NEW PRODUCT RELEASE:

DNS Posture Management (DNSPM)

  • Login
  • Contact Us
CheckRed Security logo
  • Home
  • Platform
        • SSPMProtect your SaaS applications from security risks
        • DNSPMFull visibility & control over all DNS providers
        • CSPMDetect security misconfigurations in your cloud
        • CIEMSafeguard your cloud identities and entitlements
        • Continuous ComplianceAchieve regulatory compliance with custom frameworks
        • IntegrationsImprove collaboration with our integration capabilities
        • CWPPProtect all layers of your cloud workloads
        • CNAPPSecure 100% of your cloud with a single platform
        • KSPMSecure all your Kubernetes clusters
        • ADPMDetect Active Directory vulnerabilities
        • Identity SecurityGovern all identities – human & non-human
  • Solutions
        • SaaS Apps

        • Microsoft 365
        • Salesforce
        • ServiceNow
        • Okta
        • Other Supported Apps
        • Cloud Apps

        • Amazon Web Services
        • Microsoft Azure
        • Google Cloud
        • Akamai Linode
        • Multi-cloud
  • Use Cases
        • By Capability

        • 360° Asset Visibility
        • Misconfiguration Assessment
        • Identity and Access Management (IAM)
        • 3rd Party App Management
        • Alert Prioritization
        • Guided Remediation
        • Continuous Compliance Assessment
        • By Industry

        • Finance
        • Healthcare
        • MSSP
        • Technology
        • Other
        • By Role

        • CISO
        • CIO
        • CTO
        • Analysts
  • Resources
    • Blog
    • White Papers
    • Use Cases
    • Case Studies
    • Datasheets
    • In The News
  • Company
    • About Us
    • Testimonials
    • Careers
    • Contact Us
    • Partner login
  • Partners
  • Get a Demo
  • Login
  • Contact Us

SSPM

Back To All Resources
SaaS Sprawl – Why You Should Be Concerned

SaaS Sprawl – Why You Should Be Concerned

Nov 28, 2023

Software as a Service (SaaS) is a cloud-based delivery model that allows businesses to access various applications over the...

read more
Case Study – Discussing ServiceNow’s New Misconfiguration

Case Study – Discussing ServiceNow’s New Misconfiguration

Nov 20, 2023

ServiceNow plays a pivotal role in streamlining business operations. However, a recent revelation of potential...

read more
Case Study – The Okta Breach of October 2023

Case Study – The Okta Breach of October 2023

Nov 15, 2023

The Okta breach of October 20, 2023, can be considered a wake-up call in the world of cybersecurity. This case study will...

read more
A Review of Gartner’s Top Strategic Cybersecurity Trends for 2023 and Beyond

A Review of Gartner’s Top Strategic Cybersecurity Trends for 2023 and Beyond

Nov 6, 2023

As digital threats loom large, staying abreast of cybersecurity trends is paramount. In their report, Gartner unveiled a...

read more
Mitigating Top Misconfigurations Listed By NSA and CISA

Mitigating Top Misconfigurations Listed By NSA and CISA

Oct 17, 2023

The joint advisory from the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA)...

read more
Navigating SaaS Security Challenges: Employee Best Practices

Navigating SaaS Security Challenges: Employee Best Practices

Oct 11, 2023

The growing need for digital transformation has made SaaS (Software as a Service) solutions indispensable for businesses....

read more
Back to the Basics: Applying the CIA Triad to Modern Security Posture

Back to the Basics: Applying the CIA Triad to Modern Security Posture

Sep 13, 2023

The CIA triad stands as a fundamental pillar in the vast and intricate landscape of cybersecurity. It comprises the...

read more
CISO 101: Best Practices to Improve Security Posture

CISO 101: Best Practices to Improve Security Posture

Sep 6, 2023

In an era marked by an escalating wave of cyber risks, the role of cybersecurity is more vital than ever before. As...

read more
Common misconfigurations in Microsoft 365

Common misconfigurations in Microsoft 365

Aug 30, 2023

Microsoft 365 is a crucial tool for companies all over the world. Users can communicate with team members whenever they...

read more
Page 4 of 8First Page← Prev...23456...Next →Last Page
CheckRed Security logo

Inspect misconfigurations. Meet compliance requirements. Analyze risks.
An all-in-one platform for cloud, SaaS and DNS security!

Follow us on

  • Platforms
    • SSPM
    • DNSPM
    • CSPM
    • CIEM
    • CWPP
    • CNAPP
    • Continuous Compliance
    • Integrations
  • SaaS Security
    • Microsoft 365
    • Salesforce
    • ServiceNow
    • Okta
    • Other Supported Apps
  • Cloud Security
    • Amazon Web Services (AWS)
    • Microsoft Azure
    • Google Cloud
    • Akamai Linode
    • Multi-cloud
  • Company
    • About Us
    • Careers
    • Contact Us
    • Resources
    • Support
Top Infosec Awards certification logo
Top Infosec Awards
SOC 2 Compliant certification logo
SOC 2 Compliant
 ISO 27001 Certified certification logo
ISO 27001 Certified
 CSA Member
CSA Member
 CSA Member
Star Level 1
© 2025 CheckRed. All Rights Reserved.
  • Privacy Policy