TagControlCrownpeak
|
||||||
Related Products
|
||||||
About
Every time you add a tag to your website, you give unknown vendors access to your data. Find out which tags pose a security risk and block them with one click. Marketers need martech tools to build more effective digital campaigns, but for every tool added to your site, numerous unknown vendors get access to your data. Watch the video to learn how TagControl mitigates the risk. If you're like most enterprise companies, your marketing team has an abundant martech stack, which is powered by tags you add to your website. These tags give your vendors access to the data they need to fulfill their commitment to you. The problem is, they often give access to other unknown parties too. Hidden in the code of the tags provided by your martech vendors are additional tags that also give their partners access to your user data (without your permission). These are called piggyback tags, and they can cause security issues, violate privacy laws, and degrade the user experience.
|
About
Regulators and management need 3rd party assessment that are accurate and not based upon opinions or assumptions. VivoSecuiry enables our customers to satisfy regulators by assessing true 3rd party risk, which is the probability that one of their vendors will have a data breach, obsoleting the use of questionnaires, maturity scores and SOC2 reports. The risk from 3rd parties is from breaches caused by the sheer number of vendors. VivoSecurity quantifies this risk twice per year, with an aggregate forecast. We help senior management set risk appetite goals with a testable forecast of data breach frequency. We help cybersecurity teams identify the few vendors that represent most of the risk, we then quantify the value of mitigation. Finally, we satisfy regulators with an accurate and documented process for vendor assessment using an empirical and transparent regression model for probability of data breach.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Website managers that need a tag management solution
|
Audience
Vendor risk assessment solution for companies to improve cybersecurity and reduce costs
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationCrownpeak
Founded: 2001
United States
www.crownpeak.com/products/monitoring-solutions/tagcontrol
|
Company InformationVivoSecurity
Founded: 2012
United States
www.vivosecurity.com
|
|||||
Alternatives |
Alternatives |
|||||
|
||||||
|
||||||
|
|
|||||
|
||||||
Categories |
Categories |
|||||
Integrations
No info available.
|
Integrations
No info available.
|
|||||
|
|