HTTPCS offers you a complete solution to secure your Drupal website, and thus protect you against hacking. This turnkey tool, accessible via a web interface, is very easy to use.
Scan of your Drupal site for vulnerabilities
Listing of the corrective measures to apply
Personalized support included
Available for 14 days
Without Bank Footprint
To detect vulnerabilities on your site before they get exploited by a hacker, start a security scan in just a few clicks and get a secure & reliable site that complies with ISO 27001-27002 standards and GDPR privacy principles:
(14-day non-binding trial)
Our HTTPCS solution is fully compatible with a Drupal website. As our experts are aware of the impact of security flaws in CMS, they have developed a tool accessible to everyone and easy to use to protect its website. Despite multiple themes, plugins and software updates, a vulnerability still may happen quickly!
Don't wait for a cyber-attack to occur: protect your website. Take an offensive approach using HTTPCS SECURITY.
Our complementary products also allow you to check in real time your site's availability, the reliability of your content or even to conduct a "deep web" watch to identify whenever you become the target for hackers.
HTTPCS experts have developed a Drupal module to identify and validate its site so that it can be analyzed by vulnerability detection technology.
The "HTTPCS Validation" module will soon be available for free on your CMS marketplace. Once this one is installed, you will have to fill in your details. The module will create a unique identification file in your CMS allowing HTTPCS to validate your site. This mandatory step will allow you to use the HTTPCS SECURITY vulnerability scanner.
Being an open source CMS, Drupal does not avoid cyber-attacks. Plugins and themes are developed by the Drupal community but are not always verified by professionals. These plugins and themes can cause vulnerabilities which could endanger your website availability and your data integrity.
Drupal users may remember "Drupageddon", named like this because of the potential impact of exploiting this vulnerability. Version 7, lower than 7.32, was vulnerable to a SQL injection attack. This flaw allowed a hacker to log into your website with administrator rights. In case of success, its author was able to execute PHP commands, escalate privileges, install backdoors on the victim's system ... The vulnerability was publicly disclosed by Drupal on October 15, 2014 (ref CVE-2014-3704). Drupal developers applied an update to correct this vulnerability. As always, if the update has not been installed, the site still have security flaws.
To prevent your Drupal site from being hacked, launch your HTTPCS Vulnerability Scan: