www.menlosecurity.com
Open in
urlscan Pro
141.193.213.20
Public Scan
Submitted URL: https://pages.menlosecurity.com/MjgxLU9XVi04OTkAAAGFZ8_hHRWefUYQafEOsioYZibb-CZyP1pf-DCvWuGopOumwzNI4JUo7NAyY_8z3BZ6_sj71gM=
Effective URL: https://www.menlosecurity.com/privacy-policy/
Submission: On July 04 via api from FR — Scanned from FR
Effective URL: https://www.menlosecurity.com/privacy-policy/
Submission: On July 04 via api from FR — Scanned from FR
Form analysis
3 forms found in the DOMGET https://www.menlosecurity.com/
<form action="https://www.menlosecurity.com/" class="search-form" method="get" role="search"> <label> <span class="screen-reader-text">Search for:</span> <input type="text" title="Search for:" name="s" value="" id="s" placeholder="Search …"
class="search__field" autocomplete="off"> </label> <button type="submit" class="search__btn"> Search <i class="fas fa-search"></i> </button></form>
GET https://www.menlosecurity.com/
<form action="https://www.menlosecurity.com/" class="search-form" method="get" role="search"> <label> <span class="screen-reader-text">Search for:</span> <input type="text" title="Search for:" name="s" value="" id="s" placeholder="Search …"
class="search__field" autocomplete="off"> </label> <button type="submit" class="search__btn"> Search <i class="fas fa-search"></i> </button></form>
POST /privacy-policy/
<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_1" id="gform_1" class="subscribe" action="/privacy-policy/" novalidate="">
<div class="gform_body gform-body">
<div id="gform_fields_1" class="gform_fields top_label form_sublabel_below description_below">
<div id="field_1_1" class="gfield gfield_contains_required field_sublabel_below field_description_below hidden_label gfield_visibility_visible gfield--email gfield--large" data-field-class="gfield--email gfield--large"><label
class="gfield_label" for="input_1_1">Email<span class="gfield_required"><span class="gfield_required gfield_required_text">(Required)</span></span></label>
<div class="ginput_container ginput_container_email"> <input name="input_1" id="input_1_1" type="email" value="" class="large" tabindex="1" placeholder="Email" aria-required="true" aria-invalid="false"></div>
</div>
<div id="field_1_2" class="gfield gform_validation_container field_sublabel_below field_description_below gfield_visibility_visible gfield--honeypot gfield--" data-field-class="gfield--honeypot gfield--"><label class="gfield_label"
for="input_1_2">Phone</label>
<div class="ginput_container"><input name="input_2" id="input_1_2" type="text" value="" autocomplete="new-password"></div>
<div class="gfield_description" id="gfield_description_1_2">This field is for validation purposes and should be left unchanged.</div>
</div>
</div>
</div>
<div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_1" class="gform_button button" value="Subscribe" tabindex="2"
onclick="if(window["gf_submitting_1"]){return false;} if( !jQuery("#gform_1")[0].checkValidity || jQuery("#gform_1")[0].checkValidity()){window["gf_submitting_1"]=true;} "
onkeypress="if( event.keyCode == 13 ){ if(window["gf_submitting_1"]){return false;} if( !jQuery("#gform_1")[0].checkValidity || jQuery("#gform_1")[0].checkValidity()){window["gf_submitting_1"]=true;} jQuery("#gform_1").trigger("submit",[true]); }">
<input type="hidden" name="gform_ajax" value="form_id=1&title=&description=&tabindex=1"> <input type="hidden" class="gform_hidden" name="is_submit_1" value="1"> <input type="hidden" class="gform_hidden" name="gform_submit" value="1">
<input type="hidden" class="gform_hidden" name="gform_unique_id" value=""> <input type="hidden" class="gform_hidden" name="state_1" value="WyJbXSIsIjFlNGM1ZWU3MWRjMWEyYzRmZjZlY2YwYjIxZGNhZGQ0Il0="> <input type="hidden" class="gform_hidden"
name="gform_target_page_number_1" id="gform_target_page_number_1" value="0"> <input type="hidden" class="gform_hidden" name="gform_source_page_number_1" id="gform_source_page_number_1" value="1"> <input type="hidden" name="gform_field_values"
value=""></div>
</form>
Text Content
Learn how hybrid work is fueling ransomware attacks and what to do about it. Learn more Search for: Search Most Searched * Secure Web Gateway (SWG) 101: Your primer to an isolation-based approach to cybersecurity * Hiding in plain sight: New Adwind jRAT Variant Uses normal Java commands to mask its behavior * U.S. Department of Defense (DoD) leads the industry with cloud-based internet isolation program * ISOMorph Infection: In-Depth Analysis of a New HTML Smuggling Campaign * Increase In Drive-by Attack: SocGholish Malware Downloads * Why Menlo Back Why Menlo WHY MENLO Traditional security approaches are flawed, costly, and overwhelming for security teams. Menlo Security is different. It’s the simplest, most definitive way to secure work—making online threats irrelevant to your users and your business. Why Menlo eBook The Ultimate Buyer's Guide: Secure Web Gateway MOVING TO THE CLOUD * Switch from Bluecoat * Switch from Forcepoint WARRANTY * Stop ransomware in its tracks * Products Back Products MEET THE CLOUD-NATIVE MENLO SECURITY PLATFORM Our platform invisibly protects users wherever they go online. So threats are history and the alert storm is over. Explore platform Data Sheet Cloud Security Platform powered by and Isolation Core™ PRODUCTS * Products Overview * Secure Web Gateway * Remote Browser Isolation * Email Isolation * CASB * DLP * Menlo Private Access * Cloud Firewall * Isolation Security Operations Center PLATFORM * Platform Overview CUSTOMER SUCCESS * Customers * Customer Support * Training & Certification * Report a Vulnerability * Solutions Back Solutions NEED TO IMPLEMENT SASE, ASAP? Traditional network security wasn’t built to address today’s complex enterprise environments. SASE fixes that problem. Learn more Solution Brief Learn how to migrate on-premise proxy to SWG SOLUTIONS * Solutions Overview * Eliminate phishing & ransomware * Seamless ransomware prevention * Gain visibility & control over data loss * Control access to SaaS applications * Implement Secure Access Service Edge (SASE) * Secure access to private applications * Secure Microsoft 365 & Google Workspace * Secure remote work * Mobile malware prevention * Virtual network separation * Neutralize malicious document downloads * Migrate on-premise proxy to Cloud SWG * Zero Trust Overview INDUSTRIES * US Federal * Finance * Resources Back Resources THREAT INTELLIGENCE IS ON TAP AT MENLO LABS Menlo Labs provides insights, expertise, context and tools to aid customers on their journey to connect, communicate and collaborate securely without compromise. The collective is made up of elite security researchers that put a spotlight on the threats you know and don’t know about. Learn More Live Webinars Defining your journey to SASE. RESOURCE LIBRARY * All Resources * White Papers * Data Sheets * Solution Briefs * Case Studies / Customer Stories * eBooks * Reports * Videos * Infographics EVENTS & WEBINARS * BrightTALK Channel BLOG * Blog Home MENLO LABS * Menlo Labs DEMO * Product Demo * About Back About THREAT INTELLIGENCE IS ON TAP AT MENLO LABS Menlo Labs provides insights, expertise, context and tools to aid customers on their journey to connect, communicate and collaborate securely without compromise. Learn more COMPANY * About Us * Management Team * Board of Directors * Investors * Customers * Partners * Technology Partners * Contact Us NEWSROOM * News * Press Releases * Blogs CAREERS * Life at Menlo * Job Openings * Demo EN日本語한국어 * * Support Portal * Report a Vulnerability * Training & Certification * Search for: Search Most Searched * Secure Web Gateway (SWG) 101: Your primer to an isolation-based approach to cybersecurity * Hiding in plain sight: New Adwind jRAT Variant Uses normal Java commands to mask its behavior * U.S. Department of Defense (DoD) leads the industry with cloud-based internet isolation program * ISOMorph Infection: In-Depth Analysis of a New HTML Smuggling Campaign * Increase In Drive-by Attack: SocGholish Malware Downloads PRIVACY POLICY Effective Date: May 18, 2021 Menlo Security, Inc., together with its affiliates (“Menlo Security”, “we”, “our” or “us”), is committed to transparency in our collection and processing of information. This Privacy Policy describes how we collect, use, disclose and protect information from and about you through our website www.menlosecurity.com and any other website or mobile application that links to this Privacy Policy (the “Site”), and any other interactions (e.g., customer service and other communications) that you may have with Menlo Security (collectively, the “Services”).PLEASE READ THIS PRIVACY POLICY CAREFULLY TO UNDERSTAND HOW WE HANDLE YOUR INFORMATION. IF YOU DO NOT AGREE TO THIS PRIVACY POLICY, PLEASE DO NOT USE THE SERVICES. SCOPE OF THIS PRIVACY POLICY For purposes of this Privacy Policy: * A “Customer” means an entity that has contracted with Menlo Security (such as through an applicable services agreement) to access our products, solutions or platforms (the “Menlo Security Technology”). * A “User” means an individual who accesses the Menlo Security Technology as or on behalf of a Customer, including Customer personnel. * A “Site Visitor” means an individual who visits our Site outside of the context of our Customers’ use of the Solutions. * A “Customer End User” means an individual whose information Menlo Security receives from Customer, or otherwise processes on Customer’s behalf, in connection with the Solutions provided by Menlo Security to Customer pursuant to an applicable services agreement. This Privacy Policy applies to our handling of information about Site Visitors, prospective Customers, and current Customers and Users (in relation to their procurement of the Menlo Security Technology and management of their relationship with Menlo Security). We refer collectively to these categories of individuals as “you” throughout this Privacy Policy. However, this Privacy Policy does not cover information about Customer End Users that Menlo Security receives from Customer, or otherwise processes on Customer’s behalf, in connection with the Solutions provided by Menlo Security to Customer pursuant to an applicable services agreement (including the content of messages, files and attachments of Customer End Users (“End User Communications”)). Menlo Security processes End User Communications and other information of Customer End Users under the instructions of the relevant Customer as the “data controller” or similar role as defined in applicable privacy laws, as described in the applicable services agreement entered into by such Customer and Menlo Security. Menlo Security’s obligations as a “data processor” or “service provider” with respect to such information are defined in such services agreement, and are not made part of this Privacy Policy. If you are a Customer End User and you have questions about how your information is collected and processed through the Solutions, please contact the Customer who has provided your information to us for more information. THE INFORMATION WE COLLECT We collect, store and use certain information from or about you for the purposes described below. 1. INFORMATION YOU PROVIDE TO US We collect a variety of information that you provide directly to us. For example, we collect information from you through: * * When you register for an account with us * Your use of the Services * Requests or questions you submit to us via online forms, email, or otherwise * When we reach out to you by phone or email in our sales and marketing efforts * Your participation in surveys, sweepstakes, or contests * When you communicate with our customer service teams via email, phone, or chat * When you attend our conferences or events or interact with us at other conferences or events * When you use a blog or forum made available through the Services The types of data we collect directly from you include: * * First and last name * Email address * Postal address * Telephone number * Your company or organization name * Your title * Any other information you choose to directly provide to us in connection with your use of the Services We may also collect and store any data and related output created, derived or generated by you through the use of the Services, as well as your Services usage, and your usage of the Menlo Security Technology. 2. INFORMATION WE COLLECT THROUGH AUTOMATED MEANS When you use our Services, we and our service providers (who are third parties that perform services on our behalf) automatically collect certain information about your device and how you use the Services, including your IP address, browser type, browser language, operating system, the state or country from which you accessed the Services, software and hardware attributes (including device IDs), referring and exit pages and URLs, platform type, the number of clicks, files you download, domain names, landing pages, pages viewed and the order of those pages, the amount of time spent on particular pages, the date and time you used the Services, error logs, and other similar information. From your IP address, we may be able to infer your general location (e.g., city/state or postal code). To collect this information, we and our service providers may also make use of “cookies” or similar tools that track, measure, and analyze the behaviors and usage patterns of our users. Cookies are small data files that can be stored on your browser and device so we can recognize you when you return. We use cookies for analytics purposes, to deliver certain features of the Services, to help us understand how users engage with the Services, and to improve your experience. You may set your web browser to notify you when you receive a cookie and to accept or refuse certain cookies. However, if you elect not to accept cookies, some functionality and areas of the Services may be restricted. To learn how to manage your cookies, please follow the instructions from your specific browser, or if accessing the Services via a mobile device, refer to the manufacturer’s instructions. For more details, please refer to the Menlo Security Cookie Policy. 3. INFORMATION WE COLLECT FROM OTHERS From time to time, we may collect information about you from other sources, including marketing vendors, survey providers, data enhancement services, social media, conferences, and other industry events or other purposes that we explain to you at the time of collection, to the extent permitted by applicable law. We use this information to supplement the information that we collect directly from you in order to derive your possible interests and provide more relevant experiences for you and improve our Services, analytics, and advertising. When you “like” or “follow” us on Facebook, LinkedIn, Twitter or other social media sites, we may collect some information from you including your name, email address, and any comments or content you post relevant to us. HOW WE USE YOUR INFORMATION We use your information for various purposes depending on the types of information we have collected from and about you, in order to: * * Provide you with access to and to administer our Services * Respond to your requests for information and provide you with more effective and efficient customer service * Contact you by email, postal mail, or phone with news, updates, information, promotions, surveys or contests relating to the Menlo Security Technology or our Services or other services that may be of interest to you, in accordance with applicable legal requirements related to such communications (note you may update your may update your Menlo Security email subscriptions on the Menlo Security Subscription Center) * Customize the content you see on our Services * Engage in analysis and research regarding use of the Site and the Services, and improve the Menlo Security Technology and our Services * Secure our Services and resolve technical issues being reported * Comply with any procedures, laws, and regulations which apply to us where it is necessary for our legitimate interests or the legitimate interests of others * Establish, exercise, or defend our legal rights where it is necessary for our legitimate interests or the legitimate interests of others Aggregate/De-Identified Information. We may aggregate and/or de-identify any information collected through our Services so that such information can no longer be linked to you or your device (“Aggregate/De-Identified Information”). We may use such information for any purpose, including without limitation for research and marketing purposes, and may also share such data with any third parties, including advertisers, partners, and sponsors. LEGAL BASES FOR USE OF YOUR INFORMATION The legal bases for using your information as set out in this Privacy Policy are as follows: * * Where we need to perform the contract we are about to enter into or have entered into with you for the Services * Where it is necessary for our legitimate interests (or those of a third party) and your interests and fundamental rights do not override those interests * Where we need to comply with a legal or regulatory obligation in the EU * Where we have your consent to process your information in a certain way ONLINE ANALYTICS AND ADVERTISING ANALYTICS. We may use third-party web analytics services (such as those of Google Analytics) on our Services to collect and analyze usage information through cookies and similar tools; engage in auditing, research, or reporting; assist with fraud prevention; and provide certain features to you. To prevent Google Analytics from using your information for analytics, you may install the Google Analytics Opt-out Browser Add-on by clicking here. If you receive email from us, we may use certain analytics tools, such as clear GIFs to capture data such as when you open our message or click on any links or banners our email contains. This data allows us to gauge the effectiveness of our communications and marketing campaigns. ONLINE ADVERTISING. In using the Services, we allow select third party advertising technology partners to place cookies or other tracking technologies on the browser of your device to collect information about you as discussed above. These third parties (e.g., ad networks and ad servers such as Google, Facebook, and others) may use this information to serve relevant content and advertising to you as you browse the Internet, and access their own cookies or other tracking technologies on your browser to assist in this activity. If you are interested in more information about these online advertising activities, and how you can generally control cookies from being put on your computer to deliver tailored advertising, you may visit the Network Advertising Initiative’s Consumer Opt-Out link, the Digital Advertising Alliance’s Consumer Opt-Out link, or Your Online Choices to opt-out of receiving tailored advertising from companies that participate in those programs. We do not control these opt-out links or whether any particular company chooses to participate in these opt-out programs. We are not responsible for any choices you make using these mechanisms or the continued availability or accuracy of these mechanisms. Please note that if you use these mechanisms, you may still see advertising on our Services or across the Internet, but it will not be tailored to you based on your online behavior over time. Do Not Track (“DNT”) is a privacy preference that users can set in certain web browsers. We are committed to providing you with meaningful choices about the information collected on our Services for third party purposes, and that is why we provide the variety of opt-out mechanisms listed above. However, we do not currently recognize or respond to browser-initiated DNT signals. HOW WE SHARE AND DISCLOSE YOUR INFORMATION We will share your information in the following ways: * * Service Providers. We provide access to or share your information with select third parties who help us deliver or improve our Services or perform services on our behalf, including billing and credit card verification, advertising and marketing, Services content and features, analytics, research, customer service, shipping and fulfillment, data storage, security, web hosting, fraud prevention, and legal services. * Affiliates and Subsidiaries. We may share the information we collect within the Menlo Security family of companies. * Your Company. If you are a User, we may provide your information to the company you are engaged or employed by in order to fulfill and enforce our services agreement with your company, and to inform your company regarding usage, support, or training needs. * Testimonials. We may display personal testimonials and endorsements of satisfied customers on the Services, and with your consent, will associate your name or your company’s name with such postings. * Protection of Menlo Security and Others. By using the Services, you acknowledge and agree that we may access, retain, and disclose the information we collect and maintain about you if required to do so by applicable law or in a good faith belief that such access, retention or disclosure is reasonably necessary to: (a) comply with legal process (e.g. a subpoena or court order); (b) enforce any contracts with you, including our End User License Agreement; (c) respond to claims that any content violates the rights of third parties; and/or (d) protect the rights, property or personal safety of Menlo Security, its agents and affiliates, its users and/or the public. * Business Transactions. In accordance with applicable legal obligations, your information may be provided to third parties in connection with a merger or acquisition (including transfers made as part of insolvency or bankruptcy proceedings) involving all or part of Menlo Security or our assets, or as part of a corporate reorganization or stock sale or other change in corporate control or fundamental business change, including for the purpose of determining whether to proceed or continue with such transaction or business relationship. * Aggregate/De-Identified Information. From time to time, we may share Aggregate/De-identified Information about use of the Services or our user base with partners and others, but such information will not identify you personally. * Otherwise with Your Consent or at Your Direction. In addition to the sharing described in this Privacy Policy, we may share information about you with third parties whenever you consent to or direct such sharing. RETENTION OF YOUR INFORMATION We keep your information for no longer than necessary for the purposes for which it is processed. The length of time for which we retain information depends on the purposes for which we collected and use it and/or as required to comply with applicable laws. YOUR RIGHTS AND YOUR CHOICES You have certain rights with respect to your information as further described in this section. 1. YOUR LEGAL RIGHTS If you would like further information in relation to your legal rights under applicable law or would like to exercise any of them, please contact us using the information in the “Contact Information” section below at any time. Your local laws (e.g., if you are a citizen or resident of the European Economic Area or California) may permit you to request that we: * * provide access to and/or a copy of certain information we hold about you * update information which is out of date or incorrect * delete certain information that we are holding about you * restrict the way that we process and disclose certain of your information They may also permit you to revoke your consent for the processing of your information. We will consider all requests and provide our response within the time period stated by applicable law and as otherwise required by applicable law. Please note, however, that certain information may be exempt from such requests in some circumstances, which may include if we need to keep processing your information for our legitimate interests or to comply with a legal obligation. We may request you provide us with information necessary to confirm your identity before responding to your request. To submit a request, please contact us at legal@menlosecurity.com. If you are a Customer End User and your information has been collected by Menlo Security as a result of our Customer’s use of the Menlo Security Technology pursuant to a services agreement between Customer and Menlo Security, Menlo Security collects and processes any information of yours under the directions of the relevant Customer. If these circumstances apply to you and you wish to access, edit, delete or exercise any rights you may have under applicable data protection laws with respect to any information that we have collected about you, please direct your query to the relevant Customer, as this may expedite the completion of your request. We nevertheless provide reasonable assistance to our Customers to give effect to data subject rights as appropriate and required by applicable laws. Please note that End User Communications are collected only temporarily by the Menlo Security Technology and the content does not persist in our systems. 2. MARKETING COMMUNICATIONS If, in accordance with applicable legal requirements, we send you marketing communications regarding our Services, The Menlo Security Technology, or the services of third parties that we believe will be interesting to you, you can ask us to stop sending such communications at any time by contacting us using the information in the “Contact Information” section below at any time. In our marketing email messages, you can also opt out by following the instructions located at the bottom of such emails. Please note that, regardless of your request, we may still use and share certain information as permitted by this Privacy Policy or as required by applicable law. For example, you may not opt out of certain transactional emails from us, such as those confirming your requests or providing you with updates regarding our Privacy Policy or other terms. THIRD PARTY LINKS AND FEATURES * Our Services may contain links to third-party websites. If you choose to visit these sites and use their services, please note that we are not responsible for their content or privacy practices. The collection, use, and disclosure of your information will be subject to the privacy policies of the third-party websites, and not this Privacy Policy. We urge you to read the privacy policies of these third parties. INTERNATIONAL USERS * Your information is maintained and processed by us and our third-party service providers in the United States, and may also be maintained, processed, and stored in other jurisdictions that may have different data protection laws than those in your country of residence. In the event that your information is transferred in these ways, please note that we comply with applicable legal requirements governing the transfer of information across borders. By using the Services, you agree to and acknowledge these transfers. HOW WE PROTECT YOUR INFORMATION * Menlo Security takes a variety of technical and organizational security measures to protect the information provided to us from loss, misuse, and unauthorized access, disclosure, alteration, or destruction. However, no Internet or email transmission is ever fully secure or error free. Please keep this in mind when disclosing any information to us online. PRIVACY INFORMATION FOR CALIFORNIA USERS * If you are a California resident, California law requires us to provide you with some additional information regarding how we collect, use, and share your “personal information” (as defined in the California Consumer Privacy Act (“CCPA”)). Categories of Personal Information We Collect and How We Use Them. Throughout this Privacy Policy, we discuss in detail the specific pieces of personal information we collect from and about our users. Under the CCPA, we are also required to provide you with the “categories” of personal information we collect and how we use each category of personal information. The categories we collect are: Category of Personal InformationHow We Use this Personal InformationContact Information (such as your full name, phone number, address, email address) * * Provide the services and respond to your requests * Contact you with relevant information and offers * Customize content, and analyze use of and improve the services * Comply with law or defend our legal rights * Security/fraud prevention * Create aggregate/de-identified information Login Information (such as your account name and password) * * Provide the services and respond to your requests * Comply with law or defend our legal rights * Security/fraud prevention * Create aggregate/de-identified information Professional or Employment Information (such as the name and address of the company you work for and your title) * * Provide the services and respond to your requests * Contact you with relevant information and offers * Customize content, and analyze use of and improve the services * Comply with law or defend our legal rights * Security/fraud prevention * Create aggregate/de-identified information Device and Online Information (such as mobile device content, IP address, browsing history, and usage information) * * Provide the services and respond to your requests * Contact you with relevant information and offers * Customize content, and analyze use of and improve the services * Comply with law or defend our legal rights * Security/fraud prevention * Create aggregate/de-identified information Other information (any other information you choose to provide directly to us) * * Provide the services and respond to your requests * Contact you with relevant information and offers * Customize content, and analyze use of and improve the services * Comply with law or defend our legal rights * Security/fraud prevention * Create aggregate/de-identified information Do Not Sell Rights. Please note that the CCPA sets forth certain obligations for businesses that “sell” personal information to third parties. We do not engage in such activity and have not engaged in such activity in the past twelve months from the Effective Date of this Privacy Policy. B. Your California Privacy Rights. The CCPA allows you to make certain requests about your personal information. Specifically, the CCPA allows you to request us to: Inform you about the categories of personal information we collect or disclose about you; the categories of sources of such information; the business or commercial purpose for collecting your personal information; and the categories of third parties with whom we share/disclose personal information. Provide access to and/or a copy of certain personal information we hold about you. Delete certain personal information we have about you. Provide you with information about the financial incentives that we offer to you, if any. The CCPA further provides you with the right not to be discriminated against (as provided for in applicable law) for exercising your rights. Please note that certain information may be exempt from such requests under California law. For example, we need certain information in order to provide the Service to you. We also will take reasonable steps to verify your identity before responding to a request. In doing so, we may ask you for verification information so that we can match at least two verification points with information we maintain in our files about you. If we are unable to verify you through this method, we shall have the right, but not the obligation, to request additional information from you. If you would like further information regarding your legal rights under California law or would like to exercise any of them, or if you are an authorized agent making a request on a California consumer’s behalf, please contact us using the contact information provided below. If you are a Customer End User, please contact the Customer who has provided your information to us for more information. Shine the Light Disclosure: The California “Shine the Light” law gives residents of California the right under certain circumstances to request information from us regarding the manner in which we share certain categories of personal information (as defined in the Shine the Light law) with third parties for their direct marketing purposes. We do not share your personal information with third parties for their own direct marketing purposes. NOTICE TO NEVADA RESIDENTS Certain Nevada consumers may opt out of the sale of “personally identifiable information” for monetary consideration (as such terms are defined under Nevada law) to a person for that person to license or sell such information to additional persons. We do not engage in such activity; however, if you are a Nevada resident who has purchased goods or services from us, you may submit a request to opt out of any potential future sales under Nevada law by contacting us using the methods outlined in the “Contact Information” section. Please note we may take reasonable steps to verify your identity and the authenticity of the request. Once verified, we will maintain your request in the event our practices change. CHANGES TO OUR PRIVACY POLICY We reserve the right to amend this Privacy Policy at any time to reflect changes in the law, our data collection and use practices, or advances in technology. We will make the revised Privacy Policy accessible on the Services, so you should review the Privacy Policy periodically. You can know if the Privacy Policy has changed since the last time you reviewed it by checking the “Effective Date” included at the beginning of the document. If we make a material change to the Privacy Policy, you will be provided with appropriate notice in accordance with legal requirements. By continuing to use the Services, you are confirming that you have read and understood the latest version of this Privacy Policy. CONTACT INFORMATION Menlo Security welcomes your comments and questions regarding this Privacy Policy and the collection and use of your information. If you have questions or concerns, please email us at legal@menlosecurity.com or write to: Legal Department, Menlo Security, Inc., 800 W. El Camino Real, Ste. 250, Mountain View, CA 94040. GET THREAT INTELLIGENCE INSIGHTS FROM MENLO. Email(Required) Phone This field is for validation purposes and should be left unchanged. By clicking the subscribe button, you are agreeing to our privacy policy. POPULAR RESOURCES * Why Menlo * Menlo Security Platform * Products * Solutions * Menlo Labs * Resources * Blog COMPANY * About Us * Leadership * Customers * Technology Partners * Life at Menlo * Careers * Contact SUPPORT * Support Portal * Report a Vulnerability * Training & Certification © 2022 Menlo Security. All rights reserved. * Privacy Policy * Compliance * EULA * ask@menlosecurity.com * (650) 695-0695 * * * * EN日本語한국어 Notifications By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Accept All Cookies Cookies Settings PRIVACY PREFERENCE CENTER * YOUR PRIVACY * FUNCTIONAL COOKIES * PERFORMANCE COOKIES * TARGETING COOKIES * STRICTLY NECESSARY COOKIES YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Back Button BACK Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Allow All