
A suite of cybersecurity solutions designed to protect data and employees through data masking, phishing simulation, vulnerability assessment, bot defense, and secret management.
Vendor
cegedim.cloud
Company Website
Cegedim.cloud offers a comprehensive range of cybersecurity solutions aimed at safeguarding sensitive data and ensuring employee security. The Data Masking service creates secure, desensitized copies of databases, essential for compliance with regulations like RGPD, by employing techniques such as pseudonymization, randomization, and scrambling while maintaining data integrity. Phishing campaigns are offered to test and improve employee awareness of email security threats, including custom template creation and real-time monitoring. Advanced Vulnerability Assessment (AVA) provides a 360-degree view of security by combining system and application vulnerability audits, utilizing tools like Qualys and Acunetix to identify and report on vulnerabilities with criticality, impact, and solutions. Bot Defense protects internet applications from automated attacks and Denial of Service (DoS) threats by identifying and mitigating malicious bots through reputation analysis and request classification, offering automated responses like alarms, captchas, or request blocking. Finally, Vault Secret Management securely centralizes and manages sensitive information such as passwords and private keys, reducing data leakage risks and enabling dynamic secret generation and encryption as a service with granular access control and traceability.
Features & Benefits
- Data Masking: Creates secure database copies by desensitizing personal data using various techniques (pseudonymization, randomization, scrambling) to meet compliance and confidentiality needs.
- Phishing Campaign: Evaluates employee email security awareness through simulated phishing attacks.
- Advanced Vulnerability Assessment (AVA): Combines system and application vulnerability audits for a comprehensive security overview.
- Bot Defense: Protects internet applications from automated attacks and DoS threats by identifying and mitigating malicious bots.
- Vault Secret Management: Securely manages secrets like passwords, tokens, and keys, centralizing them and reducing data leakage risks.