CySecurity (WDD)
-
▪ Negative News Monitoring
▪ Data Breach
▪ Darkweb Monitoring
Download Brochure
Negative News Monitoring
▪ Extensive web search to hunt for negative/malicious comments.
▪ Specialised Israeli search technology to hunt the web, searches internet/blogs/social media Use of AI
and machine readable format data, highly scalable to include large number of keywords for filtration by
analyst.
▪ Early detection can provide organisation time to respond legally or allow HR/top management to defuse
the issue.
▪ Use case: Payment for insurance policy through payment gateway, but data not captured by insurance
company. Customer Care asks customer to check with payment gateway, upset customer instead puts out story
on Facebook/Mouthshut.com, threatening to go to consumer court.
▪ Websearch discovers this and to defuse situation, senior management takes up matter with payment
gateway, helps issue policy to customer with apology.
▪ Results can be given weekly for further action by Client.
Data Breach
▪ Module searches over 5000 darkweb market places, for leaked credit cards/debit cards info, passwords,
email ids, vulnerabilities.
▪ Client imports email ids on excel sheet into module’s data breach panel. Data breach
modules searches around a billion records of data breach database. Finds email ids of client
that may have been compromised.
▪ As a preventive mechanism, employee/s are advised by module to change their official, personal
and social media passwords.
▪ Use case: Credit card/debit card dump, vulnerabilities & 0days, email ids and passwords found on darkweb
of almost every BFSI and many other organizations.
▪ Results are intimated weekly via email, also accessible from the AVA panel.
Darkweb Monitoring (specific TLP red)
▪ Search of multiple darkweb site/forums for compromised sensitive data
information - searches over 5000 darkweb market places.
▪ Continuous monitoring of the dark web by CSPF’s Red Team to hunt for data breach exposes.
▪ Darkweb monitoring also monitors GitHub, Cloud-Nas, Pastebin links and other dark web repositories
for TLP red or amber information pertaining to Client.
▪ Searches for leaked credit cards/debit cards info, passwords, email ids, vulnerabilities
Third party risk assessment from darkweb.
▪ Continuous monitoring of all URL/IP (external).
▪ Results are intimated weekly via email, also accessible from the AVA panel.