Search

Search Results for:
406 Results Found
Can't find what you're looking for? Search our Knowledge Base.
How to Improve Application Security with Pentesting as a Service
Resource > Webinar
About this talk Web application testing can take a lot of effort and still not providing the results your business need. In the face of an ever growing digital attack surface and agile release cycles, traditional pen testing is not enough. You need a combination of automated scanning and manual...
Account Takeover in Azure’s API Management Developer Portal
Resource > Webinar
About this talk In this on-demand webinar, Outpost24’s Thomas Stacey will walk you through a vulnerability he recently discovered in Azure's API Management Developer Portal that can be exploited to perform an account takeover attack. Thomas will be exploring the various steps involved in identifying the vulnerability, disclosure and eventual...
Outpost24 acquires external attack surface management provider Sweepatic to reduce risk exposure of internet facing assets
Blog
​LONDON, UK, 7 June, 2023 – Outpost24, a leading cybersecurity risk management platform, today announced the acquisition of Sweepatic. Based in Leuven (BE), Sweepatic is an innovative external attack surface management (EASM) platform. Gartner identified EASM as a top Security and Risk Management (SRM) trend for 2022. By leveraging their...
Vulnerability prediction insights from Outpost24 on Smashing Security
Blog
Carole Theriault from Smashing Security had a sit down with John Stock, our Director of Product Management here at Outpost24. In this episode, John shares valuable insights on the increasing threats organizations face in remote work environments and discusses the need for visibility and control over network assets. Additionally, he...
Company
page
Exposure Management that makes business sense Outpost24 was founded in 2001 as a small team of ethical hackers and developers in Sweden. Today, over 3,000 customers across 65 countries trust us to secure their infrastructure, apps, and users against evolving cyber threats. Outpost24 is Europe’s leading cybersecurity vendor in Attack...
What is DORA? How to prepare your business for compliance
Blog
Digital resiliency is one of the financial sector's most significant challenges today. Resiliency refers to an organization's ability to detect, respond and recover from any digital threats or disruptions in their operations, including cyberattacks, data breaches, system failures, human errors, and other risks. Resiliency is essential to the continuity of...
Partners
page
Key Partner Benefits Flexible engagement and consumption-based business model Complete technical and sales training Sales support and dedicated partner managers for sales enablement Deal registration via Partner Portal Joint sales and marketing opportunities Partner Portal Become a Partner Partnership Types Technology partners We work with carefully selected technology companies that...
Penetration Testing Services
page
Our Penetration Testing Services Go beyond vulnerability scanners with our classic penetration testing services. Outpost24 offers in-depth penetration testing tailored to your business needs. The security assessment includes a comprehensive report with a detailed outline of the uncovered issues, including risk level and actionable guidance for remediation. We will help...
Application Pen Testing as a Service (PTaaS)
page
About PTaaS with SWAT Test your apps in real-time for the latest vulnerabilities. SWAT delivers continuous monitoring of internet facing web applications via a SaaS delivery model. The solution can be fully customized to your needs, minimizing unnecessary load, or risk to any sensitive environments. Most vulnerability findings are produced...
Cyber Threat Intelligence
page
Our Cyber Threat Intelligence Solution Each Cyber Threat Intelligence module is backed up by our world-class in-house analyst team. Enrich and contextualize threats so you can defend your assets and understand your adversaries’ plans before they strike. Credentials Detect and retrieve your compromised credentials in real-time. Data Leakage Detect leaked...