Loading
You're currently filtering by:
SafeDoor® by authUSB
USB devices can serve as vectors for various types of attacks on industrial systems. Malware-Laden USB Drives  Malicious Firmware Updates Hidden Backdoors Data Exfiltration Staging Attacks Social Engi …
Salt Security API Protection Platform

Salt Security API Protection Platform

28 Jul 2023 Salt Security
Your growing API attack surface Hundreds of millions of application programming interfaces (APIs) power the digital economy, and that figure continues to expand at a relentless pace. While development …
SAP® GRC services
Through the SAP GRC (Governance, Risk, and Compliance) tool, we integrate risk management into the strategy, planning and operation of organisations.
SAP® Security Services
Services oriented to the risk management of SAP systems typically caused by the absence of appropriate policies and procedures.
Scale coverage of suppliers from 5% to 95%
Scale your coverage of suppliers from 5% to 95%. Spot more vulnerabilities at just 10% of the cost of your current programme.
Secure by Design (SbD) Assurance
Secure by Design shifts cyber assurance from a one-off exercise to a continuous risk management model, ensuring security is built in and maintained throughout the life of a product or service. At CDS …
Secure by Design (SbD) Training & Consultancy
Security should never be an afterthought. Our Secure by Design service ensures that cyber security is embedded from the earliest stages of system development through expert-led, hands-on training tail …
Secure file sharing without compromise
Advanced encryption. File fragmentation.100% File location control and sovereignty.
SecurityCoach
SecurityCoach is the first real-time security coaching product created to help IT and Security Operations teams further protect your organization’s largest attack surface—your employees. SecurityCoach …
See the security posture of all your suppliers in real time
Risk Ledger facilitates communication. Whether you need to check something with a supplier or work with other teams internally, from procurement to HR to compliance.
26 Results