Free Security Assessments + 60-Day License

Get Started

Top Categories

Spotlight

today20 May 2020

Uncategorised Mark

Cybersel in conjunction with ProcessUnity Introduces Vendor Intelligence Suite, Launches Vendor Cyber Intelligence with BitSight to Enhance Third-Party Risk Management Programs

First in a Series of ProcessUnity Vendor Intelligence Capabilities Integrates Cybersecurity Ratings for Complete Vendor Oversight CONCORD, MASS. – MAY 19, 2020 – ProcessUnity, a leading provider of cloud-based applications for risk and compliance management, today extended its Vendor Risk Management automation platform with new capabilities to incorporate industry risk intelligence into third-party risk [...]



ERMES Security

Defend your managers against targeted attacks

everywhere and without changing their habits.


DISCOVER MORE


MODERN WEB THREATS

48% of targeted attacks are delivered through browsers and mobile apps.

Targeted attacks like identity theft, data collection, keylogging and cyber espionage are the incoming warning for small and big industries.




ERMES FEATURES

Ermes Internet Shield defends employees against emerging web threats.


Identity Theft

Online trackers collect information about employees and their devices. Such information is stored on systems external to the company and if lost or stolen, puts at risks the company’s security and privacy.

Fraudulent Data Collection

Sensitive information gets exposed to unknown third parties by employees who browse the web. Data such as web histories, click traces, contacts and credentials provided in forms can be stolen and used for malicious purposes.

Keylogging

Third-party services embedded in sites can record and store any action performed on visited web pages, such as clicks and keystrokes. Collected data contains credentials and credit card numbers too.

Tracking Links

Tracking links to third party web sites. Web sites provide links to third party web sites that contain identification information to track users.

Cyber Espionage

Profiles built by trackers are out of control of the tracked company. These are bought or stolen by competitors to capture strategic plans.

Cryptojacking

Many websites embed scripts which exploit computational resources available on visitors’ devices to mine cryptocurrencies and provide revenues to the attacker. Employees see their device performance slow down and unwillingly take part in an often illegal mining network.

Tabnabbing

Compromised websites fool users by means of tabnabbing techniques with the ultimate goal of performing phishing, scam, or distributing malware

Malicious Actors

Malicious actors intercepting, observing, and potentially even modifying your HTTP communications with web sites.


CHALLENGE

Ermes Internet Shield protects against online tracking and emerging threats on desktop and mobile devices. Using AI.