Changelog
Your Trusted Partner in Data Protection with Cutting-Edge Solutions for Comprehensive Data Security.
Advanced Threat Detectioning Module
June 1, 2024
Version 4.5.0
New Features:
Phishing remains one of the most prevalent and dangerous cyber threats. Attackers use deceptive emails, messages, or websites to trick individuals into revealing sensitive information.
Bug Fixes:
Fixed an issue where some users experienced difficulty logging in after a session timeout.
Real-Time Alert Customization
April 15, 2024
Version 4.4.0
New Features:
Enhanced the security protocols for our mobile app, including better encryption for data in transit and at rest.
Bug Fixes:
Fixed an issue where some users experienced difficulty logging in after a session timeout.
Advanced Threat Detectioning Module
June 1, 2024
Version 4.3.0
New Features:
Phishing remains one of the most prevalent and dangerous cyber threats. Attackers use deceptive emails, messages, or websites to trick individuals into revealing sensitive information.
Bug Fixes:
Fixed an issue where some users experienced difficulty logging in after a session timeout.
Advanced Threat Detectioning Module
June 1, 2024
Version 4.2.0
New Features:
Phishing remains one of the most prevalent and dangerous cyber threats. Attackers use deceptive emails, messages, or websites to trick individuals into revealing sensitive information.
Bug Fixes:
Fixed an issue where some users experienced difficulty logging in after a session timeout.
Security Status Indicator
Displays the current security status of your organization with a clear color-coded indicator.
Total Threats Detected
Breaks down the threats by type (e.g., phishing, malware, ransomware) to give a detailed overview of the threat landscape.
Resolved Incidents
Lists the number of active security incidents currently being addressed.
User Activity Monitoring
Highlights the most frequently accessed sensitive files or databases and the users involved, ensuring transparency and control over critical data.
Data Activity Trends
Highlights the most frequently accessed sensitive files or databases and the users.
Compliance Status
Our system continuously monitors your network and data environments for any suspicious activities.