CySecurity (WDD)

          ▪ Negative News Monitoring
          ▪ Data Breach
          ▪ Darkweb Monitoring
            
    Download Brochure

Negative News Monitoring

▪ Extensive web search to hunt for negative/malicious comments.
▪ Specialised Israeli search technology to hunt the web, searches internet/blogs/social media Use of AI and machine readable format data, highly scalable to include large number of keywords for filtration by analyst.
▪ Early detection can provide organisation time to respond legally or allow HR/top management to defuse the issue.
▪ Use case: Payment for insurance policy through payment gateway, but data not captured by insurance company. Customer Care asks customer to check with payment gateway, upset customer instead puts out story on Facebook/Mouthshut.com, threatening to go to consumer court.
▪ Websearch discovers this and to defuse situation, senior management takes up matter with payment gateway, helps issue policy to customer with apology.
▪ Results can be given weekly for further action by Client.


Data Breach

▪ Module searches over 5000 darkweb market places, for leaked credit cards/debit cards info, passwords, email ids, vulnerabilities.
▪ Client imports email ids on excel sheet into module’s data breach panel. Data breach modules searches around a billion records of data breach database. Finds email ids of client that may have been compromised.
▪ As a preventive mechanism, employee/s are advised by module to change their official, personal and social media passwords.
▪ Use case: Credit card/debit card dump, vulnerabilities & 0days, email ids and passwords found on darkweb of almost every BFSI and many other organizations.
▪ Results are intimated weekly via email, also accessible from the AVA panel.


Darkweb Monitoring (specific TLP red)

▪ Search of multiple darkweb site/forums for compromised sensitive data information - searches over 5000 darkweb market places.
▪ Continuous monitoring of the dark web by CSPF’s Red Team to hunt for data breach exposes.
▪ Darkweb monitoring also monitors GitHub, Cloud-Nas, Pastebin links and other dark web repositories for TLP red or amber information pertaining to Client.
▪ Searches for leaked credit cards/debit cards info, passwords, email ids, vulnerabilities Third party risk assessment from darkweb.
▪ Continuous monitoring of all URL/IP (external).
▪ Results are intimated weekly via email, also accessible from the AVA panel.