Upload files to "inde"
This commit is contained in:
356
inde/SecuritySuiteCypSec.html
Normal file
356
inde/SecuritySuiteCypSec.html
Normal file
@@ -0,0 +1,356 @@
|
||||
<!DOCTYPE html>
|
||||
<html lang="en">
|
||||
<head>
|
||||
<meta charset="UTF-8">
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
||||
<title>CypSec Security Suite — Modular, Sovereign, End-to-End Protection</title>
|
||||
<script src="https://cdn.tailwindcss.com"></script>
|
||||
<link rel="preconnect" href="https://fonts.googleapis.com">
|
||||
<link rel="preconnect" href="https://fonts.gstatic.com" crossorigin>
|
||||
<link href="https://fonts.googleapis.com/css2?family=Inter:wght@300;400;500;600;700&display=swap" rel="stylesheet">
|
||||
<style>
|
||||
:root {
|
||||
--primary-blue: #60a5fa;
|
||||
--dark-bg: #000000;
|
||||
--card-bg: #111111;
|
||||
--text-primary: #ffffff;
|
||||
--text-secondary: #9ca3af;
|
||||
--border-color: #1f2937;
|
||||
}
|
||||
|
||||
body {
|
||||
font-family: 'Inter', sans-serif;
|
||||
background-color: var(--dark-bg);
|
||||
color: var(--text-primary);
|
||||
line-height: 1.5;
|
||||
}
|
||||
|
||||
.cyber-blue {
|
||||
color: var(--primary-blue);
|
||||
}
|
||||
|
||||
.bg-cyber-blue {
|
||||
background-color: var(--primary-blue);
|
||||
}
|
||||
|
||||
.border-cyber-blue {
|
||||
border-color: var(--primary-blue);
|
||||
}
|
||||
|
||||
.text-secondary {
|
||||
color: var(--text-secondary);
|
||||
}
|
||||
|
||||
.card-hover {
|
||||
transition: all 0.2s ease;
|
||||
}
|
||||
|
||||
.card-hover:hover {
|
||||
border-color: var(--primary-blue);
|
||||
}
|
||||
|
||||
.gradient-text {
|
||||
background: linear-gradient(135deg, var(--primary-blue) 0%, var(--text-primary) 100%);
|
||||
-webkit-background-clip: text;
|
||||
-webkit-text-fill-color: transparent;
|
||||
background-clip: text;
|
||||
}
|
||||
|
||||
.section-divider {
|
||||
height: 1px;
|
||||
background: linear-gradient(90deg, transparent 0%, var(--primary-blue) 50%, transparent 100%);
|
||||
margin: 2rem 0;
|
||||
}
|
||||
|
||||
.compact-text {
|
||||
line-height: 1.4;
|
||||
}
|
||||
|
||||
.tight-card {
|
||||
padding: 1rem;
|
||||
}
|
||||
|
||||
.smaller-text {
|
||||
font-size: 0.875rem;
|
||||
line-height: 1.3;
|
||||
}
|
||||
</style>
|
||||
</head>
|
||||
<!-- Navigation Bar - CypSec Centered with Logo - Exact Size Match -->
|
||||
<nav class="border-b border-gray-800 bg-black">
|
||||
<div class="max-w-6xl mx-auto px-4 sm:px-6 lg:px-8">
|
||||
<div class="flex justify-center items-center h-16">
|
||||
<img src="cypsec-logo-white-transparent.webp" alt="CypSec" class="h-7 w-auto mr-2">
|
||||
<span class="text-2xl font-mono text-white">CypSec</span>
|
||||
</div>
|
||||
</div>
|
||||
</nav>
|
||||
|
||||
<!-- Main Content -->
|
||||
<main class="max-w-6xl mx-auto px-4 sm:px-6 lg:px-8 py-8">
|
||||
<!-- URL Breadcrumb -->
|
||||
<div class="mb-6">
|
||||
<p class="text-xs text-gray-500 font-mono">/publication/applications/security-suite</p>
|
||||
</div>
|
||||
|
||||
<!-- Main Title -->
|
||||
<div class="mb-8">
|
||||
<h1 class="text-4xl md:text-5xl font-bold mb-4 leading-tight">
|
||||
CypSec Security Suite —
|
||||
<span class="gradient-text">Modular, Sovereign, End-to-End Protection</span>
|
||||
</h1>
|
||||
</div>
|
||||
|
||||
<!-- Introduction Section - More compact -->
|
||||
<section class="mb-8">
|
||||
<div class="bg-gray-900 rounded-lg p-4 border border-gray-800 tight-card">
|
||||
<p class="text-sm text-gray-300 mb-3 compact-text">
|
||||
Modern organizations face an environment defined by complexity, evolving threats, and growing digital dependency. Fragmented tools or isolated solutions are no longer enough. The CypSec Security Suite provides a unified, composable ecosystem of defense capabilities — designed to secure the entire lifecycle of systems, data, and operations.
|
||||
</p>
|
||||
<p class="text-sm text-gray-300 compact-text">
|
||||
Built on the principles of cyber-sovereignty, minimal trust, and security by design, the suite enables both small and large organizations to build a resilient, traceable, and adaptive security posture that evolves with the threat landscape.
|
||||
</p>
|
||||
</div>
|
||||
</section>
|
||||
|
||||
<!-- Section Title -->
|
||||
<section class="mb-8">
|
||||
<h2 class="text-2xl font-bold mb-3 text-white">A Holistic, Modular Security Ecosystem</h2>
|
||||
<p class="text-sm text-gray-300 compact-text">
|
||||
The CypSec Security Suite is made of interoperable components that can be deployed independently or integrated into a cohesive architecture. Organizations select the modules they need — and expand as they grow.
|
||||
</p>
|
||||
</section>
|
||||
|
||||
<!-- Included Capabilities Grid - More compact -->
|
||||
<section class="mb-8">
|
||||
<h3 class="text-xl font-bold mb-4 text-white">Included Capabilities</h3>
|
||||
<div class="grid md:grid-cols-2 gap-3">
|
||||
<!-- Secure Communication & Email -->
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 card-hover tight-card">
|
||||
<div class="flex items-start space-x-2">
|
||||
<div class="w-6 h-6 bg-cyber-blue rounded flex items-center justify-center flex-shrink-0">
|
||||
<span class="text-black font-bold text-xs">1</span>
|
||||
</div>
|
||||
<div>
|
||||
<h4 class="text-sm font-semibold mb-1 text-white">Secure Communication & Email</h4>
|
||||
<p class="smaller-text text-gray-300">End-to-end encrypted messaging, file-sharing, secure vaults, protected communication channels for sensitive teams.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- Vulnerability Management & Hardening -->
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 card-hover tight-card">
|
||||
<div class="flex items-start space-x-2">
|
||||
<div class="w-6 h-6 bg-cyber-blue rounded flex items-center justify-center flex-shrink-0">
|
||||
<span class="text-black font-bold text-xs">2</span>
|
||||
</div>
|
||||
<div>
|
||||
<h4 class="text-sm font-semibold mb-1 text-white">Vulnerability Management & Hardening</h4>
|
||||
<p class="smaller-text text-gray-300">Automated scanning, continuous monitoring, secure-by-design architecture, and remediation support.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- Deception & Active Defense -->
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 card-hover tight-card">
|
||||
<div class="flex items-start space-x-2">
|
||||
<div class="w-6 h-6 bg-cyber-blue rounded flex items-center justify-center flex-shrink-0">
|
||||
<span class="text-black font-bold text-xs">3</span>
|
||||
</div>
|
||||
<div>
|
||||
<h4 class="text-sm font-semibold mb-1 text-white">Deception & Active Defense</h4>
|
||||
<p class="smaller-text text-gray-300">Honeypots, decoys, threat-interaction infrastructure, and behavioral monitoring to detect and contain advanced attacks.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- Threat Intelligence & OSINT -->
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 card-hover tight-card">
|
||||
<div class="flex items-start space-x-2">
|
||||
<div class="w-6 h-6 bg-cyber-blue rounded flex items-center justify-center flex-shrink-0">
|
||||
<span class="text-black font-bold text-xs">4</span>
|
||||
</div>
|
||||
<div>
|
||||
<h4 class="text-sm font-semibold mb-1 text-white">Threat Intelligence & OSINT</h4>
|
||||
<p class="smaller-text text-gray-300">Tailored intelligence feeds, targeted risk analysis, threat profiling, and scenario reports.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- Compliance & Governance Automation -->
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 card-hover tight-card">
|
||||
<div class="flex items-start space-x-2">
|
||||
<div class="w-6 h-6 bg-cyber-blue rounded flex items-center justify-center flex-shrink-0">
|
||||
<span class="text-black font-bold text-xs">5</span>
|
||||
</div>
|
||||
<div>
|
||||
<h4 class="text-sm font-semibold mb-1 text-white">Compliance & Governance Automation</h4>
|
||||
<p class="smaller-text text-gray-300">Policy-as-code, audit trails, evidence collections, and guidance for regulatory frameworks (DSGVO/GDPR, NIS2, etc.).</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- Incident Response & Recovery -->
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 card-hover tight-card">
|
||||
<div class="flex items-start space-x-2">
|
||||
<div class="w-6 h-6 bg-cyber-blue rounded flex items-center justify-center flex-shrink-0">
|
||||
<span class="text-black font-bold text-xs">6</span>
|
||||
</div>
|
||||
<div>
|
||||
<h4 class="text-sm font-semibold mb-1 text-white">Incident Response & Recovery</h4>
|
||||
<p class="smaller-text text-gray-300">Rapid response teams, forensics, containment strategy, and post-incident strengthening.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- Malware Analysis & Secure Lab Environments -->
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 card-hover tight-card">
|
||||
<div class="flex items-start space-x-2">
|
||||
<div class="w-6 h-6 bg-cyber-blue rounded flex items-center justify-center flex-shrink-0">
|
||||
<span class="text-black font-bold text-xs">7</span>
|
||||
</div>
|
||||
<div>
|
||||
<h4 class="text-sm font-semibold mb-1 text-white">Malware Analysis & Secure Lab Environments</h4>
|
||||
<p class="smaller-text text-gray-300">Controlled sandboxing environments for analyzing suspicious files and payloads.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- Secure Development & Architecture -->
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 card-hover tight-card">
|
||||
<div class="flex items-start space-x-2">
|
||||
<div class="w-6 h-6 bg-cyber-blue rounded flex items-center justify-center flex-shrink-0">
|
||||
<span class="text-black font-bold text-xs">8</span>
|
||||
</div>
|
||||
<div>
|
||||
<h4 class="text-sm font-semibold mb-1 text-white">Secure Development & Architecture</h4>
|
||||
<p class="smaller-text text-gray-300">Design-phase threat modeling, secure architectures, and code review services.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</section>
|
||||
|
||||
<!-- Section Divider -->
|
||||
<div class="section-divider"></div>
|
||||
|
||||
<!-- Who It Is Designed For - More compact -->
|
||||
<section class="mb-8">
|
||||
<h3 class="text-xl font-bold mb-3 text-white">Who It Is Designed For</h3>
|
||||
<div class="grid md:grid-cols-2 gap-2">
|
||||
<div class="flex items-start space-x-2">
|
||||
<span class="cyber-blue text-sm">•</span>
|
||||
<p class="smaller-text text-gray-300">Small and medium enterprises seeking affordable and sovereign security.</p>
|
||||
</div>
|
||||
<div class="flex items-start space-x-2">
|
||||
<span class="cyber-blue text-sm">•</span>
|
||||
<p class="smaller-text text-gray-300">Large organizations needing composable and scalable infrastructure.</p>
|
||||
</div>
|
||||
<div class="flex items-start space-x-2">
|
||||
<span class="cyber-blue text-sm">•</span>
|
||||
<p class="smaller-text text-gray-300">Critical infrastructure operators and public institutions.</p>
|
||||
</div>
|
||||
<div class="flex items-start space-x-2">
|
||||
<span class="cyber-blue text-sm">•</span>
|
||||
<p class="smaller-text text-gray-300">Journalists, activists, NGOs, and privacy-sensitive communities.</p>
|
||||
</div>
|
||||
<div class="flex items-start space-x-2">
|
||||
<span class="cyber-blue text-sm">•</span>
|
||||
<p class="smaller-text text-gray-300">Research institutions, innovation hubs, and defense-oriented teams.</p>
|
||||
</div>
|
||||
</div>
|
||||
</section>
|
||||
|
||||
<!-- Core Benefits - More compact -->
|
||||
<section class="mb-8">
|
||||
<h3 class="text-xl font-bold mb-3 text-white">Core Benefits</h3>
|
||||
<div class="grid md:grid-cols-2 gap-2">
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 tight-card">
|
||||
<h4 class="text-sm font-semibold text-white">Unified security posture with full visibility.</h4>
|
||||
</div>
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 tight-card">
|
||||
<h4 class="text-sm font-semibold text-white">Reduced operational risk and minimized attack surface.</h4>
|
||||
</div>
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 tight-card">
|
||||
<h4 class="text-sm font-semibold text-white">Compliance readiness and audit efficiency.</h4>
|
||||
</div>
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 tight-card">
|
||||
<h4 class="text-sm font-semibold text-white">Long-term resilience built on sovereign control.</h4>
|
||||
</div>
|
||||
<div class="bg-gray-900 rounded-lg p-3 border border-gray-800 tight-card">
|
||||
<h4 class="text-sm font-semibold text-white">Modular architecture that fits any environment.</h4>
|
||||
</div>
|
||||
</div>
|
||||
</section>
|
||||
|
||||
<!-- Philosophy Section - More compact -->
|
||||
<section class="mb-8">
|
||||
<h3 class="text-xl font-bold mb-3 text-white">A Philosophy of Security by Design</h3>
|
||||
<div class="bg-gray-900 rounded-lg p-4 border border-gray-700 tight-card">
|
||||
<p class="smaller-text text-gray-300 mb-3">
|
||||
The Security Suite is not merely a collection of tools — it is an operational model.
|
||||
We embed the principles of:
|
||||
</p>
|
||||
<div class="grid md:grid-cols-2 gap-2 mb-3">
|
||||
<div class="flex items-center space-x-2">
|
||||
<span class="w-1 h-1 bg-cyber-blue rounded-full"></span>
|
||||
<span class="smaller-text text-gray-300">continuous validation,</span>
|
||||
</div>
|
||||
<div class="flex items-center space-x-2">
|
||||
<span class="w-1 h-1 bg-cyber-blue rounded-full"></span>
|
||||
<span class="smaller-text text-gray-300">minimal trust,</span>
|
||||
</div>
|
||||
<div class="flex items-center space-x-2">
|
||||
<span class="w-1 h-1 bg-cyber-blue rounded-full"></span>
|
||||
<span class="smaller-text text-gray-300">human-centric awareness,</span>
|
||||
</div>
|
||||
<div class="flex items-center space-x-2">
|
||||
<span class="w-1 h-1 bg-cyber-blue rounded-full"></span>
|
||||
<span class="smaller-text text-gray-300">active defense, and</span>
|
||||
</div>
|
||||
<div class="flex items-center space-x-2">
|
||||
<span class="w-1 h-1 bg-cyber-blue rounded-full"></span>
|
||||
<span class="smaller-text text-gray-300">traceable governance.</span>
|
||||
</div>
|
||||
</div>
|
||||
<p class="smaller-text text-gray-300">
|
||||
Together, these create an environment where security is predictable, measurable, and adaptable.
|
||||
</p>
|
||||
</div>
|
||||
</section>
|
||||
|
||||
<!-- Get Started Section - More compact -->
|
||||
<section class="mb-8 text-center">
|
||||
<h3 class="text-xl font-bold mb-3 text-white">Get Started</h3>
|
||||
<p class="smaller-text text-gray-300 mb-4 max-w-2xl mx-auto">
|
||||
Whether your goal is hardening a single communication workflow or securing an entire organization, CypSec tailors the Security Suite to your mission.
|
||||
</p>
|
||||
<a href="mailto:contact@cypsec.de?subject=Security%20Suite%20Configuration"
|
||||
class="inline-flex items-center px-4 py-2 bg-cyber-blue text-black font-medium rounded hover:bg-blue-400 transition-colors text-sm">
|
||||
Contact us for a personalized Security Suite configuration →
|
||||
</a>
|
||||
</section>
|
||||
</main>
|
||||
|
||||
<!-- Footer -->
|
||||
<footer class="border-t border-gray-800 bg-black py-6">
|
||||
<div class="max-w-6xl mx-auto px-4 sm:px-6 lg:px-8">
|
||||
<div class="flex flex-col md:flex-row justify-between items-center">
|
||||
<div class="mb-3 md:mb-0">
|
||||
<span class="text-lg font-semibold text-white">CypSec</span>
|
||||
<p class="text-gray-400 mt-0.5 text-xs">Architecting Absolute Cyber Sovereignty</p>
|
||||
</div>
|
||||
<div class="flex space-x-6">
|
||||
<a href="#" class="text-gray-400 hover:text-white transition-colors text-xs">Solutions</a>
|
||||
<a href="#" class="text-gray-400 hover:text-white transition-colors text-xs">Research</a>
|
||||
<a href="#" class="text-gray-400 hover:text-white transition-colors text-xs">Contact</a>
|
||||
</div>
|
||||
</div>
|
||||
<div class="mt-4 pt-4 border-t border-gray-800 text-center text-gray-500 text-xs">
|
||||
<p>© 2025 CypSec. All rights reserved.</p>
|
||||
</div>
|
||||
</div>
|
||||
</footer>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
BIN
inde/cypsec-logo-white-transparent.webp
Normal file
BIN
inde/cypsec-logo-white-transparent.webp
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 7.6 KiB |
Reference in New Issue
Block a user