Recently Updated Pages
Open Cases
In this section, you'll find a comprehensive overview of open cases within your organization. Her...
Risk Score
The risk score serves as a comprehensive indicator of your company's overall risk level. This sco...
Cyber Security Risk Management
Overview: Cyber Security Risk Management is a systematic approach to identifying, assessing, and...
Security Assessment Questionnaires
Overview A Security Assessment Questionnaire (SAQ) is a tool used by organizations to evaluate t...
Privacy Compliance
Overview The Privacy Compliance module, a component of the Software-as-a-Service (SaaS) vCISO Wo...
Vulnerability Assessment and Management
Overview Welcome to the Vulnerability Assessment and Management module. In this section, you'll ...
Threat Intelligence
Overview This advanced module operates as a virtual threat analyst, continuously gathering, anal...
Source Destination Map
This section provides a visual representation of the geographical locations from which attackers ...
Google Cloud Platform (GCP) Audit Logs Integration - using Pub/Sub
Requirements To integrate with Google Cloud Platform (GCP), you need to set up the following: ...
System Integrations
Introduction The System integration allows you to monitor servers, personal computers, and more...
Google Workspace Integrations
Introduction Google Workspace (formerly G Suite) is a suite of cloud computing, productivity an...
GitHub Integration - Elastic
GitHub Integration The GitHub integration collects events from the GitHub API(external, opens in...
CRAM View
CRAM View provides a dynamic visualization of your organization's structure, offering real-time i...
Azure Application Insights Integration
Overview The Application Insights Integration allows users to retrieve application insights metr...
Supply Chain Risk Management
Overview The dashboard provides with an overview of vendor and supply chain risks. It features a...
Fortinet FortiGate - Syslog Setting and Syslog Filter
Please follow these instructions: Step 1: Log in to your Fortinet FortiGate Admin portal and n...
Azure Application Insights Integration
The Application Insights Integration allows users to collect metrics from Azure Application Insig...
CISCO Secure Endpoint - Secure Endpoint API
Authentication The Secure Endpoint API requires access via an authenticated and authorized acco...
Cato Networks - Using Cato API for ELK Stack Integration
To fully integrate the Cato Networks API with the Elastic Stack (ELK Stack), you can follow this ...
Cato Networks - Configuring Event Log Forwarding with Two Windows Servers
How to Configure Windows Event Forwarding for User Awareness Cato Networks’ User...