What potentially confidential information is circulating on the dark web? With Next Generation Digital Risk Protection, you can detect such data leaks and planned cyber attacks at an early stage and respond proactively.
Companies need to protect their IT infrastructure and data from cyber attacks at various levels in order to safeguard operations. Alongsidetechnical measures to prevent and combat attacks, this also includes risk monitoring to correctly assess the current threat status.
The next-generation Digital Risk Protection service includes various modules that you can combine and use according to your needs.
Brand Protection automatically scans parts of the surface web, deep web and dark web for external threats targeting the customer’s brand, products and intellectual property.
Domain Protection identifies potentially malicious domains and URLs that aim to impersonate customer domains or misuse them for attacks. The platform searches web pages and domain registrations on the surface web and dark web for threats such as domain spoofing, domain name-related trademark infringements and phishing sites.
Executive Protection identifies potential account takeover (ATO) attempts, identity theft, loss of sensitive information, doxxing or compromised credentials for specific executives or exposed individuals in a company and offers specific recommendations for action. These protective measures provide insights into the risks of identity fraud on the surface web, deep web and dark web for exposed individuals and/or executives defined by the customer.
Third-Party Monitoring monitors and provides notifications about expired SSL certificates, open ports, detected vulnerabilities and infected hosts within specific third-party brands, partners or suppliers.
Mobile app detection of fraudulent, counterfeit or malicious mobile applications that impersonate your brand or company/organisation in mobile app stores.
Exposed Payment Card Protection can identify risks associated with compromised or stolen credit card numbers or bank identification numbers (BIN).
Corporate Social Account Content Remediation is an early warning system for the detection of account takeovers. It also detects potentially inappropriate content, fraud and phishing connected with customer users on social media and digital platforms.
On-Demand Investigations are supported by an experienced team of threat intelligence experts, whose role is to address increasing and ever more complex threats to physical and digital assets. The threat intelligence team can provide customised threat analysis for customer risk identification and assessment, specific threat intelligence reports for threat assessment and strategic decision making, or red teaming services for real-world security assessment and vulnerability detection.
With Managed Takedown, automated deletion requests for the removal of externally hosted, illegal content related to the customer’s brand and domain can be made directly from the platform. Analysts work with the external hosts to remove illegal content from their systems. If a managed takedown is triggered, the service also includes transparent reporting and status updates.
External Attack Surface Management is an agentless, cloud-native solution that identifies exposed customer assets on the Internet by simulating a threat actor’s methods and generates recommendations using a combination of advanced identification techniques and contextual vulnerability intelligence to enable the rapid mitigation of potential threats across the attack surface. This specialised process, which records Internet-exposed assets such as subdomains, IP addresses, software and security certificates, helps you see your digital footprint the way attackers do. The audit creates an asset library that is continuously compared against a risk database, including CVSS, CVE and expired certificates.
Next Generation Digital Risk Protection is a preventive module that complements our Threat Detection and Response service offerings. Detected threats can then be further processed by the analysis and incident response services.