Enterprise Identity, Enterprise Security, Platform Security

Dashlane - Security White Paper August 2022

August 30, 2022

Dashlane - Security White Paper August 2022
Access to the user’s data requires using the User Master Password which is only known by the user. It is used to generate the symmetric Advanced Encryption Standard(AES) 256-bit key for encryption and decryption of the user’s personal data on the user’s device. We useWebcrypto API for most browser based cryptography and the native libraries for IOS and Android.

Spotlight

Mendix

Mendix is a leading enterprise low-code application development platform. With Mendix you can convert a spreadsheet into an app, create an organization-wide app portfolio, modernize an entire core system – and else everything in between. The Mendix Platform enables continuous collaboration between those who build the software and those who use it – this accelerates the application development lifecycle and supports iterative deployment at scale. Organizations can create modern, flexible applications quickly in a tool that maintains the highest standards of security, quality, and governance. The Mendix Platform has been adopted by more than 4,000 leading companies around the world. Mendix is a Siemens business.

OTHER WHITEPAPERS
news image

State Of Zero Trust in The Enterprise:Shift To Identity-Powered Security

whitePaper | October 27, 2022

Cybersecurity has changed. The attack surface has expanded, thanks to the rapid adoption of cloud applications and services, shift to remote work, and proliferation of mobile devices. Having enterprise systems, applications, and data in one location and relying on layers of security tools and controls to keep attackers out, is no longer sufficient when the bulk of data and workloads now live outside the traditional network. Attackers are also increasingly targeting credentials to appear as legitimate users.

Read More
news image

Security Overview Whitepaper

whitePaper | February 6, 2023

All encryption/decryption operations are only performed by RoboForm locally on user’s devices and never on the RoboForm Server. RoboForm Data Objects and other user data is never sent to the Server in an unencrypted form. All communication between RoboForm Clients and Server are conducted over encrypted channels only.

Read More
news image

Supply Chain Security in MongoDB’s Software Development Lifecycle

whitePaper | May 25, 2022

Cybersecurity breaches do more than expose data to malicious actors. They generate headlines, captivate the public’s attention, and shine a light on security gaps. Whether it’s weak passwords or the software supply chain, if a vulnerability exists, cybercriminals will exploit it.

Read More
news image

Awesome Cyber Security Facts - Infographic

whitePaper | November 15, 2019

Check out our "Awesome Cyber Security Facts" infographic below to see how crucial cyber security attack was for some businesses, what are our main weaknesses in terms of personal cyber security and even more.

Read More
news image

The ‘Zero Trust’ Model in Cybersecurity: Towards understanding and deployment

whitePaper | August 24, 2022

In the last couple of years, “zero trust” has gained significant traction in the cybersecurity realm as a means to protect networks and increase security across organizations. In part, the growing popularity of this security model can be attributed to the shift to hybrid working practices that call for a more secure work environment whether on- or off-premises.

Read More
news image

Cyber Risk Appetite: Defining and Understanding Risk in the Modern Enterprise

whitePaper | January 16, 2020

Managing risk is a balancing act for organizations of all sizes and disciplines. While some organizations take on too much risk, others arguably do not take on enough. Complicating this equation is the emergence of cyber as one of the most impactful sources of risk in the modern enterprise. In fact, cyber security is now increasingly reviewed by corporate boards of directors and often discussed with financial analysts who see cyber security risk as an imminent and paramount business risk. Because the consequences of cyber security failures can be damaging to business revenues and brand reputation, CEOs have lost their positions as a result of data breaches and inept preparation and planning.

Read More

Spotlight

Mendix

Mendix is a leading enterprise low-code application development platform. With Mendix you can convert a spreadsheet into an app, create an organization-wide app portfolio, modernize an entire core system – and else everything in between. The Mendix Platform enables continuous collaboration between those who build the software and those who use it – this accelerates the application development lifecycle and supports iterative deployment at scale. Organizations can create modern, flexible applications quickly in a tool that maintains the highest standards of security, quality, and governance. The Mendix Platform has been adopted by more than 4,000 leading companies around the world. Mendix is a Siemens business.

Events