Cyber Risk Analytics Management - QOMPLX
  • Products
    Identity Threat Detection and Response (ITDR) Prevent, detect and respond to identity threats in real-time Learn more
    Privilege Assurance
    Identity Assurance
    Managed Detection and Response Cost-effective cybersecurity for small to medium-sized firms Learn more
    Attack Surface Monitoring Discover cyber vulnerabilities and size of your attack surface Learn more
    Q:SCAN
    Third Party
    Whitepapers

    ManyKatz: How Active Directory Hacks Went Mainstream

    Read more
  • Services
    Offensive Security Services Gain a hacker’s perspective on your network
    Active Directory Security Assessment Identify and mitigate AD security risks to your network
    vCISO On-demand cybersecurity experts
    Case Studies

    Ransomware Case Studies

    Read more
  • Resources
    Blog Check out important cybersecurity topics and the QOMPLX perspective Learn more
    Content hub Research thought leadership, product benefits, use cases, and more Learn more
    Case studies
    Datasheets
    Overviews
    Tech specs
    Videos
    Webinars
    Whitepapers
    Datasheets

    Privilege Assurance Data Sheet

    Read more
  • Partners
  • Company
    About QOMPLX Gain unified visibility into cyber risks & trust in identity
    Leadership Learn about our executive leadership & cybersecurity expertise
    Careers & Culture Searching for a new role? Grow and thrive with us.
    Events Want to meet QOMPLX? View our list of upcoming events and trade shows
    Contact Us Discuss your firm’s cyber challenges with an expert
    Whitepapers

    Aite Impact Brief: Fixing Vulnerabilities in Active Directory and Kerberos

    Read more
    • Login
    • Request a meeting
Cyber insurance report proves Gartner ITDR is spot on
Blog

Cyber insurance report proves Gartner ITDR is spot on

Many don’t fully understand the details about ITDR, but the recent cyber insurance report by Delinea might give everyone the insights that proves Gartner is spot on with their creation of ITDR.
Jan 26, 2023 — 2 min read
Solving cybersecurity when an SOC isn’t in the budget
Blog Featured

Solving cybersecurity when an SOC isn’t in the budget

Small businesses are frequent targets of ransomware attacks but often do not have the resources or expertise to staff a security operations center.
Dec 2, 2021 — 2 min read
Turning the data you have into the data you want
Blog

Turning the data you have into the data you want

Having data is no great challenge. Most insurance companies have plenty, and while they could perhaps use more–most could–it needs to be usable otherwise it serves no value.
Nov 3, 2021 — 4 min read
Attack surface risk signals: IP reputation
Blog

Attack surface risk signals: IP reputation

IP reputation should be tracked consistently. Connections to known malicious infrastructure on the Internet is a clear indicator of risk.
Nov 2, 2021 — 1 min read
Attack surface risk signals: DMARC and SPF records
Blog

Attack surface risk signals: DMARC and SPF records

DMARC and SPF records are a key to protecting domain integrity and preventing phishing attacks and spam campaigns from leveraging your good name.
Nov 2, 2021 — 1 min read
Attack surface risk signals: TLS/SSL configuration
Blog

Attack surface risk signals: TLS/SSL configuration

TLS (Transport Layer Security)/SSL (Secure Sockets Layer) certificates play a critical role in securing enterprise communications. They are frequently targeted by sophisticated adversaries.
Oct 26, 2021 — 1 min read
Attack surface risk signals: DNS records
Blog

Attack surface risk signals: DNS records

The Domain Name System (DNS) is a foundational technology of the modern Internet and World Wide Web. DNS monitoring is critical for the security of your organization and external users.
Oct 14, 2021 — 1 min read
Identify and Fight the Phish #CyberMonth
Blog

Identify and Fight the Phish #CyberMonth

Phishing attacks are an easy way for a bad actor to gain access to a network. Once inside, they can cause devastating losses.
Oct 12, 2021 — 2 min read
How much automation?
Blog

How much automation?

Automation of underwriting decisions has a very tangible benefit - cost savings. When rules are automated and decisions are made based on reliable supporting data, underwriters can focus on the outliers and make the most of their precious time.
Sep 16, 2021 — 3 min read
Qomplx

QOMPLX harnesses data to provide unified visibility into cyber risks and trust in identity.

  • Products
    • Identity Threat Detection and Response (ITDR)
    • Managed Detection and Response
    • Attack Surface Monitoring
  • Services
    • Offensive Security Services
    • Active Directory Security Assessment
    • vCISO
  • Resources
    • Blog
    • Content hub
    • Case studies
    • Datasheets
    • Overviews
    • Tech specs
    • Videos
    • Webinars
    • Whitepapers
  • Partners
  • Company
    • About QOMPLX
    • Careers & Culture
    • Leadership
    • Events
    • Contact Us
    • Vulnerability Disclosure Policy
    • Whistleblower hotline
    • Support

© 2022 QOMPLX. All Rights Reserved.

Privacy Policy Terms of Use