"use client"; import Image from "next/image"; import { motion } from "framer-motion"; import { Shield, ArrowRight, Lock, Eye, Server, AlertTriangle, Fingerprint, ShieldAlert, KeyRound, Bug, Wifi, Smartphone, Award, Check, } from "lucide-react"; import { GlassCard } from "@/components/GlassCard"; import { GlowingButton } from "@/components/GlowingButton"; import { SectionWrapper, itemVariants } from "@/components/SectionWrapper"; import { ParticleBackground } from "@/components/ParticleBackground"; /* ── Stagger helpers ── */ const heroStagger = { hidden: { opacity: 0 }, visible: { opacity: 1, transition: { staggerChildren: 0.12, delayChildren: 0.2 }, }, }; const heroChild = { hidden: { opacity: 0, y: 50, filter: "blur(4px)" }, visible: { opacity: 1, y: 0, filter: "blur(0px)", transition: { duration: 0.8, ease: [0.16, 1, 0.3, 1] as const }, }, }; const securityLayers = [ { icon: Fingerprint, title: "Identity Layer", description: "Multi-factor authentication, biometric verification, and continuous identity assurance.", }, { icon: Lock, title: "Encryption Layer", description: "End-to-end encryption for data at rest and in transit. AES-256 and TLS 1.3 standards.", }, { icon: Eye, title: "Monitoring Layer", description: "Real-time threat detection, behavioral analytics, and anomaly detection across all channels.", }, { icon: Server, title: "Infrastructure Layer", description: "Hardened cloud infrastructure with HSM-backed key management and geo-redundant deployment.", }, { icon: ShieldAlert, title: "Policy Layer", description: "Dynamic security policies, risk-based access control, and automated compliance enforcement.", }, { icon: AlertTriangle, title: "Response Layer", description: "Automated incident response, instant revocation, and forensic audit capabilities.", }, ]; const threats = [ { icon: KeyRound, name: "Credential Theft", status: "Mitigated" }, { icon: Bug, name: "Malware & Ransomware", status: "Detected & Blocked" }, { icon: Wifi, name: "Man-in-the-Middle", status: "Prevented" }, { icon: Smartphone, name: "SIM Swapping", status: "Mitigated" }, { icon: ShieldAlert, name: "Phishing Attacks", status: "Detected" }, { icon: AlertTriangle, name: "Session Hijacking", status: "Prevented" }, { icon: Eye, name: "Insider Threats", status: "Monitored" }, { icon: Lock, name: "Data Exfiltration", status: "Blocked" }, { icon: Server, name: "API Abuse", status: "Rate-Limited & Blocked" }, ]; const certifications = [ { name: "ISO 27001", description: "Information Security Management", }, { name: "eIDAS", description: "EU Electronic Identification & Trust Services", }, { name: "PSD2", description: "Payment Services Directive 2 Compliance", }, { name: "GDPR", description: "General Data Protection Regulation", }, { name: "SOC 2 Type II", description: "Service Organization Control", }, { name: "Common Criteria", description: "EAL4+ Certified Components", }, ]; export default function SecurityPage() { return ( <> {/* Hero */}
{/* ── UNBOXED hero image — absolutely positioned background ── */} Security Architecture
{/* Cinematic spotlights */}
{/* Glow orb behind headline */}
{/* Bottom fade */}
Enterprise-Grade Security

Security Architecture

Security
That Thinks
Multi-layered, AI-enhanced security architecture built on 25+ years of protecting the world's most sensitive digital interactions. Book a Demo
{/* Security Architecture */}

Defense-in-Depth

Six Layers of{" "} Defense

Security isn't a feature — it's the architecture. Every layer works together to create an impenetrable trust boundary.

{securityLayers.map((layer) => (

{layer.title}

{layer.description}

))}
{/* Threat Detection */}

Threat Intelligence

Threats We{" "} Neutralize

Real-time protection against the full spectrum of modern cyber threats.

{threats.map((threat) => (
{threat.name}
{threat.status}
))}
{/* Certifications */}

Compliance

Certified &{" "} Compliant

Meeting the highest security and compliance standards globally.

{certifications.map((cert) => (

{cert.name}

{cert.description}

))}
{/* CTA */}
{/* Ambient glow */}

Security Questions?{" "} Let's Talk.

Our security team is ready to walk you through our architecture, certifications, and how we protect your most critical assets.

Book a Security Review{" "}
); }