Why Intrusion
How It Works
Products
▾
Shield Overview
Cloud Security
On-Premise
Endpoint
Consulting
Proof
Partners
Defenders
Book a Demo
☰
← Wireframe Overview
Navigation — Fixed, 72px
INTRUSION LOGO
Why Intrusion
How It Works
Proof
Products ▾
Industries ▾
Partners
POV
BOOK A DEMO
Sticky nav. Dark navy bg with blur. Dropdowns for Products and Industries. Mobile: hamburger.
Hero Section
PROOF OF VALUE
This is not a demo.
This is Shield in your network.
See what Shield blocks in your network — before you buy anything. Up to 30 days.
BOOK A DEMO
LEARN MORE
[ Hero image / illustration ]
POV hero. Emphasis on real-network testing.
Not a Lab Test
REAL ENVIRONMENT
Not a lab test. Real traffic. Real results.
Your Network
Real traffic, real environment
30 Days
Full evaluation period
Success Criteria
Agreed before we start
3-column POV differentiation cards.
From Request to Report
THE PROCESS
From request to report — every step.
Timeline: 1) 30-min scoping call → 2) Success criteria agreed → 3) Shield deployed → 4) 30-day evaluation → 5) Full report for leadership.
5-step process timeline with descriptions.
Clear Yes or Clear No
TRANSPARENT
Clear yes or
clear no.
No Pressure
Evaluation, not a sales tactic
Full Report
Leadership-ready documentation
Your Decision
Data-driven, not pitch-driven
Transparency messaging. 3 cards.
CTA Section
Start your
Proof of Value.
30 minutes to get started.
BOOK A DEMO
START A POV
Full-width CTA strip. Navy gradient bg. Two centered buttons.
Footer
INTRUSION LOGO
GPTW 2024
GPTW 2025
BOOK A DEMO
PRODUCTS
Shield Overview
Cloud Security
On-Premise
Endpoint
Consulting
INDUSTRIES
Enterprise
Healthcare
Manufacturing
Critical Infrastructure
SLED
MSP / Channel
COMPANY
Leadership
Why Intrusion
How It Works
Proof
Partners
Defenders
Book A Demo
4-column footer. Logo + GPTW badges | Products | Industries | Company. Headings in lime. All links clickable to wireframe pages.
← Back to Wireframe Overview
· Prepared by AWC for Intrusion Inc. — April 2026