Merge version_1 into main

Merge version_1 into main
This commit was merged in pull request #1.
This commit is contained in:
2026-03-04 17:17:10 +00:00

View File

@@ -1,6 +1,6 @@
"use client";
import { AlertCircle, ArrowLeftRight, CircleDollarSign, Database, House, Lock, Layers, Mail, MessageSquareText, Network, Send, Settings, Shield, Sparkles, TrendingUp, Zap } from "lucide-react";
import { AlertCircle, ArrowLeftRight, CircleDollarSign, Database, House, Lock, Layers, Mail, MessageSquareText, Network, Send, Settings, Shield, Sparkles, TrendingUp, Zap, Search } from "lucide-react";
import { ThemeProvider } from "@/providers/themeProvider/ThemeProvider";
import NavbarStyleFullscreen from "@/components/navbar/NavbarStyleFullscreen/NavbarStyleFullscreen";
import HeroBillboardDashboard from "@/components/sections/hero/HeroBillboardDashboard";
@@ -69,13 +69,16 @@ export default function LandingPage() {
stats: [
{
title: "Threats Tracked", values: [12450, 18920, 24567],
description: "Active intelligence entries"},
description: "Active intelligence entries"
},
{
title: "Query Speed", values: [45, 68, 92],
valuePrefix: "", valueSuffix: "ms", description: "Average response time"},
valuePrefix: "", valueSuffix: "ms", description: "Average response time"
},
{
title: "Data Sources", values: [324, 412, 589],
description: "Integrated feeds"},
description: "Integrated feeds"
},
],
chartTitle: "Threat Detection Trend", chartData: [
{ value: 65 },
@@ -87,10 +90,12 @@ export default function LandingPage() {
listTitle: "Recent Intelligence", listItems: [
{
icon: AlertCircle,
title: "IP 192.168.1.1 - Flagged", status: "High Risk"},
title: "IP 192.168.1.1 - Flagged", status: "High Risk"
},
{
icon: Network,
title: "Domain DNS Anomaly", status: "Active"},
title: "Domain DNS Anomaly", status: "Active"
},
{ icon: Lock, title: "Hash Match - Malware", status: "Confirmed" },
],
}}
@@ -111,10 +116,12 @@ export default function LandingPage() {
features={[
{
title: "Advanced Search", description:
"Query across IP addresses, domains, email addresses, file hashes, and more using powerful operators and filters.", bentoComponent: "animated-bar-chart"},
"Query across IP addresses, domains, email addresses, file hashes, and more using powerful operators and filters.", bentoComponent: "animated-bar-chart"
},
{
title: "Threat Intelligence", description:
"Real-time threat actor tracking, malware signatures, vulnerability databases, and compromise indicators.", bentoComponent: "line-chart"},
"Real-time threat actor tracking, malware signatures, vulnerability databases, and compromise indicators.", bentoComponent: "line-chart"
},
{
title: "Data Aggregation", description:
"Unified view across 500+ public and private intelligence feeds. Correlate data from multiple sources instantly.", bentoComponent: "icon-info-cards", items: [
@@ -124,7 +131,8 @@ export default function LandingPage() {
},
{
title: "Network Mapping", description:
"Visualize infrastructure relationships, WHOIS data, DNS records, and BGP announcements on an interactive globe.", bentoComponent: "globe"},
"Visualize infrastructure relationships, WHOIS data, DNS records, and BGP announcements on an interactive globe.", bentoComponent: "globe"
},
]}
/>
</div>
@@ -159,27 +167,33 @@ export default function LandingPage() {
{
icon: Zap,
title: "No Authentication", description:
"Start investigating immediately without creating accounts or managing credentials. Intelligence should be accessible instantly."},
"Start investigating immediately without creating accounts or managing credentials. Intelligence should be accessible instantly."
},
{
icon: Database,
title: "Comprehensive Data", description:
"Access geolocation, WHOIS, DNS, SSL certificates, threat feeds, and behavioral analysis all in one place."},
"Access geolocation, WHOIS, DNS, SSL certificates, threat feeds, and behavioral analysis all in one place."
},
{
icon: Shield,
title: "Trusted Sources", description:
"Intelligence from verified feeds, academic research, and community-driven threat intelligence databases."},
"Intelligence from verified feeds, academic research, and community-driven threat intelligence databases."
},
{
icon: Layers,
title: "Correlation Engine", description:
"Automatically connect related indicators across different data types to reveal attack patterns and infrastructure."},
"Automatically connect related indicators across different data types to reveal attack patterns and infrastructure."
},
{
icon: Network,
title: "Relationship Mapping", description:
"Visualize connections between IPs, domains, email addresses, and organizational infrastructure."},
"Visualize connections between IPs, domains, email addresses, and organizational infrastructure."
},
{
icon: TrendingUp,
title: "Trend Analysis", description:
"Historical tracking of threat activity, emergence patterns, and evolution of attack infrastructure."},
"Historical tracking of threat activity, emergence patterns, and evolution of attack infrastructure."
},
]}
/>
</div>
@@ -194,22 +208,28 @@ export default function LandingPage() {
testimonials={[
{
id: "1", name: "Marcus Chen", handle: "@threatintel_pro", testimonial:
"Sentinel has cut our investigation time by 60%. No login barriers, no API rate limits. Pure intelligence, immediately accessible.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-cybersecurity-1772644480600-44b6f129.png", imageAlt: "Marcus Chen"},
"Sentinel has cut our investigation time by 60%. No login barriers, no API rate limits. Pure intelligence, immediately accessible.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-cybersecurity-1772644480600-44b6f129.png", imageAlt: "Marcus Chen"
},
{
id: "2", name: "Sarah Rodriguez", handle: "@security_analyst", testimonial:
"The correlation engine is incredible. It automatically connects indicators I would have missed manually. Total game-changer for SOC operations.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-security-rese-1772644480227-d2f6c7b4.png", imageAlt: "Sarah Rodriguez"},
"The correlation engine is incredible. It automatically connects indicators I would have missed manually. Total game-changer for SOC operations.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-security-rese-1772644480227-d2f6c7b4.png", imageAlt: "Sarah Rodriguez"
},
{
id: "3", name: "David Kim", handle: "@ciso_insights", testimonial:
"Finally, a threat intelligence platform that respects my time. Zero friction from start to insight. This is what modern OSINT should look like.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-an-it-director--1772644480328-3d4dece0.png", imageAlt: "David Kim"},
"Finally, a threat intelligence platform that respects my time. Zero friction from start to insight. This is what modern OSINT should look like.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-an-it-director--1772644480328-3d4dece0.png", imageAlt: "David Kim"
},
{
id: "4", name: "Jessica Turner", handle: "@threat_hunter", testimonial:
"Sentinel's data aggregation is unmatched. 500+ sources coordinated seamlessly. I haven't found a better OSINT resource for rapid investigation.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-threat-intell-1772644481064-9c9b1c7e.png", imageAlt: "Jessica Turner"},
"Sentinel's data aggregation is unmatched. 500+ sources coordinated seamlessly. I haven't found a better OSINT resource for rapid investigation.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-threat-intell-1772644481064-9c9b1c7e.png", imageAlt: "Jessica Turner"
},
{
id: "5", name: "Alex Patel", handle: "@threat_ops", testimonial:
"The no-auth approach is perfect for incident response. When seconds matter, Sentinel delivers intelligence without bureaucracy.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-soc-manager-c-1772644480619-9f4cc8ad.png", imageAlt: "Alex Patel"},
"The no-auth approach is perfect for incident response. When seconds matter, Sentinel delivers intelligence without bureaucracy.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-soc-manager-c-1772644480619-9f4cc8ad.png", imageAlt: "Alex Patel"
},
{
id: "6", name: "Emma White", handle: "@security_ops", testimonial:
"Switching to Sentinel has elevated our threat hunting capabilities significantly. The intelligence quality is exceptional.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-security-oper-1772644481104-c0f74e61.png", imageAlt: "Emma White"},
"Switching to Sentinel has elevated our threat hunting capabilities significantly. The intelligence quality is exceptional.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-security-oper-1772644481104-c0f74e61.png", imageAlt: "Emma White"
},
]}
/>
</div>
@@ -229,7 +249,8 @@ export default function LandingPage() {
{ text: "Learn More", href: "#" },
],
features: [
"Unlimited searches", "500+ data sources", "IP and domain lookups", "WHOIS and DNS records", "Basic threat feeds", "Public API access"],
"Unlimited searches", "500+ data sources", "IP and domain lookups", "WHOIS and DNS records", "Basic threat feeds", "Public API access"
],
},
{
id: "pro", badge: "Most Popular", badgeIcon: Sparkles,
@@ -238,7 +259,8 @@ export default function LandingPage() {
{ text: "Contact Sales", href: "#" },
],
features: [
"Everything in Investigator", "Advanced correlation engine", "Behavioral analysis", "Custom threat feeds", "Email alerts", "Priority support", "Export reports", "Team collaboration"],
"Everything in Investigator", "Advanced correlation engine", "Behavioral analysis", "Custom threat feeds", "Email alerts", "Priority support", "Export reports", "Team collaboration"
],
},
{
id: "enterprise", price: "Custom", name: "Enterprise Guardian", buttons: [
@@ -246,7 +268,8 @@ export default function LandingPage() {
{ text: "Contact Sales", href: "#" },
],
features: [
"Everything in Pro", "Dedicated account manager", "Custom integrations", "On-premise deployment", "White-label options", "SLA guarantees", "Advanced analytics", "Enterprise SSO"],
"Everything in Pro", "Dedicated account manager", "Custom integrations", "On-premise deployment", "White-label options", "SLA guarantees", "Advanced analytics", "Enterprise SSO"
],
},
]}
/>
@@ -262,28 +285,36 @@ export default function LandingPage() {
faqs={[
{
id: "1", title: "Do I need an account to use Sentinel?", content:
"No. Sentinel's free tier requires zero authentication. Start searching immediately without creating an account, signing agreements, or managing API keys. Perfect for rapid incident response and one-off investigations."},
"No. Sentinel's free tier requires zero authentication. Start searching immediately without creating an account, signing agreements, or managing API keys. Perfect for rapid incident response and one-off investigations."
},
{
id: "2", title: "What data sources does Sentinel aggregate?", content:
"Sentinel pulls from 500+ public and private intelligence feeds including WHOIS databases, DNS records, SSL certificate logs, threat actor databases, malware signatures, vulnerability feeds, geolocation services, and community-driven intelligence."},
"Sentinel pulls from 500+ public and private intelligence feeds including WHOIS databases, DNS records, SSL certificate logs, threat actor databases, malware signatures, vulnerability feeds, geolocation services, and community-driven intelligence."
},
{
id: "3", title: "How accurate is the threat intelligence?", content:
"Sentinel sources data from authoritative, verified feeds with multi-layer verification. All intelligence is cross-referenced across multiple sources for validation. We continuously monitor feed reliability and update correlations in real-time."},
"Sentinel sources data from authoritative, verified feeds with multi-layer verification. All intelligence is cross-referenced across multiple sources for validation. We continuously monitor feed reliability and update correlations in real-time."
},
{
id: "4", title: "Can I use Sentinel for commercial investigations?", content:
"Yes. Sentinel's free tier is suitable for commercial use. For enterprise teams requiring SLA guarantees, white-label options, or dedicated support, upgrade to our Enterprise Guardian plan."},
"Yes. Sentinel's free tier is suitable for commercial use. For enterprise teams requiring SLA guarantees, white-label options, or dedicated support, upgrade to our Enterprise Guardian plan."
},
{
id: "5", title: "How fast are query responses?", content:
"Average query response time is under 1 second. Our distributed infrastructure ensures rapid correlation across 500+ data sources with minimal latency, even during high-volume investigations."},
"Average query response time is under 1 second. Our distributed infrastructure ensures rapid correlation across 500+ data sources with minimal latency, even during high-volume investigations."
},
{
id: "6", title: "What can I search for in Sentinel?", content:
"Search by IP address, domain name, email address, file hash (MD5, SHA-1, SHA-256), SSL certificates, WHOIS registrants, autonomous systems, and more. Advanced operators enable complex queries combining multiple indicators."},
"Search by IP address, domain name, email address, file hash (MD5, SHA-1, SHA-256), SSL certificates, WHOIS registrants, autonomous systems, and more. Advanced operators enable complex queries combining multiple indicators."
},
{
id: "7", title: "Is my search data logged or shared?", content:
"Sentinel does not log personally identifiable searches. We take privacy seriously. Enterprise customers can request on-premise deployment or dedicated infrastructure for additional privacy guarantees."},
"Sentinel does not log personally identifiable searches. We take privacy seriously. Enterprise customers can request on-premise deployment or dedicated infrastructure for additional privacy guarantees."
},
{
id: "8", title: "Can I export investigation results?", content:
"Yes. Pro and Enterprise plans include full export capabilities in CSV, JSON, and PDF formats. Reports can be customized, scheduled, and automatically delivered to your team."},
"Yes. Pro and Enterprise plans include full export capabilities in CSV, JSON, and PDF formats. Reports can be customized, scheduled, and automatically delivered to your team."
},
]}
/>
</div>