diff --git a/website/assets/styles/pages/endpoint-ops.less b/website/assets/styles/pages/endpoint-ops.less index 52cdb203514c..a2459aa9ebe9 100644 --- a/website/assets/styles/pages/endpoint-ops.less +++ b/website/assets/styles/pages/endpoint-ops.less @@ -361,44 +361,52 @@ line-height: 24px; } } - [purpose='three-column-features'] { - margin-bottom: 160px; max-width: 1080px; - [purpose='feature-row'] { - &:not(:last-of-type) { - margin-bottom: 60px; - } - [purpose='feature-item'] { - margin-left: 40px; - margin-right: 40px; - max-width: 266px; - width: 33%; - p { - font-size: 14px; - font-weight: 400; - line-height: 21px; - } - } - } + margin-bottom: 160px; h2 { font-size: 32px; line-height: 48px; margin-bottom: 40px; } } + [purpose='responsive-feature-row'] { + margin-right: 0px; + margin-left: 0px; + [purpose='feature-item'] { + padding-right: 24px; + padding-left: 24px; + margin-bottom: 64px; + h5 { + font-size: 16px; + line-height: 1.2; + font-weight: 800; + } + a { + color: @core-fleet-black-75; + text-decoration: underline; + &:hover { + color: @core-fleet-black-75; + } + } + img { + height: 48px; + width: auto; + margin-bottom: 16px; + } + h5 { + font-weight: 800; + font-size: 16px; + line-height: 1.2; + margin-bottom: 16px; + } - [purpose='feature-item'] { - img { - height: 48px; - width: auto; - margin-bottom: 16px; - } - h5 { - font-weight: 800; - font-size: 16px; - line-height: 27px; - margin-bottom: 16px; + p { + font-size: 14px; + font-weight: 400; + line-height: 21px; + margin-bottom: 0px; + } } } @@ -541,6 +549,18 @@ [purpose='feature-text'] { width: 410px; } + [purpose='responsive-feature-row'] { + [purpose='feature-item'] { + padding-right: 24px; + padding-left: 24px; + margin-bottom: 64px; + p { + font-size: 14px; + font-weight: 400; + line-height: 21px; + } + } + } } @media (max-width: 767px) { @@ -701,18 +721,16 @@ margin-left: 10px; } } - [purpose='three-column-features'] { - [purpose='feature-row'] { - [purpose='feature-item'] { - - margin-left: 0; - margin-right: 0; - text-align: center; - max-width: 320px; - width: 100%; - &:not(:last-of-type) { - margin-bottom: 60px; - } + [purpose='responsive-feature-row'] { + [purpose='feature-item'] { + padding-right: 0px; + padding-left: 0px; + margin-bottom: 64px; + text-align: center; + p { + font-size: 14px; + font-weight: 400; + line-height: 21px; } } } diff --git a/website/views/pages/endpoint-ops.ejs b/website/views/pages/endpoint-ops.ejs index c9cfbb40fa41..18043c869fd8 100644 --- a/website/views/pages/endpoint-ops.ejs +++ b/website/views/pages/endpoint-ops.ejs @@ -138,43 +138,38 @@
- -
-
+
+
Software and asset inventory
Live connection

Talk to online devices in real time with Fleet’s live query API. Implement custom workflows like conditional access based on device posture, Identity, and more.

-
+
Software and asset inventory
Software and asset inventory

Get visibility into all endpoints across any operating system*, including support for servers and containers in every cloud infrastructure.

-
+
See logins for every endpoint
See logins for every endpoint

Identify who logs in to any system, including login history and current sessions. Look up any computer by the email address of the person using it.

- -
-
- -
+
CIS benchmarks
CIS benchmarks

Keep all your endpoints* compliant with customizable baselines, or use common benchmarks like CIS.

-
+
Verify updates and settings
EDR health checks

Verify that your EDR tools are installed and working so you can identify and address configuration issues quickly.

-
+
Verify updates and settings
Verify updates and settings

Track progress towards deadlines for security posture remediation projects, and enforce due dates through automations.

@@ -202,23 +197,21 @@

“Zero” trust, fewer tickets

You can use Fleet’s API to customize every aspect of conditional access – even the stuff your CISO hasn’t thought of yet.

-
-
- -
+
+
Get in front of the IdP
Get in front of the IdP

Gate access with common device trust policies from industry peers, or roll out your own device health checks using system data and events.

-
+
Step-by-step instructions
Step-by-step instructions

Show resolution steps or use custom HTML to show employees what they need to do to restore their access without waiting on a ticket. Then give it back automatically, as soon as the problems are fixed.

-
+
Manage device posture
Live retry

Give people a way to get back to work quickly and minimize downtime. Fleet’s live query API instantly re-checks the OS version and other device state so users don’t get locked out.

@@ -249,40 +242,38 @@
- -
-
+
+
Incident response (IR)
Incident response (IR)

Contain and recover from breaches using live data, remote commands, and automated workflows.

-
+
Detection and response
Detection and response

Ship logs and alerts when unusual behavior is detected. Run scripts on demand or when alerts trigger.

-
+
File access monitoring (FIM)
File access monitoring (FIM)

Specify files to monitor for changes or deletions, then log those events to your SIEM or data lake.

-
-
-
+ +
Attack surface management
Attack surface management

Discover security misconfigurations and vulnerabilities and prioritize risks that matter to your organization.

-
+
Malware detection
Malware detection

Continuously scan host filesystems for indicators of compromise (IOC). Import malware signatures from threat intelligence sources.

-
+
Osquery made easy
Osquery made easy

Collect exactly the data you need from your production infrastructure across every cloud and data center*.