Navigation

Set your main menu in Appearance > Menus

Software Asia Limited
MENUMENU
  • ABOUT US
    • COMPANY OVERVIEW
    • OUR PARTNERS
    • JOIN US TODAY
      • AS OUR SOFTWARE PUBLISHERS
      • AS OUR PROCUREMENT MANAGERS
      • AS OUR RESELLERS
    • CAREER WITH LOGON
    • CONTACT US
  • INFORMATION SECURITY
    • Vulnerability Management
    • Multifactor Authentication
    • Threat Intelligence
    • Network Management Solutions
    • Security Information and Event Management
    • Remote Access Software
    • Systems Administration Tools
    • Robotic Process Automation
    • Data Loss Prevention
    • Data / Password Recovery
    • Asset Management Solutions
    • Identity and Access Management
    • Antivirus
    • Activity Monitoring and Surveillance
    • Forensic Solutions
    • Content Disarm and Reconstruction
  • SOFTWARE DEVELOPMENT
    • Integrated Development Environments
    • Development Components
      • UI Components
      • Networking Components
      • Office Components
      • Barcode Components
      • Communication
    • Imaging Solutions
    • Software Localization
    • Release Automation & Management
    • eLearning Authoring Solutions
    • Charting Solutions
    • PDF Solutions
    • Reporting Solutions
    • Testing & QA
    • Text Retrieval/Enterprise Search
    • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • WHAT'S NEW
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • SEARCH

Set your main menu in Appearance > Menus

Email Us Service Hotline: +852 25128491
Software Asia Limited
MENUMENU
  • ABOUT US
    • COMPANY OVERVIEW
    • OUR PARTNERS
    • JOIN US TODAY
      • AS OUR SOFTWARE PUBLISHERS
      • AS OUR PROCUREMENT MANAGERS
      • AS OUR RESELLERS
    • CAREER WITH LOGON
    • CONTACT US
  • INFORMATION SECURITY
    • Vulnerability Management
    • Multifactor Authentication
    • Threat Intelligence
    • Network Management Solutions
    • Security Information and Event Management
    • Remote Access Software
    • Systems Administration Tools
    • Robotic Process Automation
    • Data Loss Prevention
    • Data / Password Recovery
    • Asset Management Solutions
    • Identity and Access Management
    • Antivirus
    • Activity Monitoring and Surveillance
    • Forensic Solutions
    • Content Disarm and Reconstruction
  • SOFTWARE DEVELOPMENT
    • Integrated Development Environments
    • Development Components
      • UI Components
      • Networking Components
      • Office Components
      • Barcode Components
      • Communication
    • Imaging Solutions
    • Software Localization
    • Release Automation & Management
    • eLearning Authoring Solutions
    • Charting Solutions
    • PDF Solutions
    • Reporting Solutions
    • Testing & QA
    • Text Retrieval/Enterprise Search
    • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • WHAT'S NEW
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • SEARCH
View large
news, reflectiz-news

Reflectiz Version 2.8 live now

Posted on at by

Version 2.8 NOW LIVE!

Taking Third-Party Application Security to the Next Level!

Meet Your New Multiple Website Dashboard

Almost any organization today uses dozens of websites and subdomains. Each provides essential functions and uses dozens of third-party apps and tags to produce its capabilities. Those assets are managed by multiple teams on the enterprise level and medium-large organizations, requiring different conduct and high-level attention.

High-Level Overview First

Securing multiple subdomains with tens of thousands of webpages and dozens of third-party apps running on each, requires a continuous high-level approach. One that goes hand in hand with a more in-depth behavioral analysis for each asset.

The need and the increased challenges, have led us to launch a dedicated security functionality for multiple websites and subdomains. The new dashboard was carefully designed to address a high number of threats, according to the risk levels and the security segment.

The multiple website dashboard offers an overall view of the different risks generated by the running third-parties and their  handled processes. This allows effective decision-making and rapid threat conduct, according to the level of risk and severity.

What does the new 2.8 dashboard offer?

Each tool was carefully designed to provide the much needed visibility for enterprise management, from one location, along with clickable walk-through to the core of each instance.

Issues Per Category

This section allows you to easily identify security and privacy issues, according to severity and relevant category.

Each of the six segments refers to a different risk category, allowing effective risk mitigation and mission allocation. The graphs are all clickable, allowing you to scroll directly to the addressed issues or status you want to check, all marked by severity level and status.

  • Malicious Detection

    This graph shows alerts of malicious known scripts and domains and requests that were actively detected on your assets.

  • Unapproved Behaviors

    Unauthorized or unapproved script behaviors. Behaviors such as keylogging, GPS or media activation and more.

  • Inventory Changes

    Changes in your approved application baseline, for example when a new unapproved third-party is joining in.

  • Domain Issues

    Review all the domain related alerts and notification, such as domain and certificates issues.

  • Privacy Topics

    Spot issues that are related to privacy or regulations and are affected by script actions and behaviors.

  • Intelligence Feeds

    Get multiple website security information, based upon collecting data from global sources and Reflectiz’ intelligence feed.

Grouped Overview

All your managed website and subdomains are concentrated in one place, each is searchable.

Active Alerts Status

This graph demonstrates high and medium alerts, presenting their active status.

Each segment is clickable, allowing effective risk management within a single dashboard, all through from receiving the alert until its approval.

The Workflow Statue Module

This graph is designed to let you effectively follow progress or detect potential restraints within mitigation processes. Each line presents the status of each alert by type, assigned date and current state – incoming / outgoing, resolved or not and so on.

Geographic Display, by Country

Quick data flow overview by geo-division, allowing you to spot suspicions locations and easily drill into the related information.

Click here for FREE Website Risk Detection from Reflectiz!

REQUEST FREE RISK ANALYSIS
was last modified: October 8th, 2020 by
Share Post
Previous
Acunetix Webinar | Web Vulnerability Scanner V13 Solution Walkthrough
Next
[Reflectiz] The Gocgle Malicious Campaign

About Author

COMPANY

Company Overview
Career with LOGON
Contact Us

JOIN US TODAY

Resellers
Software Publishers
Procurement Managers

WE ARE AVAILABLE ON

SAP Ariba   coupa

gem

SERVICES

Training Services
Implemetation Services
After-sales Services
Best Practices Consulting

WHAT'S NEW

Events
Latest Updates
Special Offers

FOLLOW US ON

GET IN TOUCH

Phone:+852 25128491
Email: sales@logon-int.com

Legal   |   Privacy Policy

Important Links

  • Call me
  • Legal
  • Privacy Policy

Search engine

Use this form to find things you need on this site
Search

Results for {phrase} ({results_count} of {results_count_total})

Displaying {results_count} results of {results_count_total}

Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt
Newsletter
Contact Us Today
Book a Demo with us


Book a Demo with us


Free Website Risk Detection Request

    Request a Demo !

      Search

      Results for {phrase} ({results_count} of {results_count_total})

      Displaying {results_count} results of {results_count_total}

      Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

      Generic filters
      Exact matches only
      Search in title
      Search in content
      Search in excerpt
      UserLock Video