How do you detect unauthorized or accidental transfer of data outside organizational boundaries?

According to the Ponemon’s “Cost of a data breach report 2019”, 24% of data breaches are due to human error. The native Data Loss Prevention (DLP) controls built into G Suite, Office 365 and other SaaS solutions provide significant protection and detection controls to reduce the risk of human error.

Continue Reading

Are your crown jewels exposed?

Detexian co-founder/CEO wrote an op-ed for CSO Online asking the questions “What’s your most critical business data? And do you really know where it all is and whether the controls and protection you have in place are adequate?”

Continue Reading

Are your crown jewels exposed?

Detexian co-founder/CEO wrote an op-ed for CSO Online asking the questions “What’s your most critical business data? And do you really know where it all is and whether the controls and protection you have in place are adequate?”

Continue Reading

How to protect your organization’s data in a multi-cloud world?

You’re in a multi-cloud world even if you don’t realise it. Detexian co-founder/CTO, Adrian Kitto, on how to protect your organization's data in a multi-cloud world.

Continue Reading

How to protect your organization’s data in a multi-cloud world?

You’re in a multi-cloud world even if you don’t realise it. Detexian co-founder/CTO, Adrian Kitto, on how to protect your organization's data in a multi-cloud world.

Continue Reading

How do you detect non-federated SaaS accounts that are often missed in privileged user audits?

The modern SaaS-powered workplace typically relies on federating SaaS solutions against a single identity directory such as Azure AD, Google Identity or Okta to simplify user onboarding and offboarding in a highly secure manner.

Continue Reading

How do you detect non-federated SaaS accounts that are often missed in privileged user audits?

The modern SaaS-powered workplace typically relies on federating SaaS solutions against a single identity directory such as Azure AD, Google Identity or Okta to simplify user onboarding and offboarding in a highly secure manner.

Continue Reading

Do all your users have MFA enabled and enforced in their SaaS solutions?

Did you know that the Australian Signals Directorate essential Eight strategies to limit the extent of cyber security incidents includes Multi-factor Authentication (MFA) as a mandatory control for all users? Do all your users have MFA enabled in their SaaS solutions?

Continue Reading

Do all your users have MFA enabled and enforced in their SaaS solutions?

Did you know that the Australian Signals Directorate essential Eight strategies to limit the extent of cyber security incidents includes Multi-factor Authentication (MFA) as a mandatory control for all users? Do all your users have MFA enabled in their SaaS solutions?

Continue Reading

Eliminate SaaS risk blind spots

info@detexian.com
710 Collins Street
Melbourne VIC 3008
Australia
 
9848 Mercy Rd #2
San Diego 92129
USA

Get the latest information about SaaS security misconfigurations

Copyright Detexian 2020 All Rights ReservedTerms & ConditionsPrivacy Policy