Brinqa

Brinqa

Stand:
  • M150
  • Product Information
  • Images
  • Document
  • Social Media
  • New Exhibitor

Brinqa is a leading provider of cyber risk management – enabling stakeholders, governance organizations, and infrastructure and security teams to effectively manage technology risk at the speed of business.

Products

  • Threat and Vulnerability Management

    We apply sophisticated risk models, powerful graph computation, OOB connectors and advanced analytics to the vulnerability management problem to deliv...

  • Application Security Management

    Our platform enables the centralization and standardization of the underlying services that are common across individual application and infrastructur...

  • IT Risk Management

    Built from the ground up for optimal extensibility, scalability, computational magnitude and performance. This makes the solution ideal for representi...

Please wait loading...

Please wait loading...

Documents

  • Solution Brief : Threat & Vulnerability Management 312 KB

    Brinqa applies sophisticated risk models, powerful graph computation, OOB connectors and advanced analytics to the vulnerability management problem.

    20 Apr 2018

  • Solution Brief : Application Security 471 KB

    Brinqa Application Risk enables the centralization and standardization of the underlying services that are common across individual application and infrastructure risk management projects.

    20 Apr 2018

  • Solution Brief : IT Risk Management 479 KB

    Brinqa IT Risk Management is built from the ground up for optimal extensibility, scalability, computational magnitude and performance.

    20 Apr 2018

Contacts

  • Contact Information

    Brinqa

    www.brinqa.com
    4505 Spicewood Springs Rd Austin TX 78759 United States
    Tel:  +1 (512) 372-1004

Product Categories

  1. Product Categories
    Application Security
    • Patch Management
    • Web Application Security
    Compliance
    • PCI-DSS
    Risk Management
    • Big Data Analytics
    • Risk & Vulnerability Assessment
    • Security Analytics
    • Unified Threat Management
    • Vulnerability Management

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.