Overview
Security technology that monitors endpoint devices to detect, investigate, and respond to cyber threats.
More in Cybersecurity
Cross-Site Scripting
Offensive SecurityA web security vulnerability allowing attackers to inject malicious scripts into web pages viewed by other users.
Security Information and Event Management
Offensive SecurityTechnology that aggregates and analyses security data from across an organisation to detect threats.
Vulnerability Assessment
Offensive SecurityThe process of identifying, quantifying, and prioritising security vulnerabilities in systems and applications.
Secrets Management
Identity & AccessThe secure storage, distribution, rotation, and auditing of sensitive credentials such as API keys, tokens, passwords, and certificates used by applications and services.
Compliance Framework
Security GovernanceA structured set of guidelines and best practices for meeting regulatory requirements and industry standards.
Multi-Factor Authentication
Identity & AccessAn authentication method requiring two or more verification factors to gain access to a resource.
Red Team
Offensive SecurityA group of security professionals who simulate real-world attacks to test an organisation's defensive capabilities.
Attack Surface Management
Offensive SecurityThe continuous discovery, inventory, classification, and monitoring of all external-facing digital assets to identify and reduce an organisation's exposure to cyber threats.