TagControl

TagControl

Crownpeak
+
+

Related Products

  • Wiz
    1,051 Ratings
    Visit Website
  • Cynet All-in-One Cybersecurity Platform
    383 Ratings
    Visit Website
  • Cisco Umbrella
    1,188 Ratings
    Visit Website
  • ConnectWise SIEM
    191 Ratings
    Visit Website
  • SpamTitan
    813 Ratings
    Visit Website
  • Carbide
    88 Ratings
    Visit Website
  • DriveStrike
    23 Ratings
    Visit Website
  • StarTree
    26 Ratings
    Visit Website
  • Boozang
    15 Ratings
    Visit Website
  • SBS Quality Management Software
    7 Ratings
    Visit Website

About

Our advanced patent-pending graph-based technology enables proactive discovery and remediation of known and unknown threats. Whether it's a misconfiguration, weak configuration, over-permissive policy, or a CVE, we empower your teams to address and eliminate all threats to your cloud stack. Prioritization of the most critical issues means your team can focus on what matters most. Our root cause analysis dramatically reduces the number of alerts and general findings, enabling teams to address those that are most crucial. Protect your cloud environment while advancing along the digital transformation. It correlates between the Kubernetes layer to the cloud layer and integrates seamlessly with your existing workflow. Get a rapid visual assessment of your cloud environment using known cloud vendor APIs, from the infrastructure level down to the single microservice level.

About

Every time you add a tag to your website, you give unknown vendors access to your data. Find out which tags pose a security risk and block them with one click. Marketers need martech tools to build more effective digital campaigns, but for every tool added to your site, numerous unknown vendors get access to your data. Watch the video to learn how TagControl mitigates the risk. If you're like most enterprise companies, your marketing team has an abundant martech stack, which is powered by tags you add to your website. These tags give your vendors access to the data they need to fulfill their commitment to you. The problem is, they often give access to other unknown parties too. Hidden in the code of the tags provided by your martech vendors are additional tags that also give their partners access to your user data (without your permission). These are called piggyback tags, and they can cause security issues, violate privacy laws, and degrade the user experience.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Cybersecurity platform for companies wanting to prioritize and remediate any threat to their cloud stack

Audience

Website managers that need a tag management solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Lightspin
Founded: 2020
Israel
www.lightspin.io

Company Information

Crownpeak
Founded: 2001
United States
www.crownpeak.com/products/monitoring-solutions/tagcontrol

Alternatives

Alert Logic

Alert Logic

Fortra

Alternatives

TagCommander

TagCommander

Commanders Act
CySight

CySight

IdeaData
Quadrant XDR

Quadrant XDR

Quadrant Information Security
The Tag Monitor

The Tag Monitor

Code Cube

Categories

Categories

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Integrations

Amazon Web Services (AWS)
Google Cloud Platform
Kubernetes
Microsoft Azure

Integrations

Amazon Web Services (AWS)
Google Cloud Platform
Kubernetes
Microsoft Azure
Claim Lightspin and update features and information
Claim Lightspin and update features and information
Claim TagControl and update features and information
Claim TagControl and update features and information