Skip to content
  • Platform
  • Solutions
  • Resources
  • Company
  • Blog
  • Contact us

Solutions

Zenity is trusted by the most innovative companies in the world

Browse Solutions

Platforms

Power Platform

Technologies

LCAP
RPA
iPaaS

Use Cases

Citizen Development

Resources

View eBooks, whitepapers, videos and more in the industry's first and packed resource library for no-code/low-code security governance

View Resource

Collaterals

Frameworks
Whitepapers

Gallery

Videos

Learning Center

Glossary

Company

Zenity is the leading platform to secure and monitor no-code/low-code development

Read More

Why Zenity

About Us
Careers
Trust Center

Around The World

Newsroom
Book Your Demo
Read more about the article Zenity Named a 2022 IDC Innovator in PaaS that Developers use to accelerate application development and deployment processes

Zenity Named a 2022 IDC Innovator in PaaS that Developers use to accelerate application development and deployment processes

  • Post published:November 20, 2022
Continue ReadingZenity Named a 2022 IDC Innovator in PaaS that Developers use to accelerate application development and deployment processes
Read more about the article Embracing the Next Generation of Business Developers

Embracing the Next Generation of Business Developers

  • Post published:October 25, 2022
Continue ReadingEmbracing the Next Generation of Business Developers
Read more about the article Business-Led Development- an Extension of the Public Cloud

Business-Led Development- an Extension of the Public Cloud

  • Post published:September 29, 2022
Continue ReadingBusiness-Led Development- an Extension of the Public Cloud
Read more about the article ZAPESCAPE: Organization-wide control over Code by Zapier

ZAPESCAPE: Organization-wide control over Code by Zapier

  • Post published:September 19, 2022
Continue ReadingZAPESCAPE: Organization-wide control over Code by Zapier
Read more about the article ZAPESCAPE: Vulnerability Disclosure

ZAPESCAPE: Vulnerability Disclosure

  • Post published:September 19, 2022
Continue ReadingZAPESCAPE: Vulnerability Disclosure
Read more about the article SaaS Applications Streamline Application Development and Exploitation

SaaS Applications Streamline Application Development and Exploitation

  • Post published:August 29, 2022
Continue ReadingSaaS Applications Streamline Application Development and Exploitation
Read more about the article When User Identity Loses Its Meaning, Hackers Win

When User Identity Loses Its Meaning, Hackers Win

  • Post published:July 18, 2022
Continue ReadingWhen User Identity Loses Its Meaning, Hackers Win
Read more about the article Zapier Storage Exposes Sensitive Customer Data Due to Poor User Choices

Zapier Storage Exposes Sensitive Customer Data Due to Poor User Choices

  • Post published:July 5, 2022
Continue ReadingZapier Storage Exposes Sensitive Customer Data Due to Poor User Choices
Read more about the article Is Credential Sharing the Weakest Link in Your Security Strategy?

Is Credential Sharing the Weakest Link in Your Security Strategy?

  • Post published:June 20, 2022
Continue ReadingIs Credential Sharing the Weakest Link in Your Security Strategy?
Read more about the article Microsoft Power Pages: Low-code Misconfiguration Remains a Top Security Risk

Microsoft Power Pages: Low-code Misconfiguration Remains a Top Security Risk

  • Post published:May 31, 2022
Continue ReadingMicrosoft Power Pages: Low-code Misconfiguration Remains a Top Security Risk
Read more about the article Zenity CTO’s New Column Adds Critical Perspective on Citizen Development Security

Zenity CTO’s New Column Adds Critical Perspective on Citizen Development Security

  • Post published:May 16, 2022
Continue ReadingZenity CTO’s New Column Adds Critical Perspective on Citizen Development Security
Read more about the article Why Are Low-Code Platforms Becoming the New Holy Grail of Cyberattackers?

Why Are Low-Code Platforms Becoming the New Holy Grail of Cyberattackers?

  • Post published:May 11, 2022
Continue ReadingWhy Are Low-Code Platforms Becoming the New Holy Grail of Cyberattackers?
  • 1
  • 2
  • 3
  • Go to the next page

(415) 985-7388

[email protected]
Linkedin Twitter Youtube Instagram

Platform

  • Platform
  • Solutions
  • Platform
  • Solutions

Company

  • About Us
  • Careers
  • About Us
  • Careers

Resources

  • Resources
  • Blog
  • Terms and Conditions
  • Privacy Policy
  • Cookies Policy
  • Resources
  • Blog
  • Terms and Conditions
  • Privacy Policy
  • Cookies Policy

My account

  • Sign Up
  • Sign Up

Copyright © Zenity LTD. | All rights Reserved 2023

you're currently offline