|
1 | 1 | { |
| 2 | + "meta": { |
| 3 | + "title": "Force Field - Real-Time LLM Firewall | AI Security", |
| 4 | + "description": "Sub-millisecond protection against prompt injection, model manipulation, and knowledge leaks for any LLM. Security audit passed, production ready.", |
| 5 | + "keywords": "LLM Firewall, AI Security, Prompt Injection Prevention, LLM Security, AI Governance" |
| 6 | + }, |
2 | 7 | "hero": { |
3 | 8 | "title": "Force Field", |
4 | | - "subtitle": "Secure Your Knowledge-System Inference Layer", |
5 | | - "description": "Force Field serves as the gateway to secure your knowledge-system inference layer. It intercepts prompts, enforces policies, monitors output and offers full auditability." |
| 9 | + "tagline": "Your Real-Time LLM Firewall", |
| 10 | + "subtitle": "Sub-millisecond protection against prompt injection, model manipulation, and knowledge leaks - for any LLM.", |
| 11 | + "trust_badges": ["Security Audit Passed", "Production Ready", "<1ms Latency"], |
| 12 | + "cta_primary": "Book a Demo with the CTO", |
| 13 | + "cta_secondary": "Request Access to Test the MVP" |
6 | 14 | }, |
7 | | - "overview": { |
8 | | - "title": "What Is Force Field?", |
9 | | - "description": "Force Field is a security layer that sits between your users and your LLM-powered knowledge systems. It provides real-time protection against prompt injection, model manipulation, and knowledge leaks while maintaining full audit trails of all interactions.", |
10 | | - "features": [ |
11 | | - "Prompt interception and sanitization", |
12 | | - "Policy-driven filtering and controls", |
13 | | - "Real-time output monitoring and validation", |
14 | | - "Comprehensive audit logging", |
15 | | - "Identity and access management integration" |
| 15 | + "problem": { |
| 16 | + "title": "LLMs Are Vulnerable. Enterprises Need Real-Time Defense.", |
| 17 | + "description": "Attack success rates in common LLMs exceed 65%. Prompt injection, schema manipulation, and retrieval exploits bypass traditional tools. Enterprises lack visibility into prompt-level interactions and cannot enforce governance or prevent unintended model behavior.", |
| 18 | + "conclusion": "A real-time inspection and control layer is now essential for keeping AI secure, compliant, and aligned with business rules.", |
| 19 | + "risks": [ |
| 20 | + { "title": "Data Leaks", "icon": "Database" }, |
| 21 | + { "title": "Uncontrolled Outputs", "icon": "AlertTriangle" }, |
| 22 | + { "title": "Regulatory Exposure", "icon": "FileWarning" } |
| 23 | + ] |
| 24 | + }, |
| 25 | + "solution": { |
| 26 | + "title": "The LLM Firewall Built for Production", |
| 27 | + "description": "Force Field is a security layer that sits between users and your LLM-powered knowledge systems. It intercepts prompts, inspects outputs, enforces policies, and logs everything.", |
| 28 | + "highlight": "It uses a multi-phase defense pipeline - normalization, signature detection, semantic screening, and OR-fusion - to stop known attacks with 87% accuracy and 0% false positives, all with <1ms latency.", |
| 29 | + "cta": "Request Access to Test the MVP" |
| 30 | + }, |
| 31 | + "capabilities": { |
| 32 | + "title": "Key Capabilities", |
| 33 | + "items": [ |
| 34 | + { |
| 35 | + "title": "Prompt Interception & Sanitation", |
| 36 | + "description": "Force Field captures and filters inputs before they reach your model.", |
| 37 | + "icon": "Shield" |
| 38 | + }, |
| 39 | + { |
| 40 | + "title": "Real-Time Output Monitoring", |
| 41 | + "description": "Every response is checked for leaks, hallucinations, or policy violations.", |
| 42 | + "icon": "Eye" |
| 43 | + }, |
| 44 | + { |
| 45 | + "title": "Policy-Based Access Controls", |
| 46 | + "description": "Use IAM to control who can ask what, and get what answers.", |
| 47 | + "icon": "Lock" |
| 48 | + }, |
| 49 | + { |
| 50 | + "title": "Zero Trust Architecture", |
| 51 | + "description": "Full mTLS, no shared secrets, Vault integration.", |
| 52 | + "icon": "ShieldCheck" |
| 53 | + }, |
| 54 | + { |
| 55 | + "title": "Comprehensive Audit Logging", |
| 56 | + "description": "Every interaction is recorded for compliance, debugging, and trust.", |
| 57 | + "icon": "FileText" |
| 58 | + }, |
| 59 | + { |
| 60 | + "title": "Sub-Millisecond Latency", |
| 61 | + "description": "Adds <1ms, even on CPU - production safe.", |
| 62 | + "icon": "Zap" |
| 63 | + } |
16 | 64 | ] |
17 | 65 | }, |
18 | 66 | "how_it_works": { |
19 | | - "title": "How It Works", |
| 67 | + "title": "Inspect. Govern. Monitor. Repeat.", |
| 68 | + "subtitle": "How Force Field Protects Your LLMs", |
20 | 69 | "steps": [ |
21 | 70 | { |
22 | 71 | "number": "01", |
23 | 72 | "title": "Intercept", |
24 | | - "description": "Force Field captures all prompts and inputs before they reach your LLM or knowledge system." |
| 73 | + "description": "Force Field captures all prompts before they reach your LLM.", |
| 74 | + "label": "Edge Proxy" |
25 | 75 | }, |
26 | 76 | { |
27 | 77 | "number": "02", |
28 | | - "title": "Analyze & Enforce", |
29 | | - "description": "Applies your security policies, filters malicious patterns, and validates against governance rules." |
| 78 | + "title": "Analyze & Apply", |
| 79 | + "description": "Sanitize inputs, apply policies, and detect threats in real-time.", |
| 80 | + "label": "Detectors + Policy Engine" |
30 | 81 | }, |
31 | 82 | { |
32 | 83 | "number": "03", |
33 | | - "title": "Monitor Output", |
34 | | - "description": "Inspects model responses for sensitive data leaks, hallucinations, or policy violations." |
| 84 | + "title": "Monitor Exits", |
| 85 | + "description": "Check responses for data leaks or inappropriate content.", |
| 86 | + "label": "Postprocessor" |
35 | 87 | }, |
36 | 88 | { |
37 | 89 | "number": "04", |
38 | | - "title": "Log & Audit", |
39 | | - "description": "Records every interaction with full context for compliance, debugging, and continuous improvement." |
| 90 | + "title": "Log Everything", |
| 91 | + "description": "Store full interaction trails for compliance and forensics.", |
| 92 | + "label": "Audit Layer" |
40 | 93 | } |
41 | 94 | ] |
42 | 95 | }, |
43 | | - "benefits": { |
44 | | - "title": "Why Force Field?", |
| 96 | + "differentiators": { |
| 97 | + "title": "What Makes Force Field Different", |
45 | 98 | "items": [ |
46 | 99 | { |
47 | | - "title": "Prevent Prompt Injection", |
48 | | - "description": "Detect and block adversarial inputs attempting to manipulate your AI systems.", |
49 | | - "icon": "Shield" |
| 100 | + "title": "Fast Performance", |
| 101 | + "description": "Adds <1ms latency to your inference pipeline.", |
| 102 | + "icon": "Zap" |
50 | 103 | }, |
51 | 104 | { |
52 | | - "title": "Enforce Knowledge Policies", |
53 | | - "description": "Control what information can be accessed, processed, and returned by your systems.", |
54 | | - "icon": "Lock" |
| 105 | + "title": "Model-Agnostic", |
| 106 | + "description": "Works with any LLM: OpenAI, Claude, Ollama, and more.", |
| 107 | + "icon": "Layers" |
55 | 108 | }, |
56 | 109 | { |
57 | | - "title": "Maintain Audit Trails", |
58 | | - "description": "Full visibility into every AI interaction for compliance and accountability.", |
59 | | - "icon": "FileText" |
| 110 | + "title": "Threshold-Free OR-Fusion", |
| 111 | + "description": "No tuning needed for strong detection performance.", |
| 112 | + "icon": "Sliders" |
| 113 | + }, |
| 114 | + { |
| 115 | + "title": "IAM Integration", |
| 116 | + "description": "Enforce policy by user, role, or group.", |
| 117 | + "icon": "Users" |
60 | 118 | }, |
61 | 119 | { |
62 | | - "title": "Reduce Risk", |
63 | | - "description": "Minimize exposure to model misuse, data leaks, and regulatory non-compliance.", |
64 | | - "icon": "AlertTriangle" |
| 120 | + "title": "Audit-First Design", |
| 121 | + "description": "Logs everything for compliance and incident response.", |
| 122 | + "icon": "ClipboardList" |
| 123 | + }, |
| 124 | + { |
| 125 | + "title": "Flexible Deployment", |
| 126 | + "description": "SaaS, Hybrid, or On-Prem - your call.", |
| 127 | + "icon": "Cloud" |
65 | 128 | } |
66 | 129 | ] |
67 | 130 | }, |
|
70 | 133 | "list": [ |
71 | 134 | { |
72 | 135 | "title": "Enterprise RAG Systems", |
73 | | - "description": "Secure retrieval-augmented generation pipelines handling sensitive corporate knowledge." |
| 136 | + "description": "Protect internal knowledge during retrieval and generation.", |
| 137 | + "icon": "Building" |
74 | 138 | }, |
75 | 139 | { |
76 | | - "title": "Customer-Facing AI Assistants", |
77 | | - "description": "Protect public-facing chatbots from prompt injection and ensure policy compliance." |
| 140 | + "title": "Public-Facing AI Assistants", |
| 141 | + "description": "Stop jailbreaks and brand-damaging outputs.", |
| 142 | + "icon": "MessageCircle" |
78 | 143 | }, |
79 | 144 | { |
80 | | - "title": "Healthcare Decision Support", |
81 | | - "description": "HIPAA-compliant monitoring and audit trails for clinical AI systems." |
| 145 | + "title": "Health Decision Support", |
| 146 | + "description": "Enforce HIPAA-compliant audits on AI-driven insights.", |
| 147 | + "icon": "Heart" |
82 | 148 | }, |
83 | 149 | { |
84 | | - "title": "Financial Services AI", |
85 | | - "description": "Regulatory compliance and risk mitigation for AI-powered financial applications." |
| 150 | + "title": "Financial AI Workflows", |
| 151 | + "description": "Support regulatory compliance and detect risky prompts.", |
| 152 | + "icon": "DollarSign" |
86 | 153 | } |
87 | 154 | ] |
88 | 155 | }, |
89 | 156 | "cta": { |
90 | | - "title": "Ready to Secure Your Knowledge Systems?", |
91 | | - "subtitle": "Let's discuss how Force Field can protect your AI infrastructure.", |
92 | | - "button_primary": "Schedule a Demo", |
93 | | - "button_secondary": "Contact Sales" |
| 157 | + "title": "See the LLM Firewall in Action", |
| 158 | + "subtitle": "Get hands-on with Force Field and see how it protects your AI infrastructure.", |
| 159 | + "button_primary": "Book a Demo with the CTO", |
| 160 | + "button_secondary": "Request Access to Test the MVP" |
| 161 | + }, |
| 162 | + "form": { |
| 163 | + "title": "Request Access", |
| 164 | + "fields": { |
| 165 | + "first_name": "First Name", |
| 166 | + "last_name": "Last Name", |
| 167 | + "company": "Company", |
| 168 | + "email": "Business Email", |
| 169 | + "job_title": "Job Title (optional)", |
| 170 | + "message": "Message or use-case (optional)" |
| 171 | + }, |
| 172 | + "submit": "Submit Request", |
| 173 | + "success": "Thank you! We'll be in touch within 24 hours.", |
| 174 | + "error": "Something went wrong. Please try again." |
| 175 | + }, |
| 176 | + "footer": { |
| 177 | + "badges": ["Security Audited", "Open Source", "SOC 2 In Progress"] |
94 | 178 | } |
95 | 179 | } |
0 commit comments