← Wireframe Overview
Navigation — Fixed, 72px
INTRUSION LOGO
Why IntrusionHow It WorksProofProducts ▾Industries ▾PartnersPOV BOOK A DEMO
Sticky nav. Dark navy bg with blur. Dropdowns for Products and Industries. Mobile: hamburger.
The Two Things
EVERY ATTACKER NEEDS
Every attacker needs two things to succeed
Reconnaissance
Map the network before attacking
Command & Control
Callback channel after initial access
2-column explanation of the two attack requirements Shield blocks.
Where Shield Breaks the Chain
KILL CHAIN
Kill the recon. Cut the callback.
Visual flow diagram showing the attack chain and where Shield intercepts at two points. Animated pipeline: Recon → Blocked → Callback → Killed.
Attack chain visualization with two intercept points highlighted in lime.
Deployment Models
ONE INTELLIGENCE LAYER
Every deployment model. One engine.
Cloud / AWS
Shield Stratus
On-Premise
Shield OnPrem
Endpoint
Shield Endpoint
Network
Shield Sentinel
Gateway
Shield Gateway
Console
Command Hub
6 deployment model cards showing how one engine powers all products.
Footer
4-column footer. Logo + GPTW badges | Products | Industries | Company. Headings in lime. All links clickable to wireframe pages.
← Back to Wireframe Overview · Prepared by AWC for Intrusion Inc. — April 2026