Vulnerability Scanning

 

Vulnerability scanning is the systematic identification, analysis and reporting of technical security vulnerabilities that unauthorized parties and individuals may use to exploit and threaten the confidentiality, integrity and availability of business and technical data and information. External vulnerability scanning specifically examines an organization’s security profile from the perspective of an outsider or someone who does not have access to systems and networks behind the organization’s external security perimeter. Your external IPs be scanned once a year, once a quarter or monthly.

Read More

Mobile Application Scanning

 

Mobile platforms by default make certain promises about their environment. Development teams should not rely on these promises to protect critical data and code. Architecture review and threat modeling process will includes assessing and documenting security risks in the context of use cases, services, roles and functions unique to your application. The threat modeling is performed in collaboration with your business, engineering, operations and corporate security teams to understand and create the system’s security objectives, threat profile, attacks, vulnerabilities and countermeasures from design to deployment.

Read More

Darkweb Credential Monitoring

 

We provide the best approach to eliminate the biggest cause of massive data breaches, the weak and/or stolen password. We continuously monitor the dark web for stolen databases and identities, and maintains the encrypted data in our proprietary database. When integrated with an IAM solution, we can provide superior visibility into user-centric risk and the ability to automate appropriate corrective actions, preventing the abuse of compromised credentials.

Read More
Privacy Policy

Consumer Privacy

At KRAA Security LLC, we respect the privacy of our users and the importance of the information they entrust to us.

Information we may collect

We may collect information that can identify you (“personal information”), such as your name and email address, (i) when you (or other users) provide it to us when using our website or in some other manner, or (ii) from other KRAA Security businesses, from our business partners, and from other third parties. We may combine the personal information that we receive from different sources.

We also may collect other types of information in the following ways when you visit our website:

Our server logs automatically collect information, such as your IP address, your browser type and language, and the date and time of your visit, which helps us track users’ movements around our site and understand trends.

We may assign your computer one or more cookies which may collect information to facilitate access to our website and to personalize your online experience.

We do not knowingly collect personal information from children under the age of 13. Should we ever do so, we will comply with the Children’s Online Privacy Protection Act.

How we may use information we collect



We may use information to:

• Fulfill your requests for products and services; • Offer products and services that may be of interest to you; • Customize the advertising and content that you see on our website; • Facilitate use of our website; • Manage your account and your preferences; • Analyze use of and improve our website, products and services; and • Identify and protect against fraudulent transactions and other misuses of our website

With whom we may share information we collect We will not share your personal information with others except as indicated below, or except when we inform you in advance and give you the opportunity to opt out. We may share personal information with:



• Service providers, such as credit-card payment processors, performing services on our behalf; • Other KRAA Security businesses; • Other businesses with which we partner or which we carefully select to offer you products, services, and promotions through our website or offline; and • Other third parties in limited circumstances, such as complying with legal requirements, preventing fraud, and protecting the safety of our users. We may share aggregated, non-personal information in any of the above situations and also with advertisers and others.

Your choices

You may choose:

• Not to provide personal information, although that may result in your inability to obtain certain services or use certain features of our website; • To delete or decline cookies by changing your browser settings, although if you do so, some of the features or services of our website may not function properly; • To review and update your personal information by contacting us at the email address below or, if you have an online account on our website, by logging into that account. Security

We take appropriate physical, electronic, and other security measures to help safeguard personal information from unauthorized access, alteration, or disclosure.

Changes to our Privacy Policy

We may occasionally update our Privacy Policy to reflect changes in our practices and services. If we make material changes in the way we collect, use, or share your personal information, we will notify you by sending you an email to the email address you most recently provided to us and/or by prominently posting notice of the changes on our website.

How to contact us

If you have any questions about this summary, our privacy policy, or our information practices, please contact us by email abuse@kraasecurity.com