• Solutions
    • Solutions


    • Scan
    • Analyze
    • Score
    • Automate
    • What is on my network?
      Quickly, comprehensively and accurately assess endpoints and servers for operating system and application vulnerabilities.
    • Which assets are at risk, and what should I do about their vulnerabilities?
      Identify which assets are at risk and receive actionable intelligence to reduce workload and increase effectiveness.
    • How do I measure my overall risk and where should I focus remediation efforts?
      Benefit from a clear, easy-to-understand metric to determine your organization’s security posture.
    • How can I integrate Frontline vulnerability findings into my security workflow?
      Easily integrate discovered, analyzed, scored, and prioritized vulnerabilities into leading security workflow management platforms and SIEMs.
    • Test
    • Educate
    • Compliance
    • How do I assess where I’m exposed from an attacker’s perspective?
      Assess your “network attack surface” and your “personnel attack surface”.
    • How do I ensure all personnel are cognizant of risky “digital behavior”?
      Increase the security IQ of employees, contractors, and patrons to effectively defend against a security breach.
    • Am I meeting requisite compliance standards?
      Leverage the expertise of one of the world’s longest tenured PCI Approved Scanning Vendors (ASV) to achieve compliance AND an optimal level of security.
  • Cloud Subscriptions
    • Frontline Cloud Subscriptions


    • Frontline Advanced™
    • Frontline Pro™
    • Frontline PCI Pro™
    • Frontline Pen Test™
    • Frontline Advanced is Digital Defense’s flagship vulnerability management offering. Powerful and effective, the service is delivered in a rich, affordable and easy to consume subscription.
    • Frontline Pro provides the same industry leading solution subscription as Frontline Advanced, but adds a Personal Security Analyst (PSA) to help lift the burden of vulnerability management.
    • Frontline Payment Card Industry-Professional (Frontline PCI-Pro) service guides businesses through the PCI Data Security Standards (DSS) requirements maze with security expertise and personalized recommendations to achieve compliance.
    • Frontline Pen Test offers a conveniently packaged sequence of periodic (and scheduled) pen tests into an annual subscription.
  • Platform
    • Platform


    • Frontline RNA™
    • Frontline VM™
    • Frontline Reconnaissance Network Appliance (RNA) is a preconfigured network based device used to perform network security assessments without requiring onsite staff.
    • Frontline Vulnerability Manager (VM) is the industry’s most comprehensive, accurate, and easy to use VM platform – bar none.
  • Technologies
    • Technologies


    • DDI NIRV™
    • DDI VRT™
    • DDI DNA™
    • DDI NIRV – the technology core of Frontline RNA™ – works on the principle of real-time event-based tuning. As it learns more about hosts and the network, NIRV adjusts its plugin sets and auditing mechanisms in real time – leading to far more accurate and complete scanning data.
    • While Digital Defense has achieved public acclaim for its superior vulnerability scanning, vulnerability management, and best practice consultative services, we are also actively involved in security threat research.
    • Digital Node Attribution (DNA) is the core technology within Frontline VM that eliminates network drift. As point in time scans from RNA are fed into Frontline Vulnerability Manager™,
  • Professional Services
    • Professional Services


    • Frontline Pen Test Project™
    • Frontline Social Test™
    • SecurED™ Training
    • Understanding and addressing network and host vulnerabilities is, of course, an essential element to strong information security.
    • Social engineering is a popular technique attackers use to gain access to your network and, ultimately, valuable information held by your organization.
    • SecurED, an entertaining awareness training designed to optimize employee retention of serious security intelligence and best practices.
    • TEAM™
    • Consultative Services
    • As your organization grows in size and complexity, determining exposure to information asset risks becomes more challenging, as does your ability to identify threats and implement effective plans to address them.
    • As your organization grows in size and complexity, determining exposure to information asset risks becomes more challenging, as does your ability to identify threats and implement effective plans to address them.
  • Get a Quote

 

The following statement applies specifically to the general public to address concerns about the types of information gathered from the public, if any, and the use thereof.

I. Cookies

A “cookie” is a small file containing information placed on a user’s computer by a web server. Typically, these files are used to enhance the user’s experience with the site, to facilitate movement between pages in a database, or to customize information for a user. Any information that Digital Defense, Inc. web servers may store in cookies is used for internal purposes only. Cookie data is not used in ways that would disclose personally identifiable information to outside parties unless Digital Defense, Inc. is legally required to do so in connection with law enforcement investigations or other legal proceedings.

II. Logs and Network Monitoring

Digital Defense, Inc. maintains log files of all access to its site and monitors network traffic for the purpose of site management. This information is used to help diagnose server problems and to carry out other administrative tasks. Log analysis tools are used to create summary statistics to determine which information is of most interest to users, to identify system problem areas, or to help determine technical requirements.

Standard information, such as the following, is collected in these files:

  • Hostname: the hostname and/or IP address of the computer requesting access to the site
  • User-Agent: the type of browser, its version and the operating system of the computer requesting access (e.g., Mozilla Firefox on Windows, Safari for Macintosh, etc.)
  • Referrer: the web page from which the user came
  • System date: the date and time of access on the server
  • Full request: the exact request the user made
  • Status: the status code returned by the server, e.g., fulfilled request, file not found
  • Content length: the size, in bytes, of the file sent to the user
  • Universal Resource Identifier (URI): the location of the particular resource requested.
  • Query string of the URI: anything after a question mark in a URI. For example, if a keyword search has been requested, the search word will appear in the query string.
  • Protocol: the technical protocol and version used, i.e., http 1.0, ftp, etc.

The above information is not used in any way that would reveal personally identifying information to outside parties unless Digital Defense, Inc. is legally required to do so in connection with law enforcement investigations or other legal proceedings.

III. Email and Form Information

If anyone in the general public sends Digital Defense, Inc. an e-mail message, or submits a web-based question or comment containing personally identifying information, that information will only be used to respond to the request and analyze trends. The message may be redirected to any person who is able to answer the question. Such information is not used in any way that would reveal personally identifying information to outside parties unless System Administration is legally required to do so in connection with law enforcement investigations or other legal proceedings.

IV. Links

This site may contain links to other sites. Digital Defense, Inc. is not responsible for the privacy practices or the content of such external websites.

V. Security

This site has security measures in place to protect from loss, misuse and alteration of information.

Contacting Digital Defense, Inc.

Questions about this privacy statement, the practices of this site, or interaction with this website, should be directed to:

Tom DeSot, EVP – Chief Information Officer
Digital Defense, Inc.
9000 Tesoro Drive, Suite 100
San Antonio, TX 78217

© Copyright | Privacy Policy | Sitemap Save Save Save

Digital Defense, Inc.

9000 Tesoro Drive, Suite 100
San Antonio, TX 78217

Main Line: 888-273-1412
Sales: 888-273-1412 ext. 1
Customer Support: 888-273-1412 ext. 2
support@digitaldefense.com

 

Share This