|
|
Related Products
-
Kroll Cyber Risk
We are the world incident response leader. Merging complete response capabilities with frontline threat intelligence from over 3000 incidents handled per year and end-to-end expertise we protect, detect and respond against cyberattacks. For immediate assistance, contact us today.
Tackle every facet of today and tomorrow’s threat landscape with guidance from Kroll’s Cyber Risk experts. Enriched by frontline threat intel from 3000+ incidents cases every year, our end-to-end cyber risk solutions help organizations uncover exposures, validate the effectiveness of their defenses, implement new or updated controls, fine-tune detections and confidently respond to any threat.
Get access to a wide portfolio of preparedness, resilience, detection and response services with a Kroll Cyber Risk retainer. Get in touch for more info.
-
Source Defense
Source Defense is a mission critical element of web security designed to protect data at the point of input. The Source Defense Platform provides a simple and effective solution for data security and data privacy compliance – addressing threats and risks originating from the increased use of JavaScript, third-party vendors, and open-source code in your web properties. The Platform provides options for securing your own code, as well as addressing a ubiquitous gap in the management of third-party digital supply chain risk – controlling the actions of the third-party, fourth and nth party JavaScript that powers your site experience.
The Source Defense Platform protects against all forms of client-side security incidents – keylogging, formjacking, digital skimming, Magecart, etc. – by extending web security beyond the server to the client-side (the browser).
-
Hotspot Shield
Protect yourself with military-grade encryption, and access sites and streaming content around the world. Hotspot Shield encrypts your connection and doesn’t log any data that could be tied to you, shielding your identity and info from hackers and cyber predators. With servers across 80+ countries and 35+ cities, our proprietary Hydra protocol optimizes your VPN to ensure fast, secure connections for gaming, streaming, downloading, P2P, and more.
-
aiReflex
Fraud.com's aiReflex determines which transactions are legitimate in real-time using a multi-layer defence coupled with explainable AI to fight fraud & improve customer trust.
The detection layer analyses your transactional data in real-time to deliver unmatched risk-scoring accuracy. The multi-layer defence identifies suspicious transactions using our adaptive machine learning algorithms, adaptive rules & next-generational behavioural engine to create hyper granular profiles for every individual to identify abnormal behaviour.
aiReflex's Response layer manages fraud centrally via an omnichannel case manager, automating tasks & decision-making to reduce fraud, friction & fraud team inefficiencies. Investigators become superheroes with a 360-degree view of the customer and explainable AI to manage a case with great accuracy & speed, with intelligent search, reporting, queue management & link analysis.
Contact us at fraud.com to learn how we can improve your fraud defences.
-
Ambassador
Ambassador Edge Stack is a Kubernetes-native API Gateway that delivers the scalability, security, and simplicity for some of the world's largest Kubernetes installations. Edge Stack makes securing microservices easy with a comprehensive set of security functionality, including automatic TLS, authentication, rate limiting, WAF integration, and fine-grained access control.
The API Gateway contains a modern Kubernetes ingress controller that supports a broad range of protocols including gRPC and gRPC-Web, supports TLS termination, and provides traffic management controls for resource availability.
Why use Ambassador Edge Stack API Gateway?
- Accelerate Scalability: Manage high traffic volumes and distribute incoming requests across multiple backend services, ensuring reliable application performance.
- Enhanced Security: Protect your APIs from unauthorized access and malicious attacks with robust security features.
- Improve Productivity & Developer Experience
-
Cisco Duo
Protect your workforce with simple, powerful access security. We're Cisco Duo. Our modern access security is designed to safeguard all users, devices, and applications — so you can stay focused on what you do best. Secure access for any user and device, to any environment, from anywhere. Get the peace-of-mind only complete device visibility and trust can bring. Respond faster to threats with an easy‑to‑deploy, scalable SaaS solution that natively protects every application. Duo's access security shields any and every application from compromised credentials and devices, and its comprehensive coverage helps you meet compliance requirements with ease. Duo natively integrates with applications to provide flexible, user-friendly security that's quick to roll out and easy to manage. It's a win, win, win for users, administrators, and IT teams alike. Lay the foundation for your zero-trust journey with multi-factor authentication, dynamic device trust, adaptive authentication and secure SSO.
-
NINJIO
NINJIO lowers human-based cybersecurity risk through engaging training, personalized testing, and insightful reporting. Our multi-pronged approach to training focuses on the latest attack vectors to build employee knowledge and the behavioral science behind human engineering to sharpen users’ intuition. The proprietary NINJIO Risk Algorithm™ identifies users’ social engineering vulnerabilities based on phishing simulation data and informs content delivery to provide a personalized experience that changes individual behavior.
With NINJIO you get:
- NINJIO AWARE attack vector-based training that engages viewers with Hollywood style, micro learning episodes based on real hacks.
- NINJIO PHISH3D simulated phishing identifies the specific social engineering tricks most likely to fool users in your organization.
- NINJIO SENSE is our new behavioral science-based training course that shows employees what it “feels like” when hackers are trying to manipulate them.
-
dilisense
Perform your sanctions screening and PEP check obligations with dilisense.
Navigating the complex landscape of AML, KYC and CTF regulations can be a challenging task for compliance officers. dilisense offers an efficient, reliable sanctions screening and PEP check solution to ensure your organization stays ahead of regulatory requirements and mitigates risk effectively.
Our sanctions database covers OFAC, EU, OFSI, UN and over 120 other sanction lists. The PEP and criminal watchlist database covers global, regional and local sources.
Besides providing access via REST API, we also provide the option to download the full database to your premises with multiple updates per day.
With prices as low as 0.01 EUR per screening, costs play no longer a role in your compliance strategy and sanctions screening procedures.
For a quick start, we also offer Batch Screenings from within MS Excel files which can be started with no integration or set-up effort.
-
Twilio Verify
100% Protection from SMS pumping fraud with Verify.
Verify is a fully managed API for multichannel user verification. And it now includes guaranteed protection from SMS pumping fraud with Fraud Guard. Terms apply.
A multi-channel user verification solution in one turnkey API. Add seamless two-factor authentication to your onboarding and login flow with a single API that does the work of a full one-time password (OTP) delivery solution.
Fraud Guard has already saved customers over $46 million by blocking over 398 million* fraud attempts. With first-to-market innovation, Fraud Guard offers 100% protection against SMS pumping fraud.
Quickly integrate a ready-use solution that handles all your connectivity, channels, code generation, fraud monitoring, and more using native software—so you don’t have to.
Reduce fraud across your multi-channel user experience with phone number verification that uses one API endpoint to validate users and detect fraud with minimal friction.
-
R3 Contract Management for GovCon
R3 Contract Management for GovCon is a practical, flexible, and affordable software solution purpose-built for small to mid-sized Federal Government Contractors. Use it to manage your contracts, subcontracts, mods, CLINs, CDRLs, and FAR clauses.......all in one, integrated system. Quickly create contract briefs, manage CUI/ITAR with our CMMC-compliant system, reduce risk, and improve productivity.
Don’t waste another minute searching your hard drive or email for the right documents, creating spreadsheets of contract data and information, or worrying whether you have the most recent versions. Gain greater control over your contracts by storing your contracts and all the related data and documents in a secure, centralized contract repository. Our role-based permissions and security allows you to protect and share information with those who may need it, including program managers and others who deliver the work under the contract.
|
|