Open
Cached
·
just now
92/100
SECURITY SCORE
Detected Technologies
UserWay
Google AdSense
Chili Piper
Google Maps
Dreamdata
Google Tag Manager
G2
SurveyMonkey
Sectigo
Google Hosted Libraries
AppNexus (Xandr)
WordPress
Reddit
Yahoo
Google DoubleClick
Arcade
Google Analytics
Microsoft Advertising
Trendemon
6sense
Parse.ly
Google Static File Front End
Google Fonts
Clickagy
Wistia
Twitter
LinkedIn
Microsoft ASP.NET CDN
ZoomInfo
WordPress VIP
Influ2
MaxMind
Google Search
BootstrapCDN
Qualified
Facebook
OneTrust
Cloudflare CDNJS
jQuery
Salesforce Pardot
Vimeo
YouTube
The Trade Desk
jsDelivr
Google Cloud
Certificate Information
Subject
CN=www.walkme.com
Issuer
C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication CA DV R36
Valid From
January 20, 2026
Valid Until
February 20, 2027
363 days
Public Key
RSA
2048 bit
Adequate
Signature Algorithm
SHA256-RSA
SHA-256 Fingerprint
CC:D9:AB:7A:8A:97:FB:0C:5C:53:2E:07:B0:2A:B8:6B:50:AF:76:7E:3C:06:C2:9F:9C:9E:87:CE:F3:C8:2D:83
Alternative Names
Security Configuration
TLS Protocols
TLS 1.2
TLS 1.3
Forward Secrecy
Supported
(Modern clients use PFS)
HTTP Security Headers
Status
Strict-Transport-Security
Missing
Not configured
X-Frame-Options
Excellent
DENY
X-Content-Type-Options
Good
nosniff
Referrer-Policy
Good
strict-origin-when-cross-origin
Permissions-Policy
Present
geolocation=(), microphone=()
Recommendations
- • Add Strict-Transport-Security header with max-age of at least 1 year
- • Improve CSP by adding more specific directives and removing 'unsafe-inline'
CAA Records (Certificate Authority Authorization)
CAA Records
Configured
(Restricts certificate issuance)
Current Issuer
Authorized
(Matches CAA policy)
Authorized CAs
Wildcard CAs
Recommendations
- • Consider using critical flag (flags=128) for stricter CAA enforcement
- • You have authorized 4 CAs - consider limiting to only the CAs you actively use
- • Consider adding 'iodef' records to receive notifications about unauthorized certificate issuance attempts