,8 @@ export default function LandingPage() {
|
||||
{ text: "Contact Sales", href: "#" },
|
||||
],
|
||||
features: [
|
||||
"Everything in Pro", "Dedicated account manager", "Custom integrations", "On-premise deployment", "White-label options", "SLA guarantees", "Advanced analytics", "Enterprise SSO"],
|
||||
"Everything in Pro", "Dedicated account manager", "Custom integrations", "On-premise deployment", "White-label options", "SLA guarantees", "Advanced analytics", "Enterprise SSO"
|
||||
],
|
||||
},
|
||||
]}
|
||||
/>
|
||||
@@ -262,28 +285,36 @@ export default function LandingPage() {
|
||||
faqs={[
|
||||
{
|
||||
id: "1", title: "Do I need an account to use Sentinel?", content:
|
||||
"No. Sentinel's free tier requires zero authentication. Start searching immediately without creating an account, signing agreements, or managing API keys. Perfect for rapid incident response and one-off investigations."},
|
||||
"No. Sentinel's free tier requires zero authentication. Start searching immediately without creating an account, signing agreements, or managing API keys. Perfect for rapid incident response and one-off investigations."
|
||||
},
|
||||
{
|
||||
id: "2", title: "What data sources does Sentinel aggregate?", content:
|
||||
"Sentinel pulls from 500+ public and private intelligence feeds including WHOIS databases, DNS records, SSL certificate logs, threat actor databases, malware signatures, vulnerability feeds, geolocation services, and community-driven intelligence."},
|
||||
"Sentinel pulls from 500+ public and private intelligence feeds including WHOIS databases, DNS records, SSL certificate logs, threat actor databases, malware signatures, vulnerability feeds, geolocation services, and community-driven intelligence."
|
||||
},
|
||||
{
|
||||
id: "3", title: "How accurate is the threat intelligence?", content:
|
||||
"Sentinel sources data from authoritative, verified feeds with multi-layer verification. All intelligence is cross-referenced across multiple sources for validation. We continuously monitor feed reliability and update correlations in real-time."},
|
||||
"Sentinel sources data from authoritative, verified feeds with multi-layer verification. All intelligence is cross-referenced across multiple sources for validation. We continuously monitor feed reliability and update correlations in real-time."
|
||||
},
|
||||
{
|
||||
id: "4", title: "Can I use Sentinel for commercial investigations?", content:
|
||||
"Yes. Sentinel's free tier is suitable for commercial use. For enterprise teams requiring SLA guarantees, white-label options, or dedicated support, upgrade to our Enterprise Guardian plan."},
|
||||
"Yes. Sentinel's free tier is suitable for commercial use. For enterprise teams requiring SLA guarantees, white-label options, or dedicated support, upgrade to our Enterprise Guardian plan."
|
||||
},
|
||||
{
|
||||
id: "5", title: "How fast are query responses?", content:
|
||||
"Average query response time is under 1 second. Our distributed infrastructure ensures rapid correlation across 500+ data sources with minimal latency, even during high-volume investigations."},
|
||||
"Average query response time is under 1 second. Our distributed infrastructure ensures rapid correlation across 500+ data sources with minimal latency, even during high-volume investigations."
|
||||
},
|
||||
{
|
||||
id: "6", title: "What can I search for in Sentinel?", content:
|
||||
"Search by IP address, domain name, email address, file hash (MD5, SHA-1, SHA-256), SSL certificates, WHOIS registrants, autonomous systems, and more. Advanced operators enable complex queries combining multiple indicators."},
|
||||
"Search by IP address, domain name, email address, file hash (MD5, SHA-1, SHA-256), SSL certificates, WHOIS registrants, autonomous systems, and more. Advanced operators enable complex queries combining multiple indicators."
|
||||
},
|
||||
{
|
||||
id: "7", title: "Is my search data logged or shared?", content:
|
||||
"Sentinel does not log personally identifiable searches. We take privacy seriously. Enterprise customers can request on-premise deployment or dedicated infrastructure for additional privacy guarantees."},
|
||||
"Sentinel does not log personally identifiable searches. We take privacy seriously. Enterprise customers can request on-premise deployment or dedicated infrastructure for additional privacy guarantees."
|
||||
},
|
||||
{
|
||||
id: "8", title: "Can I export investigation results?", content:
|
||||
"Yes. Pro and Enterprise plans include full export capabilities in CSV, JSON, and PDF formats. Reports can be customized, scheduled, and automatically delivered to your team."},
|
||||
"Yes. Pro and Enterprise plans include full export capabilities in CSV, JSON, and PDF formats. Reports can be customized, scheduled, and automatically delivered to your team."
|
||||
},
|
||||
]}
|
||||
/>
|
||||
</div>
|
||||
|
||||
Reference in New Issue
Block a user