Nokod Security Expands LCNC Multi-Platform Support to ServiceNow and Joins ServiceNow Partner Program

Nokod enables organizations to detect and remediate security risks associated with citizen developer low-code/no-code applications.

NEW YORK and TEL AVIV, August 13, 2024 – Nokod Security, the security company for low-code/no-code (LCNC) application development, today announced it has expanded its industry-leading multi-platform capabilities with support for ServiceNow LCNC custom application tools (like App Engine and Automation Engine). The Nokod Security platform enables organizations to protect against security threats introduced by custom applications developed on ServiceNow. The company also announced it has joined the ServiceNow Partner Program. 

Support for ServiceNow enables customers to connect the Nokod platform within minutes to their ServiceNow environment in order to inventory and achieve immediate visibility into security threats, vulnerabilities, compliance issues, and misconfigurations contained in applications. The Nokod platform also provides easy-to-understand remediation guidance, as well as automated remediation, to help security teams and citizen developers strengthen the security posture of their applications and automations.

“Organizations are struggling to understand and defend the new attack surface created by citizen development,” said Amichai Shulman, Co-founder and CTO of Nokod Security. “By supporting ServiceNow, we are expanding our LCNC multi-platform support so customers can monitor and secure all citizen-developed assets with one security solution, regardless of the platform used.”

The Nokod Security Platform enables organizations to accelerate the development of ServiceNow applications while enforcing security and governance policies. With Nokod, organizations can facilitate robust application development without introducing unnecessary security risks. Key benefits of Nokod Security’s support for ServiceNow include:

  • Discovering all applications and automations developed with ServiceNow within the organization
  • Applying uniform security policies across all applications and automations with clear remediation instructions for detected issues
  • Revealing security and compliance issues and detecting vulnerabilities
  • Auto-remediation and guidance for developers to adopt security and compliance best practices

“Partnering with ServiceNow enables joint customers to deploy purpose-built LCNC security capabilities without creating barriers to innovation,” said Yair Finzi, Co-founder and CEO of Nokod Security. “With added support for ServiceNow, Nokod serves as a centralized security hub that allows organizations to safely accelerate their digital transformation across all leading LCNC development platforms.”

About Nokod Security

The Nokod Security platform protects enterprises amidst digital transformation and their pursuit of productivity gains from low-code/no-code application development.

Nokod Security offers application security and governance for applications and automations developed in low-code / no-code (LCNC) and RPA environments such as Microsoft Power Apps, UiPath, ServiceNow, etc. Nokod Security detects vulnerabilities and compliance issues and allows for managing a governance policy in a field currently invisible to security teams and considered a Shadow Engineering area.

Media Contact

Marc Gendron
Marc Gendron PR for Nokod Security
[email protected]
617-877-7480

Dr. Ursula Ron
Director of Marketing
ursula[at]nokodsecurity.com

More News from Nokod

Black Hat Europe 2024

Meet us in London. Black Hat Europe, part of the globally renowned Black Hat conference series, brings together the information security community to share cutting-edge research, tools, and insights in cybersecurity.

The Attacker’s Path to Hacking UiPath RPAs

Leaving the attack surface created by UiPath robotic process automations unattended is more dangerous than you might think.
In this webinar, security expert Amichai Shulman demonstrates key RPA weaknesses, such as SQL injection, command injection, supply chain vulnerabilities, and container security flaws.

Scroll to Top