Open
Cached
·
just now
83/100
SECURITY SCORE
Detected Technologies
Adobe Target
AWS CloudFront
YouTube
Google Tag Manager
G2
Reddit
Azure Blob Storage
Google DoubleClick
Google Analytics
6sense
Typeform
Google Static File Front End
Calendly
Google API JS Client
AzureFrontDoor
Google Fonts
Wistia
Twitter
Algolia
LinkedIn
ZoomInfo
unpkg
GlobalSign
Active incidents
Cvent
Google Search
Adobe Marketo
Adobe Dynamic Tag Management
Microsoft SharePoint
OneTrust
Lucky Orange
Adobe Fonts (Typekit)
Contentstack
Akamai
Active incidents
The Trade Desk
Microsoft Clarity
SmartRecruiters
Sentry
jsDelivr
Google Cloud
Certificate Information
Subject
C=US, ST=Virginia, L=Tysons Corner, O=MicroStrategy Incorporated, CN=*.microstrategy.com
Issuer
C=BE, O=GlobalSign nv-sa, CN=GlobalSign RSA OV SSL CA 2018
Valid From
October 22, 2025
Valid Until
November 23, 2026
227 days
Public Key
RSA
2048 bit
Adequate
Signature Algorithm
SHA256-RSA
SHA-256 Fingerprint
A2:10:B6:8C:9F:37:E9:66:D7:71:0B:2F:09:F3:75:2A:D3:95:B3:00:5A:90:BB:D5:9B:60:3D:AB:82:3A:00:5C
Alternative Names
Security Configuration
TLS Protocols
TLS 1.2
TLS 1.3
Forward Secrecy
Supported
(Modern clients use PFS)
HTTP Security Headers
Status
Strict-Transport-Security
Present
max-age=86400
X-Frame-Options
Missing
Not configured
X-Content-Type-Options
Missing
Not configured
Referrer-Policy
Missing
Not configured
Permissions-Policy
Missing
Not configured
Recommendations
- • Increase HSTS max-age to at least 1 year and add includeSubDomains
- • Improve CSP by adding more specific directives and removing 'unsafe-inline'
- • Add X-Frame-Options: DENY or SAMEORIGIN to prevent clickjacking
- • Add X-Content-Type-Options: nosniff
- • Add Referrer-Policy header (recommended: strict-origin-when-cross-origin)
- • Consider adding Permissions-Policy to control browser features
CAA Records (Certificate Authority Authorization)
CAA Records
Configured
(Restricts certificate issuance)
Current Issuer
Authorized
(Matches CAA policy)
Authorized CAs
Wildcard CAs
Incident Reporting
mailto:[email protected]
Recommendations
- • Consider using critical flag (flags=128) for stricter CAA enforcement
- • You have authorized 4 CAs - consider limiting to only the CAs you actively use