1~4 item / All 4 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~4 item / All 4 items
We offer "Censys Attack Surface Management," which discovers, inventories, and monitors all resources publicly available on the internet. Every day, every hour, or on demand, the attacker's perspective on all those resources is refreshed, providing near real-time visibility and context, allowing you to manage and communicate your cybersecurity posture. 【Features and Characteristics】 ■ Discovery Path ■ Workspace ■ Risk Prioritization ■ Interactive Reports ■ API Integration ■ Censys Academy *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"Senda" is world-class internet intelligence. It can discover publicly exposed assets through shadow IT. It can automatically identify assets with configuration errors, as well as determine which assets have a high level of risk. Please feel free to contact us if you have any inquiries. 【Features】 ■ Discover publicly exposed assets through shadow IT ■ Automatically identify assets with configuration errors ■ Discover management consoles that remain exposed ■ Determine which assets have a high level of risk *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"GOOSEC" is software designed to combat online skimming. By detecting and preventing online skimming, it protects against the leakage of credit card information and personal data entered on e-commerce sites. Additionally, by using crawlers, it can detect where tampering occurs that leads users to fake payment pages, and by notifying the administrators of e-commerce sites, it minimizes potential damage. [Services] ■ Real-time defense and detection of online skimming damage ■ Skimming detection features using crawlers tailored to the characteristics of e-commerce sites ■ Countermeasures to disable detection scripts *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"kr:ns (Chronos)" is an IP reputation service that matches a vast amount of observational data collected through an extensive observation network with your IP address as unique Threat Intelligence. We have entered into a joint research agreement with the National Institute of Information and Communications Technology (NICT) and the Cybersecurity Nexus (CYNEX) to evaluate the effectiveness of this Threat Intelligence. Additionally, this information can be integrated into and analyzed by SIEM systems. [Examples of analysis results obtained from dynamic analysis of IoT malware (partial)] ■ Target port numbers for scans conducted to spread infection ■ Information on communication destinations believed to be C2 servers ■ Port numbers that the malware listens on ■ DNS communications conducted by the malware *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration