From f62b9e3077f4caa5b9663d04e866219a8623179c Mon Sep 17 00:00:00 2001 From: bender Date: Wed, 4 Mar 2026 17:17:06 +0000 Subject: [PATCH] Update src/app/page.tsx --- src/app/page.tsx | 95 ++++++++++++++++++++++++++++++++---------------- 1 file changed, 63 insertions(+), 32 deletions(-) diff --git a/src/app/page.tsx b/src/app/page.tsx index ef8885a..3447c50 100644 --- a/src/app/page.tsx +++ b/src/app/page.tsx @@ -1,6 +1,6 @@ "use client"; -import { AlertCircle, ArrowLeftRight, CircleDollarSign, Database, House, Lock, Layers, Mail, MessageSquareText, Network, Send, Settings, Shield, Sparkles, TrendingUp, Zap } from "lucide-react"; +import { AlertCircle, ArrowLeftRight, CircleDollarSign, Database, House, Lock, Layers, Mail, MessageSquareText, Network, Send, Settings, Shield, Sparkles, TrendingUp, Zap, Search } from "lucide-react"; import { ThemeProvider } from "@/providers/themeProvider/ThemeProvider"; import NavbarStyleFullscreen from "@/components/navbar/NavbarStyleFullscreen/NavbarStyleFullscreen"; import HeroBillboardDashboard from "@/components/sections/hero/HeroBillboardDashboard"; @@ -69,13 +69,16 @@ export default function LandingPage() { stats: [ { title: "Threats Tracked", values: [12450, 18920, 24567], - description: "Active intelligence entries"}, + description: "Active intelligence entries" + }, { title: "Query Speed", values: [45, 68, 92], - valuePrefix: "", valueSuffix: "ms", description: "Average response time"}, + valuePrefix: "", valueSuffix: "ms", description: "Average response time" + }, { title: "Data Sources", values: [324, 412, 589], - description: "Integrated feeds"}, + description: "Integrated feeds" + }, ], chartTitle: "Threat Detection Trend", chartData: [ { value: 65 }, @@ -87,10 +90,12 @@ export default function LandingPage() { listTitle: "Recent Intelligence", listItems: [ { icon: AlertCircle, - title: "IP 192.168.1.1 - Flagged", status: "High Risk"}, + title: "IP 192.168.1.1 - Flagged", status: "High Risk" + }, { icon: Network, - title: "Domain DNS Anomaly", status: "Active"}, + title: "Domain DNS Anomaly", status: "Active" + }, { icon: Lock, title: "Hash Match - Malware", status: "Confirmed" }, ], }} @@ -111,10 +116,12 @@ export default function LandingPage() { features={[ { title: "Advanced Search", description: - "Query across IP addresses, domains, email addresses, file hashes, and more using powerful operators and filters.", bentoComponent: "animated-bar-chart"}, + "Query across IP addresses, domains, email addresses, file hashes, and more using powerful operators and filters.", bentoComponent: "animated-bar-chart" + }, { title: "Threat Intelligence", description: - "Real-time threat actor tracking, malware signatures, vulnerability databases, and compromise indicators.", bentoComponent: "line-chart"}, + "Real-time threat actor tracking, malware signatures, vulnerability databases, and compromise indicators.", bentoComponent: "line-chart" + }, { title: "Data Aggregation", description: "Unified view across 500+ public and private intelligence feeds. Correlate data from multiple sources instantly.", bentoComponent: "icon-info-cards", items: [ @@ -124,7 +131,8 @@ export default function LandingPage() { }, { title: "Network Mapping", description: - "Visualize infrastructure relationships, WHOIS data, DNS records, and BGP announcements on an interactive globe.", bentoComponent: "globe"}, + "Visualize infrastructure relationships, WHOIS data, DNS records, and BGP announcements on an interactive globe.", bentoComponent: "globe" + }, ]} /> @@ -159,27 +167,33 @@ export default function LandingPage() { { icon: Zap, title: "No Authentication", description: - "Start investigating immediately without creating accounts or managing credentials. Intelligence should be accessible instantly."}, + "Start investigating immediately without creating accounts or managing credentials. Intelligence should be accessible instantly." + }, { icon: Database, title: "Comprehensive Data", description: - "Access geolocation, WHOIS, DNS, SSL certificates, threat feeds, and behavioral analysis all in one place."}, + "Access geolocation, WHOIS, DNS, SSL certificates, threat feeds, and behavioral analysis all in one place." + }, { icon: Shield, title: "Trusted Sources", description: - "Intelligence from verified feeds, academic research, and community-driven threat intelligence databases."}, + "Intelligence from verified feeds, academic research, and community-driven threat intelligence databases." + }, { icon: Layers, title: "Correlation Engine", description: - "Automatically connect related indicators across different data types to reveal attack patterns and infrastructure."}, + "Automatically connect related indicators across different data types to reveal attack patterns and infrastructure." + }, { icon: Network, title: "Relationship Mapping", description: - "Visualize connections between IPs, domains, email addresses, and organizational infrastructure."}, + "Visualize connections between IPs, domains, email addresses, and organizational infrastructure." + }, { icon: TrendingUp, title: "Trend Analysis", description: - "Historical tracking of threat activity, emergence patterns, and evolution of attack infrastructure."}, + "Historical tracking of threat activity, emergence patterns, and evolution of attack infrastructure." + }, ]} /> @@ -194,22 +208,28 @@ export default function LandingPage() { testimonials={[ { id: "1", name: "Marcus Chen", handle: "@threatintel_pro", testimonial: - "Sentinel has cut our investigation time by 60%. No login barriers, no API rate limits. Pure intelligence, immediately accessible.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-cybersecurity-1772644480600-44b6f129.png", imageAlt: "Marcus Chen"}, + "Sentinel has cut our investigation time by 60%. No login barriers, no API rate limits. Pure intelligence, immediately accessible.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-cybersecurity-1772644480600-44b6f129.png", imageAlt: "Marcus Chen" + }, { id: "2", name: "Sarah Rodriguez", handle: "@security_analyst", testimonial: - "The correlation engine is incredible. It automatically connects indicators I would have missed manually. Total game-changer for SOC operations.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-security-rese-1772644480227-d2f6c7b4.png", imageAlt: "Sarah Rodriguez"}, + "The correlation engine is incredible. It automatically connects indicators I would have missed manually. Total game-changer for SOC operations.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-security-rese-1772644480227-d2f6c7b4.png", imageAlt: "Sarah Rodriguez" + }, { id: "3", name: "David Kim", handle: "@ciso_insights", testimonial: - "Finally, a threat intelligence platform that respects my time. Zero friction from start to insight. This is what modern OSINT should look like.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-an-it-director--1772644480328-3d4dece0.png", imageAlt: "David Kim"}, + "Finally, a threat intelligence platform that respects my time. Zero friction from start to insight. This is what modern OSINT should look like.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-an-it-director--1772644480328-3d4dece0.png", imageAlt: "David Kim" + }, { id: "4", name: "Jessica Turner", handle: "@threat_hunter", testimonial: - "Sentinel's data aggregation is unmatched. 500+ sources coordinated seamlessly. I haven't found a better OSINT resource for rapid investigation.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-threat-intell-1772644481064-9c9b1c7e.png", imageAlt: "Jessica Turner"}, + "Sentinel's data aggregation is unmatched. 500+ sources coordinated seamlessly. I haven't found a better OSINT resource for rapid investigation.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-threat-intell-1772644481064-9c9b1c7e.png", imageAlt: "Jessica Turner" + }, { id: "5", name: "Alex Patel", handle: "@threat_ops", testimonial: - "The no-auth approach is perfect for incident response. When seconds matter, Sentinel delivers intelligence without bureaucracy.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-soc-manager-c-1772644480619-9f4cc8ad.png", imageAlt: "Alex Patel"}, + "The no-auth approach is perfect for incident response. When seconds matter, Sentinel delivers intelligence without bureaucracy.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-soc-manager-c-1772644480619-9f4cc8ad.png", imageAlt: "Alex Patel" + }, { id: "6", name: "Emma White", handle: "@security_ops", testimonial: - "Switching to Sentinel has elevated our threat hunting capabilities significantly. The intelligence quality is exceptional.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-security-oper-1772644481104-c0f74e61.png", imageAlt: "Emma White"}, + "Switching to Sentinel has elevated our threat hunting capabilities significantly. The intelligence quality is exceptional.", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3ARUC8d2zGXJWHABxL1IQeh8aKD/professional-portrait-of-a-security-oper-1772644481104-c0f74e61.png", imageAlt: "Emma White" + }, ]} /> @@ -229,7 +249,8 @@ export default function LandingPage() { { text: "Learn More", href: "#" }, ], features: [ - "Unlimited searches", "500+ data sources", "IP and domain lookups", "WHOIS and DNS records", "Basic threat feeds", "Public API access"], + "Unlimited searches", "500+ data sources", "IP and domain lookups", "WHOIS and DNS records", "Basic threat feeds", "Public API access" + ], }, { id: "pro", badge: "Most Popular", badgeIcon: Sparkles, @@ -238,7 +259,8 @@ export default function LandingPage() { { text: "Contact Sales", href: "#" }, ], features: [ - "Everything in Investigator", "Advanced correlation engine", "Behavioral analysis", "Custom threat feeds", "Email alerts", "Priority support", "Export reports", "Team collaboration"], + "Everything in Investigator", "Advanced correlation engine", "Behavioral analysis", "Custom threat feeds", "Email alerts", "Priority support", "Export reports", "Team collaboration" + ], }, { id: "enterprise", price: "Custom", name: "Enterprise Guardian", buttons: [ @@ -246,7 +268,8 @@ export default function LandingPage() { { text: "Contact Sales", href: "#" }, ], features: [ - "Everything in Pro", "Dedicated account manager", "Custom integrations", "On-premise deployment", "White-label options", "SLA guarantees", "Advanced analytics", "Enterprise SSO"], + "Everything in Pro", "Dedicated account manager", "Custom integrations", "On-premise deployment", "White-label options", "SLA guarantees", "Advanced analytics", "Enterprise SSO" + ], }, ]} /> @@ -262,28 +285,36 @@ export default function LandingPage() { faqs={[ { id: "1", title: "Do I need an account to use Sentinel?", content: - "No. Sentinel's free tier requires zero authentication. Start searching immediately without creating an account, signing agreements, or managing API keys. Perfect for rapid incident response and one-off investigations."}, + "No. Sentinel's free tier requires zero authentication. Start searching immediately without creating an account, signing agreements, or managing API keys. Perfect for rapid incident response and one-off investigations." + }, { id: "2", title: "What data sources does Sentinel aggregate?", content: - "Sentinel pulls from 500+ public and private intelligence feeds including WHOIS databases, DNS records, SSL certificate logs, threat actor databases, malware signatures, vulnerability feeds, geolocation services, and community-driven intelligence."}, + "Sentinel pulls from 500+ public and private intelligence feeds including WHOIS databases, DNS records, SSL certificate logs, threat actor databases, malware signatures, vulnerability feeds, geolocation services, and community-driven intelligence." + }, { id: "3", title: "How accurate is the threat intelligence?", content: - "Sentinel sources data from authoritative, verified feeds with multi-layer verification. All intelligence is cross-referenced across multiple sources for validation. We continuously monitor feed reliability and update correlations in real-time."}, + "Sentinel sources data from authoritative, verified feeds with multi-layer verification. All intelligence is cross-referenced across multiple sources for validation. We continuously monitor feed reliability and update correlations in real-time." + }, { id: "4", title: "Can I use Sentinel for commercial investigations?", content: - "Yes. Sentinel's free tier is suitable for commercial use. For enterprise teams requiring SLA guarantees, white-label options, or dedicated support, upgrade to our Enterprise Guardian plan."}, + "Yes. Sentinel's free tier is suitable for commercial use. For enterprise teams requiring SLA guarantees, white-label options, or dedicated support, upgrade to our Enterprise Guardian plan." + }, { id: "5", title: "How fast are query responses?", content: - "Average query response time is under 1 second. Our distributed infrastructure ensures rapid correlation across 500+ data sources with minimal latency, even during high-volume investigations."}, + "Average query response time is under 1 second. Our distributed infrastructure ensures rapid correlation across 500+ data sources with minimal latency, even during high-volume investigations." + }, { id: "6", title: "What can I search for in Sentinel?", content: - "Search by IP address, domain name, email address, file hash (MD5, SHA-1, SHA-256), SSL certificates, WHOIS registrants, autonomous systems, and more. Advanced operators enable complex queries combining multiple indicators."}, + "Search by IP address, domain name, email address, file hash (MD5, SHA-1, SHA-256), SSL certificates, WHOIS registrants, autonomous systems, and more. Advanced operators enable complex queries combining multiple indicators." + }, { id: "7", title: "Is my search data logged or shared?", content: - "Sentinel does not log personally identifiable searches. We take privacy seriously. Enterprise customers can request on-premise deployment or dedicated infrastructure for additional privacy guarantees."}, + "Sentinel does not log personally identifiable searches. We take privacy seriously. Enterprise customers can request on-premise deployment or dedicated infrastructure for additional privacy guarantees." + }, { id: "8", title: "Can I export investigation results?", content: - "Yes. Pro and Enterprise plans include full export capabilities in CSV, JSON, and PDF formats. Reports can be customized, scheduled, and automatically delivered to your team."}, + "Yes. Pro and Enterprise plans include full export capabilities in CSV, JSON, and PDF formats. Reports can be customized, scheduled, and automatically delivered to your team." + }, ]} />