Nokod Security Wins IT Security Award 2024 for Advancements in LCNC Application Security

Award recognizes Nokod Security’s innovations in protecting enterprises from security risks in low-code/no-code environments.

NEW YORK and TEL AVIV, November 4, 2024 – Nokod Security, the security company for low-code/no-code (LCNC) application development, today announced today announced it has received the prestigious it Security Award 2024.

This award highlights Nokod Security’s innovative approach to safeguarding digital environments in enterprises that increasingly rely on LCNC platforms for rapid development and deployment.

Nokod Security is tackling the growing security risks posed by the rise of LCNC and robotic process automation (RPA) platforms. These platforms allow non-technical employees, or “citizen developers,” to create applications and automations without IT or security oversight, introducing hidden vulnerabilities. LCNC represents a form of “shadow engineering” that traditional security tools cannot detect, leaving organizations exposed to emerging threats. Nokod Security fills this gap by identifying and remediating security vulnerabilities in LCNC and RPA environments, ensuring secure and efficient innovation.

“We’re incredibly proud to be recognized with the IT Security Award 2024, as it underscores the growing importance of protecting LCNC applications,” said Yair Finzi, CEO of Nokod Security. “This award reflects our commitment to delivering tools that enable security teams to mitigate risks and secure sensitive data in environments that are often overlooked by traditional security approaches.”

The Nokod Security platform addresses the limitations of traditional Application Security tools, which are not designed to manage risks in LCNC development. Nokod Security’s comprehensive platform automatically discovers LCNC apps and RPAs, detects threats, and provides continuous compliance management. It ensures security without interrupting business operations, leveraging a shift-left approach to deliver user-friendly tools for citizen developers and automated oversight for security teams. With unmatched visibility and ease of use, Nokod Security enables secure digital transformation in an increasingly complex application landscape.

How Nokod Security Works

The Nokod Security platform protects enterprises from security risks in LCNC and RPA applications on platforms like Microsoft Power Apps, UiPath, and Salesforce. It continuously monitors these applications for vulnerabilities, such as data leakage and supply chain threats, while enabling proactive remediation. Key features include automatic discovery and inventory of LCNC apps, consistent policy enforcement, customizable governance rules with automated responses, and seamless integration via APIs. The platform offers real-time visibility, reporting, and remediation tools for both IT teams and citizen developers, supporting secure, scalable LCNC development.

About Nokod Security

The Nokod Security platform protects enterprises amidst digital transformation and their pursuit of productivity gains from low-code/no-code application development.

Nokod Security offers application security and governance for applications and automations developed in low-code / no-code (LCNC) and RPA environments such as Microsoft Power Apps, UiPath, ServiceNow, etc. Nokod Security detects vulnerabilities and compliance issues and allows for managing a governance policy in a field currently invisible to security teams and considered a Shadow Engineering area.

Media Contact

Marc Gendron
Marc Gendron PR for Nokod Security
[email protected]
617-877-7480

Dr. Ursula Ron
Director of Marketing
ursula[at]nokodsecurity.com

More News from Nokod

Black Hat Europe 2024

Meet us in London. Black Hat Europe, part of the globally renowned Black Hat conference series, brings together the information security community to share cutting-edge research, tools, and insights in cybersecurity.

The Attacker’s Path to Hacking UiPath RPAs

Leaving the attack surface created by UiPath robotic process automations unattended is more dangerous than you might think.
In this webinar, security expert Amichai Shulman demonstrates key RPA weaknesses, such as SQL injection, command injection, supply chain vulnerabilities, and container security flaws.

Scroll to Top