Personal Information
Organization / Workplace
Dallas/Fort Worth Area, TX United States
Industry
Technology / Software / Internet
Website
www.ri.logicnow.com
About
MAX Risk Intelligence discovers unprotected data, detects vulnerabilities and calculates the financial impact in dollars. This enables security leaders to quantify risk and communicate it to business managers.
Tags
data breach
mobile security
information security
cyber insurance
liability exposure
vulnerability scanning
hipaa pii
cyber liability
personal identifiable information
iscan online
byod
byod security
data discovery
pci compliance
pci dss
cyber risk
risk intelligence
ach payment
payment data
risk management
risk
student privacy
edu security
vulnerability scanner
dlp software
cio review
unprotected cardholder data
data theft
trade secrets
intellectual property
infosec
pii data
mobile data discovery
phi
android security
apple ios security
mobile threats
infographic
mdm
cardholder data
pcidss
android vulnerabilities
pan scanning
data discovery scan
See more
Presentations
(7)Documents
(1)Personal Information
Organization / Workplace
Dallas/Fort Worth Area, TX United States
Industry
Technology / Software / Internet
Website
www.ri.logicnow.com
About
MAX Risk Intelligence discovers unprotected data, detects vulnerabilities and calculates the financial impact in dollars. This enables security leaders to quantify risk and communicate it to business managers.
Tags
data breach
mobile security
information security
cyber insurance
liability exposure
vulnerability scanning
hipaa pii
cyber liability
personal identifiable information
iscan online
byod
byod security
data discovery
pci compliance
pci dss
cyber risk
risk intelligence
ach payment
payment data
risk management
risk
student privacy
edu security
vulnerability scanner
dlp software
cio review
unprotected cardholder data
data theft
trade secrets
intellectual property
infosec
pii data
mobile data discovery
phi
android security
apple ios security
mobile threats
infographic
mdm
cardholder data
pcidss
android vulnerabilities
pan scanning
data discovery scan
See more