W3Techs
provided by
Q-Success
Home Technologies Reports API Sites Quality Users Blog Forum FAQ Search

Featured products and servicesadvertise here




Site Info - Nccgroup.com

Overview of web technologies used by Nccgroup.com.

Website Background

NCC Group | Leading Cyber Security & Managed Services
Assess, Develop and Manage Cyber Threats. Research-Driven Assessments and Solutions. Address Your Challenges No Matter the Location, Industry, or Sector with NCC Group.

Description on Homepage

Top 1m among all websites

Popularity rank

Microsoft's Active Server Pages technology on the .NET framework.

ASP.NET
used on a subdomain

JavaScript is a lightweight, object-oriented, cross-platform scripting language, often used within web pages.

JavaScript

The Internet Information Services (IIS) are a set of Internet-based services for Windows, developed by Microsoft.

Microsoft-IIS 10.0
0% of sites use a newer version
used on a subdomain

Windows is an operating system produced by Microsoft.

Windows
used on a subdomain

CenturyLink is a multinational communications company headquartered in USA, owned by Lumen. This includes its subsidiaries CenturyTel, Savvis, Qwest, Embarq and the former brand Level 3.

CenturyLink
used on a subdomain

AT&T is a US-based multinational company providing among others IT and telecommunication services.

AT&T
used on a subdomain
hosting info partly based on data from ipinfo.io

CenturyLink is a multinational communications company headquartered in USA, owned by Lumen. This includes its subsidiaries CenturyTel, Savvis, Qwest, Embarq and the former brand Level 3.

CenturyLink
used on a subdomain

AT&T is a US-based multinational company providing among others IT and telecommunication services.

AT&T
used on a subdomain

Imperva offers DDoS protection and a content delivery network. This includes the former brand Incapsula.

Imperva

Ebrand offers brand protection and DNS services, owned by Namespace.

Ebrand

Microsoft is a multinational technology company headquartered in USA, also offering email services.

Microsoft

Entrust is an IT security service provider, also operating as SSL certificate authority.

Entrust

Google Analytics is a free service to get detailed statistics about the visitors of a website, provided by Google. This includes the Ads conversion tracking and the Floodlight services.

Google Analytics

The LinkedIn Insight Tag helps to optimize LinkedIn campaigns.

LinkedIn Insight Tag
used on inner pages

The Google Advertising network consists of AdSense, DoubleClick and other services.

Google Ads
used on inner pages

The Google Tag Manager is a Google service to support webmasters to manage tags on their websites.

Google Tag Manager

External Cascading Style Sheets define style rules in a separate CSS file.

External CSS

Embedded Cascading Style Sheets define a set of style rules in a <style> element within a web page.

Embedded CSS

Inline Cascading Style Sheets define style rules directly within an (X)HTML element using the style attribute.

Inline CSS

Session cookies are temporary cookies, which are deleted when the user closes the browser.

Session Cookies
used on a subdomain

Persistent cookies with an expiration time between 1 month and 1 year.

Cookies expiring in months
used on a subdomain

HttpOnly cookies are used only in the HTTP protocol and not in client side scripts, which may increase security.

HttpOnly Cookies
used on a subdomain

Non-HttpOnly cookies are used in the HTTP protocol and also in client side scripts, which may be a security threat.

Non-HttpOnly Cookies
used on a subdomain

Secure cookies are used only via an encrypted connections, which may increase security.

Secure Cookies
used on a subdomain

Non-secure cookies may be used via an unencrypted connections, which may be a security threat.

Non-Secure Cookies
used on a subdomain

Gzip (GNU zip) is a file compression algorithm.

Gzip Compression
used on a subdomain

A strong ETag is an HTTP header field for validation of cached web pages, that indicates a byte-for-byte identical page in the cache.

Strong ETag
used on a subdomain

HTTP/2 is the second major version of the HTTP network protocol.

HTTP/2

HTTP Strict Transport Security (HSTS) defines a mechanism enabling web sites to declare themselves accessible only via secure connections.

HTTP Strict Transport Security

The websites redirects visitors to its www subdomain, e.g. from example.com to www.example.com.

Default subdomain www

The websites redirects visitors to use SSL encryption, e.g. from http://example.com/ to https://example.com/.

Default protocol https

The Open Graph protocol, originally developed by Facebook, is an RDFa-based format that enables any web page to become a rich object in a social graph.

Open Graph

Twitter Cards enable automatic attachment of photos, videos and media elements to Tweets.

Twitter Cards

HTML5 is the fifth revision of the HTML standard.

HTML5

Transitional version of HTML.

HTML Transitional 4.0
used until recently

UTF-8 (8-bit Unicode Transformation Format) is a variable-length character encoding for Unicode, which is backwards compatible with ASCII.

UTF-8

PNG (Portable Network Graphics) is a lossless compression image format, suitable to store graphics with uniformly colored areas, and originally introduced as a free, open-source successor of GIF.

PNG

Scalable Vector Graphics (SVG) is an XML-based vector image format.

SVG

JPEG (Joint Photographic Experts Group) is a lossy compression method suitable to store photographic images.

JPEG
used on a subdomain

GIF (Graphics Interchange Format) is a lossless compression image format, originally introduced by CompuServe and suitable to store graphics, logos and simple animations.

GIF
used on a subdomain

Commercial entities

.com

United States
used on a subdomain
United Kingdom
used on a subdomain

English

 

 

Share this page

About Us Disclaimer Terms of Use Privacy Policy Advertising Contact
W3Techs on   LinkedIn LinkedIn Twitter Twitter Mastodon Mastodon Bluesky Bluesky
Copyright © 2009-2024 Q-Success