LogicGate

logicgate.com

LogicGate
LogicGate offers modern risk management technology empowering businesses to proactively transform risk enterprise-wide. Because risk is a team sport, we created the Risk Cloud Platform® — the most nimble and collaborative GRC solution out there. Rapidly adapt to changing business conditions. Confidently innovate and build new processes as you go. Collaborate on risk across your entire organization. Risk Cloud® gives you an interconnected view of risk across the organization that you just can’t get from point solutions. After all, great companies are built not by avoiding risks — but by choosing the right ones.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Enterprise Security, Platform Security, Software Security

NORDLOCKER INTRODUCES EASIER SECURE SHARING OPTION

Globenewswire | May 26, 2023

news image

NordLocker has launched a new feature that allows users to securely share a password-protected locker, otherwise known as a folder, of files. In order to receive the sent files, the recipient doesn’t even need to be a NordLocker user. This convenient sharing feature is incredibly easy to use. The files are shared via a link, and the recipient needs a password to access the files. For security purposes, once the set expiration date passes, the link becomes inaccessible. Tha...

Read More

Network Threat Detection

BLACKCLOAK UNVEILS NEW DECEPTION TECHNOLOGY TO CATCH CYBERATTACKS TARGETING EXECUTIVES & HIGH-PROFILE INDIVIDUALS

BlackCloak | November 16, 2021

news image

BlackCloak, Inc., the first Concierge Cybersecurity & Privacy™ Protection Platform for Executives and High-Profile Individuals, today officially unveiled proprietary deception technology to catch adversaries' brazen attempts to exploit a member's privacy, personal devices, or home networks. Commonly referred to as a honeypot, BlackCloak's deception technology lures attackers interacting with a service by simulating a real-world home network. Cybercriminals an...

Read More

Data Security, Platform Security, Software Security

JUPITERONE RECOGNIZED AS A SAMPLE VENDOR FOR CYBER ASSET ATTACK SURFACE MANAGEMENT (CAASM) IN GARTNER® HYPE CYCLE™ FOR CYBER RISK MANAGEMENT, 2022

JupiterOne | August 19, 2022

news image

JupiterOne, the industry's leading provider of cyber asset attack surface management (CAASM) technology, today announced that it was named as a Sample Vendor for CAASM in the latest release of the Gartner Hype Cycle for Cyber Risk Management, 2022. According to Gartner, "In 2022, the global risk landscape continues to be impacted by the ongoing COVID-19 pandemic conditions, the Russian invasion of Ukraine, labor shortage, worsening climate change, and inflation. In ...

Read More

Enterprise Security, Platform Security, Software Security

BIGID INTRODUCES SECRETS DETECTION CAPABILITIES TO MITIGATE RISK

BigID | March 17, 2023

news image

BigID, the leading platform for data security, compliance, privacy, and governance, today introduced purpose-built AI and ML-based data discovery and classification capabilities designed to quickly and easily detect secrets across enterprise data and reduce risk from potential data breaches and leaks. Secrets - including as API keys, tokens, usernames and passwords, and security certificates - are commonly shared, cloned, and distributed across enterprise data environments as a ...

Read More
news image

Enterprise Security, Platform Security, Software Security

NORDLOCKER INTRODUCES EASIER SECURE SHARING OPTION

Globenewswire | May 26, 2023

NordLocker has launched a new feature that allows users to securely share a password-protected locker, otherwise known as a folder, of files. In order to receive the sent files, the recipient doesn’t even need to be a NordLocker user. This convenient sharing feature is incredibly easy to use. The files are shared via a link, and the recipient needs a password to access the files. For security purposes, once the set expiration date passes, the link becomes inaccessible. Tha...

Read More
news image

Network Threat Detection

BLACKCLOAK UNVEILS NEW DECEPTION TECHNOLOGY TO CATCH CYBERATTACKS TARGETING EXECUTIVES & HIGH-PROFILE INDIVIDUALS

BlackCloak | November 16, 2021

BlackCloak, Inc., the first Concierge Cybersecurity & Privacy™ Protection Platform for Executives and High-Profile Individuals, today officially unveiled proprietary deception technology to catch adversaries' brazen attempts to exploit a member's privacy, personal devices, or home networks. Commonly referred to as a honeypot, BlackCloak's deception technology lures attackers interacting with a service by simulating a real-world home network. Cybercriminals an...

Read More
news image

Data Security, Platform Security, Software Security

JUPITERONE RECOGNIZED AS A SAMPLE VENDOR FOR CYBER ASSET ATTACK SURFACE MANAGEMENT (CAASM) IN GARTNER® HYPE CYCLE™ FOR CYBER RISK MANAGEMENT, 2022

JupiterOne | August 19, 2022

JupiterOne, the industry's leading provider of cyber asset attack surface management (CAASM) technology, today announced that it was named as a Sample Vendor for CAASM in the latest release of the Gartner Hype Cycle for Cyber Risk Management, 2022. According to Gartner, "In 2022, the global risk landscape continues to be impacted by the ongoing COVID-19 pandemic conditions, the Russian invasion of Ukraine, labor shortage, worsening climate change, and inflation. In ...

Read More
news image

Enterprise Security, Platform Security, Software Security

BIGID INTRODUCES SECRETS DETECTION CAPABILITIES TO MITIGATE RISK

BigID | March 17, 2023

BigID, the leading platform for data security, compliance, privacy, and governance, today introduced purpose-built AI and ML-based data discovery and classification capabilities designed to quickly and easily detect secrets across enterprise data and reduce risk from potential data breaches and leaks. Secrets - including as API keys, tokens, usernames and passwords, and security certificates - are commonly shared, cloned, and distributed across enterprise data environments as a ...

Read More

Resources

resource image

Platform Security

Protection vs Privilege

Article

resource image

MARKETING DATA

GRC Platform Buyer's Guide

Whitepaper

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us