Digital risk monitoring and threat intelligence

Next Generation Digital Risk Protection – proactive protection from cyber attack

You control the data in your IT infrastructure. But what about your digital footprint; the online data that your company leaves behind?

What potentially confidential information is circulating on the dark web? With Next Generation Digital Risk Protection, you can detect such data leaks and planned cyber attacks at an early stage and respond proactively.

Digital risk monitoring and threat intelligence

The start of a cyber attack can go unnoticed by your IT security. Perhaps access data for your corporate network is being sold on the dark web. Or scammers are planning to pose as your company in a phishing attack to lure unsuspecting victims to a fake company website. Next Generation Digital Risk Protection monitors such activities and uses threat intelligence to collect information about imminent attacks. This helps you to better assess the risk and prepare for attacks.

When is it the right solution?

Companies need to protect their IT infrastructure and data from cyber attacks at various levels in order to safeguard operations. Alongsidetechnical measures to prevent and combat attacks, this also includes risk monitoring to correctly assess the current threat status.

Acquiring information about the misuse of company data is time consuming. You need to use the available resources to ensure that you know about leaked company and access data and phishing attacks in the name of your company at an early stage. This is the only plausible way to assess and minimise the risk.

Your benefits

  • Comprehensive information on the current risk situation for risk assessment
  • Early warnings for a proactive response to threats
  • Notice of risks, such as expiring certificates and phishing sites, for prevention purposes

Risk protection in action 

The next-generation Digital Risk Protection service includes various modules that you can combine and use according to your needs.

Brand Protection automatically scans parts of the surface web, deep web and dark web for external threats targeting the customer’s brand, products and intellectual property.

Domain Protection identifies potentially malicious domains and URLs that aim to impersonate customer domains or misuse them for attacks. The platform searches web pages and domain registrations on the surface web and dark web for threats such as domain spoofing, domain name-related trademark infringements and phishing sites.

Executive Protection identifies potential account takeover (ATO) attempts, identity theft, loss of sensitive information, doxxing or compromised credentials for specific executives or exposed individuals in a company and offers specific recommendations for action. These protective measures provide insights into the risks of identity fraud on the surface web, deep web and dark web for exposed individuals and/or executives defined by the customer.

Third-Party Monitoring monitors and provides notifications about expired SSL certificates, open ports, detected vulnerabilities and infected hosts within specific third-party brands, partners or suppliers.

Mobile app detection of fraudulent, counterfeit or malicious mobile applications that impersonate your brand or company/organisation in mobile app stores.

Exposed Payment Card Protection can identify risks associated with compromised or stolen credit card numbers or bank identification numbers (BIN).

Corporate Social Account Content Remediation is an early warning system for the detection of account takeovers. It also detects potentially inappropriate content, fraud and phishing connected with customer users on social media and digital platforms.

On-Demand Investigations are supported by an experienced team of threat intelligence experts, whose role is to address increasing and ever more complex threats to physical and digital assets. The threat intelligence team can provide customised threat analysis for customer risk identification and assessment, specific threat intelligence reports for threat assessment and strategic decision making, or red teaming services for real-world security assessment and vulnerability detection.

With Managed Takedown, automated deletion requests for the removal of externally hosted, illegal content related to the customer’s brand and domain can be made directly from the platform. Analysts work with the external hosts to remove illegal content from their systems. If a managed takedown is triggered, the service also includes transparent reporting and status updates.

External Attack Surface Management is an agentless, cloud-native solution that identifies exposed customer assets on the Internet by simulating a threat actor’s methods and generates recommendations using a combination of advanced identification techniques and contextual vulnerability intelligence to enable the rapid mitigation of potential threats across the attack surface. This specialised process, which records Internet-exposed assets such as subdomains, IP addresses, software and security certificates, helps you see your digital footprint the way attackers do. The audit creates an asset library that is continuously compared against a risk database, including CVSS, CVE and expired certificates.

Next Generation Digital Risk Protection as part of our TDR portfolio

Next Generation Digital Risk Protection is a preventive module that complements our Threat Detection and Response service offerings. Detected threats can then be further processed by the analysis and incident response services.

Why Swisscom?

Individual

Thanks to its modular design, you can select only the functions you need for your individual situation.

Proven

Rely on an award-winning solution and many years of expertise.

Flexible

Integrate risk protection with other managed security services.

Find out more

More articles

Our experts will be happy to answer your questions. Contact us.