Ratings and Reviews 7 Ratings
Ratings and Reviews 0 Ratings
What is Source Defense?
Source Defense plays a crucial role in safeguarding web safety by securing data precisely at the point of entry. Its platform delivers a straightforward yet powerful approach to ensuring data security and meeting privacy compliance requirements. This solution effectively tackles the threats and risks associated with the growing reliance on JavaScript, third-party vendors, and open-source code within your online assets. By providing various options for code security, it also fills a significant gap in managing the risks of third-party digital supply chains, which includes regulating the actions of third-party, fourth-party, and beyond JavaScript that enhance your website's functionality. Furthermore, Source Defense Platform defends against a wide range of client-side security threats, such as keylogging, formjacking, and digital skimming, while also offering protection against Magecart attacks by extending security measures from the browser to the server environment. In doing so, it ensures a comprehensive security framework that adapts to the complexities of modern web interactions.
What is Kanary?
Take proactive measures against those who can easily find your personal information on Google and various other platforms. At Kanary, we excel in identifying and removing unnecessary personal details from websites that pose a risk to your security. Our advanced technology, coupled with a committed support team, allows Kanary to keep track of where your data is found online. We focus primarily on safeguarding against issues like account takeovers, impersonation attempts, and unwanted communications. If your sensitive information is discovered on harmful sites like Zoominfo, MyLife, or Intelius, we will swiftly initiate actions to eliminate it. You can have confidence knowing that we will also maintain your positive online presence, including your accounts and articles. The Kanary app offers transparency by showing the sites that have been scanned, the exposures that have been detected, and the steps needed for removal, all in a format that is easy to navigate. We emphasize quick responses for every removal request received. Members are encouraged to communicate directly with Kanary at any time, as our support team is always prepared to help. Start the journey to remove your data from unwanted platforms within just 24 hours, allowing you to enjoy peace of mind and greater online safety, while also taking control of your digital footprint. With Kanary, you can feel secure in knowing that your personal information is being actively monitored and managed.
Integrations Supported
Intelius
MyLife
ZoomInfo
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
$14.99 per month
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Source Defense
Date Founded
2014
Company Location
United States, Israel
Company Website
sourcedefense.com
Company Facts
Organization Name
Kanary
Company Location
United States
Company Website
www.kanary.com
Categories and Features
Data Privacy Management
Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
GDPR Compliance
Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
PCI Compliance
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management
Categories and Features
Data Privacy Management
Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification