Situational Threat Intelligence Detection - Si
Please fill in your details to enable the download of Si’s datasheet:
Situational Threat Intelligence Detection
AT A GLANCE
Harvesting the dark web for targeted attacks and breaches related to your organisation, in real time. We harvest the public and dark web to extract situational intelligence relating specifically to our customers’ assets & users, industry verticals and geographical regions. The objectives are to identify targeted threats, breached material and potentially avoid attacks altogether. Our threat advisors look for signs that sensitive client data, credentials or intellectual property have been exposed on the Internet.
The customer specific threat intelligence is gathered by examining over 720,000 sources including TOR Sites, Forums, social sites, paste sites and IRC traffic, cloud-based file sharing sites and other points of compromise across a multi-lingual, global environment spanning the visible, dark and deep web.
HOW IT WORKS
We utilise a range of commercial (Recorded Future) and open source tools to provide the widest possible harvesting of intelligence from over 720,000 sources including dark web activity. We monitor these sources against our customers’ assets, users, email domains, URL’s and intellectual property to detect breaches, organised attack campaigns and Indicators of Compromise (IOC’s) against our customers.