Are you able to identify the 1% users that can take down your organization?

1% users can take down their organization because they account for 75% cloud risk, according to a CISCO study. And this disproportionate risk is consistent across financial services, education, government, manufacturing, retail and other industries.

Continue Reading

Are you able to identify the 1% users that can take down your organization?

1% users can take down their organization because they account for 75% cloud risk, according to a CISCO study. And this disproportionate risk is consistent across financial services, education, government, manufacturing, retail and other industries.

Continue Reading

Can "design thinking" reshape the information security industry?

The information security industry has always struggled to translate its messaging from complex, technical terms into information that’s useful to boards and management teams focused on risk.

Continue Reading

Can "design thinking" reshape the information security industry?

The information security industry has always struggled to translate its messaging from complex, technical terms into information that’s useful to boards and management teams focused on risk.

Continue Reading

Podcast - Can businesses entrust workers with care of sensitive data in a multi-SaaS world?

In this week's Startup Daily. podcast, Detexian co-founder/CEO, Tan Huynh, discussed the Detexian story and its vision to provide simple security visibility to empower businesses to entrust workers with care of sensitive data in a multi-SaaS world.

Continue Reading

Podcast - Can businesses entrust workers with care of sensitive data in a multi-SaaS world?

In this week's Startup Daily. podcast, Detexian co-founder/CEO, Tan Huynh, discussed the Detexian story and its vision to provide simple security visibility to empower businesses to entrust workers with care of sensitive data in a multi-SaaS world.

Continue Reading

Do you know who has shared files and folders in your organization? Are they removing access when no longer needed and how do you audit this?

Collaboration features such as sharing and co-editing documents are powerful tools being harnessed by modern workplaces, even more so when working with external parties.

Continue Reading

Do you know who has shared files and folders in your organization? Are they removing access when no longer needed and how do you audit this?

Collaboration features such as sharing and co-editing documents are powerful tools being harnessed by modern workplaces, even more so when working with external parties.

Continue Reading

How do you detect unauthorized or accidental transfer of data outside organizational boundaries?

According to the Ponemon’s “Cost of a data breach report 2019”, 24% of data breaches are due to human error. The native Data Loss Prevention (DLP) controls built into G Suite, Office 365 and other SaaS solutions provide significant protection and detection controls to reduce the risk of human error.

Continue Reading

Eliminate SaaS risk blind spots

info@detexian.com
710 Collins Street
Melbourne VIC 3008
Australia
 
9848 Mercy Rd #2
San Diego 92129
USA

Get the latest information about SaaS security misconfigurations

Copyright Detexian 2020 All Rights ReservedTerms & ConditionsPrivacy Policy