-
REFLECTIZ
CONTINUOUS WEB THREAT MANAGEMENTEmpower your online business by allowing the use of third-party and open-source apps without compromising your website security posture.
Continuous Web Threat Management
3rd party and open source apps risk management of your (e-commerce) website. Having control over all code of the website as it runs in the visitor's browser. No more blind spots!
Secure websites are build according to the principle of security-by-design. Despite this, website builders frequently use existing services or APIs from third parties. Logical, right? Why reinvent the wheel? The point is that you have little to no control over this external code. Moreover, the code that you can access is often minimized - stripped of all unnecessary characters - which also makes checking difficult.
Scripts that retrieve third-party apps or APIs are often reviewed during deployment. But once things are running, you only have a limited view of what these scripts do. The Reflectiz cloud platform – Continuous Web Threat Management – continuously scans your domains to identify and fix any vulnerabilities through third-party apps.
How does it work?
Reflectiz’ award-winning platform enables businesses to maintain and expand their web activities without compromising security, tackling today’s sophisticated cyber securitychallenges.
The Reflectiz solution is executed remotely with no installation required.
Reflectiz’ innovative sandbox solution monitors and detects all 1st, 3rd, and 4th-party app vulnerabilities in your online ecosystem, enabling complete visibility over your threat surface. It then effectively prioritizes and remediates risks and compliance issues.
1 Explore Your Digital Ecosystem
Learn WHICH digital assets you have in your environment, and manage them easily with an automated inventory that maps their information and behaviors. Get immediate notification of any new script, tag or app added to your website.
2 Protect Your User Data
Get an in-depth analysis of WHAT sensitive actions your third parties perform. Ensure that only you have control over your data and Personal Identity Information (PII). Validate every single one of your third-parties’ behaviors to detect any suspicious or unauthorized changes in your website, and ensure the right vendor processes the right data. Every time.
3 Follow Your Data Route
Access a map of exactly WHERE your data is being sent and precisely who has access to it at all times. Track suspicious domains or geo-locations to ensure your data is sent to the intended recipient and that it never leaves your four walls without your knowledge and consent.
WHAT IS UNIQUE ABOUT REFLECTIZ'S SOLUTION?
Reflectiz is out to make web applications safe by developing a solution that maps your entire digital supply chain, and analyzes each component’s ‘WWWs (Which, What, Where). By asking these questions for every single digital website asset, one comprehensive platform is able to eliminate the ever-growing third-party security risks that threaten your business.
One Dashboard to Rule Your Website Security. Efficiently monitor risks from a management enterprise dashboard and view all assets in a single view.
Reflectiz is a one-of-a-kind fully remote sandbox solution that simulates user behaviors to monitor your website and perform in-depth analysis of your digital ecosystem. The remote scanning process identifies security and privacy risks without creating a new third-party liability on its own. For that, Reflectiz worked hard to create the first full simulation of a user browser, that can behave like a real person, ensuring that nothing gets past our system undetected.
- No script installation or access to client data.
- Non intrusive - smart passive scan without any website effect
- Monitoring - The platform actively collects website data by browsing the different pages and simulating user behavior. It monitors all pages, technologies, domains and data connected to your website – from homepage to checkout.
- Asset Discovery - The data collected is now transformed into an easy-to-read visual asset inventory. We organize the raw data by mapping the website scripts, their actions and behaviors, and where they communicate the information they process. We call this the WWW.
- Analysis - Each of your website pages and components now goes through an in-depth behavioral analysis process with our own proprietary browser. This allows us to understand all the actions performed on a given page and perform root cause analysis; creating the connection between the scripts, its actions, and the data involved.
- Prioritization - After all of the data is mapped and analyzed, we compare it against previously scanned data to understand what’s new and what has changed. After that, we can assess which of the changes are irregular or suspicious and decide if and how to further examine and address them. Finally, we use Machine Learning to compare the data across multiple databases to get a better understanding of each component’s reputation, any online threat markers, and to compare it against our own internal data.
- Validation - Now that we have full visibility of your website’s ecosystem and an in-depth analysis of its third parties, we can finally establish the defensive baseline that functions as a point of reference to enforce your security standards. Our platform will now provide you with detailed remediation recommendations and intuitive action items. No more alert fatigue, as we only notify you on changes that deviate from your baseline and suggest an impact on your security posture.