HTTPCS offers you a complete solution to secure your Drupal website, and thus protect you against hacking. This turnkey tool, accessible via a web interface, is very easy to use.
Scan of your Drupal site for vulnerabilities
Listing of the corrective measures to apply
Personalized support included
Available for 14 days
To detect vulnerabilities on your site before they get exploited by a hacker, start a security scan in just a few clicks and get a secure & reliable site that complies with ISO 27001-27002 standards and GDPR privacy principles:
(14-day non-binding trial)
Our HTTPCS solution is fully compatible with a Drupal website. As our experts are aware of the impact of security flaws in CMS, they have developed a tool accessible to everyone and easy to use to protect its website. Despite multiple themes, plugins and software updates, a vulnerability still may happen quickly!
Don't wait for a cyber-attack to occur: protect your website. Take an offensive approach using HTTPCS SECURITY.
Our complementary products also allow you to check in real time your site's availability, the reliability of your content or even to conduct a "deep web" watch to identify whenever you become the target for hackers.
HTTPCS experts have developed a Drupal module to identify and validate its site so that it can be analyzed by vulnerability detection technology.
The "HTTPCS Validation" module will soon be available for free on your CMS marketplace. Once this one is installed, you will have to fill in your details. The module will create a unique identification file in your CMS allowing HTTPCS to validate your site. This mandatory step will allow you to use the HTTPCS SECURITY vulnerability scanner.
Ziwit (HTTPCS) holds the label
Ziwit (HTTPCS) expert in digital security, guarantees technical expertise as well as quality advice to prevent acts of cyber-surveillance and secure your IT installations and your websites.As an ExpertCyber certified service provider, Ziwit (HTTPCS) is committed to respecting its charter of commitments.
Ziwit (HTTPCS) holds the label
The France Cybersecurity label offers the guarantee that the labeled products, solutions and services are designed, developed and operated in France, by a dynamic and innovative industrial sector recognized by the market. It is therefore a mark of excellence for companies.
Ziwit (HTTPCS) holds the Cybersecurity Made In Europe certification
The "Cybersecurity made in Europe" certification is designed to promote European cybersecurity companies and increase their visibility on the European and global market. The certification raises awareness of the strategic value of cybersecurity companies originating in Europe and developing their activity on the basis of European values of trust.
Ziwit (HTTPCS) holds the Cyber Essentials certification
Cyber Essentials is a certification supported by the British government (United Kingdom) to help organizations ensure operational security against cyber attacks.
Ziwit (HTTPCS) is part of the national systemcyber malicious
mission is to support victims of cyberattacks through its cybersecurity solutions and tools.As a service provider listed on the french government platform Cyber Malicious, Ziwit (HTTPCS) is committed to respecting its charter of commitments.
Ziwit (HTTPCS), recognized as a solution byIncibe
(Spanish National Institute of Cybersecurity)
Ziwit (HTTPCS) is recognized as trusted solution by Incibe, the Spanish national cybersecurity institute.
Being an open source CMS, Drupal does not avoid cyber-attacks. Plugins and themes are developed by the Drupal community but are not always verified by professionals. These plugins and themes can cause vulnerabilities which could endanger your website availability and your data integrity.
Drupal users may remember "Drupageddon", named like this because of the potential impact of exploiting this vulnerability. Version 7, lower than 7.32, was vulnerable to a SQL injection attack. This flaw allowed a hacker to log into your website with administrator rights. In case of success, its author was able to execute PHP commands, escalate privileges, install backdoors on the victim's system ... The vulnerability was publicly disclosed by Drupal on October 15, 2014 (ref CVE-2014-3704). Drupal developers applied an update to correct this vulnerability. As always, if the update has not been installed, the site still have security flaws.
To prevent your Drupal site from being hacked, launch your HTTPCS Vulnerability Scan: