NETRUNNER

Cyberpunk UI × B2B SaaS Landing Page — Design System Specimen

Blade Runner meets enterprise software. HUD framing. Neon accent lines. Data as commodity.

Corporate Dystopia as Design Language

Blade Runner meets enterprise software. Every dark interface is a command center, every neon accent line a live data feed. HUD framing turns mundane dashboards into tactical displays. Data is not information — it is commodity, and NETRUNNER is built to trade in it.

The corporation is the city. The network is the territory. We sell the tools to navigate both — and the aesthetic makes the operator feel powerful doing it. Red for threat, cyan for systems-go, yellow for the data that matters.

Void Black
#0A0A0F
Neon Red
#FF003C
Neon Cyan
#00F0FF
Neon Yellow
#F0FF00
Steel Gray
#2A2A35
Cyan Glow
Red Glow
Yellow Glow
Scanline Overlay

Note: The scanline overlay uses a repeating transparency gradient (transparent to semi-transparent) for the subtle line effect. This is documented separately from the main solid color palette.

DISPLAY — Clash Display 700 / 72px

System Override

HEADING — Clash Display 600 / 48px

Neural Interface

SUBHEADING — Clash Display 600 / 32px

Data Extraction Protocol

SECTION HEAD — Clash Display 500 / 24px

Encrypted Channel Active

BODY LARGE — Space Grotesk 400 / 18px

Enterprise-grade neural network infrastructure for real-time threat detection and automated response systems.

BODY — Space Grotesk 400 / 16px

Deploy autonomous monitoring agents across your entire digital perimeter. Zero latency. Total coverage.

CAPTION — Space Grotesk 500 / 12px

System Status: Online • Uptime: 99.97%

4
8
12
16
24
32
48
64

System icons use geometric unicode glyphs with neon glow treatments, evoking HUD targeting and data terminal motifs.

Image containers use HUD corner brackets with scanline textures over dark panel backgrounds.

[ HUD-Framed Image ]
16:9 Scanline Frame
System sync complete. All endpoints reporting nominal.
Warning: Unusual traffic pattern detected on port 8080.
Critical: Perimeter breach detected. Initiating containment.

Threat scan progress: 72% complete

"NETRUNNER caught a supply-chain compromise that bypassed every other tool in our stack. It paid for itself in the first 72 hours."
K. TANAKA — CISO, Meridian Financial Group

Your perimeter has already been breached.

The only question is whether you find out from us — or from them.

0.3ms
Response Time
99.97%
Uptime SLA
14K+
Threats Blocked / Day
2,400
Enterprise Clients
Module Status Latency
Neural Threat Engine Online 0.3ms
Autonomous Response Online 1.2ms
Deep Net Scanner Degraded 340ms

Hero Section

[ Next-Gen Cyber Defense Platform ]

Your network is
already compromised.

NETRUNNER deploys autonomous AI agents that detect, isolate, and neutralize threats before your team even wakes up.

Feature Blocks

Neural Threat Detection

AI-powered pattern recognition identifies zero-day exploits in real-time across all endpoints.

Autonomous Response

Automated containment protocols activate within milliseconds. No human latency in your kill chain.

Deep Net Intelligence

Continuous darknet scanning surfaces threats targeting your organization before they materialize.

Logo Bar

AXIOM
VEKTRON
SYNDICATE
NEXUS.IO
CORTEX

Pricing Table

RECON
$499/mo
  • Up to 500 endpoints
  • Basic threat detection
  • 24hr response SLA
  • Dashboard access
GHOST
Custom
  • Unlimited endpoints
  • Full neural suite
  • Deep net intelligence
  • Dedicated response team
  • On-prem deployment

Trust Badges / Status Indicators

SOC 2 Type II Certified
99.97% Uptime SLA
FedRAMP Pending
ISO 27001
Threat Level: Elevated

Footer