SmartNet_Logo Xanh 1
<linearGradient id="sl-pl-cycle-svg-grad01" linear-gradient(90deg, #ff8c59, #ffb37f 24%, #a3bf5f 49%, #7ca63a 75%, #527f32)
0%
Loading ...

UpGuard – Third-party risk & Attack Surface Management – EN

All-in-one third-party risk và attack surface management software UpGuard giúp doanh nghiệp quản lý rủi ro an ninh mạng. Nền tảng rủi ro tích hợp của UpGuard kết hợp xếp hạng bảo mật của bên thứ ba, bảng câu hỏi đánh giá bảo mật và khả năng thông minh về mối đe dọa để cung cấp cho doanh nghiệp cái nhìn đầy đủ và toàn diện về bề mặt rủi ro của họ. UpGuard cung cấp phần mềm quản lý rủi ro an ninh mạng (được cung cấp dưới dạng SaaS) giúp các tổ chức trên toàn cầu ngăn chặn vi phạm dữ liệu bằng cách liên tục giám sát các nhà cung cấp bên thứ ba và tình hình bảo mật của họ. UpGuard là dịch vụ duy nhất cung cấp khả năng phát hiện rò rỉ dữ liệu đẳng cấp thế giới trong toàn bộ chuỗi cung ứng của tổ chức trong khi liên tục theo dõi hơn một triệu công ty để xác định các nguy cơ bảo mật bằng cách sử dụng xếp hạng bảo mật độc quyền một cách chủ động. Chuyên môn của họ đã được đăng trên The New York Times, The Wall Street Journal, Bloomberg, The Washington Post, Forbes, Reuters và TechCrunch cùng những tờ báo khác. Quy trình đánh giá rủi ro mạnh mẽ của UpGuard cho phép các tổ chức tự động hóa bảng câu hỏi bảo mật và các rủi ro được xác định từ các câu trả lời sẽ tự động được ánh xạ tới xếp hạng bảo mật của nhà cung cấp, cung cấp cái nhìn toàn diện về rủi ro do nhà cung cấp bên thứ ba gây ra. Khả năng khắc phục của nó giúp các tổ chức cộng tác nội bộ và với các nhà cung cấp bên thứ ba dễ dàng hơn để khắc phục các rủi ro bảo mật đã xác định. Truy cập Datasheet của UpGuard: UpGuard BreachSight UpGuard CyberResearch UpGuard Data Leak Detection UpGuard Vendor Risk Truy cập Executive Overview của UpGuard TẠI ĐÂY.  

Solution to protect Subscribers

Subscribers are looking to their service providers for premium protection. Core Security empowers ISPs and telecom providers to quickly and decisively detect infections, alerting their subscribers to risk before damage occurs. Core CSP passively monitors large scale, service provider networks, with over 12 years of history of passive DNS relying on threat intelligence to identify infections. All Core CSPs have sensors placed in key locations in your subscriber access network. These sensors, like those from Core Labs and Network Insight, are listening to passive DNS traffic, collecting valuable data about threats to reliably detect infections. This data is also used to build a comprehensive and definitive threat database that is secure for every Core CSP user. Search by threat name or characteristics and learn information such as threat summaries, observed characteristics, capabilities, severity, and Core Labs research findings.

Phishlabs – Threat Intelligence – EN

EXTENSIVE COLLECTION We analyze massive volumes of surface web, dark web, social, mobile, and email data to source intelligence. EXPERT CURATION Our experts vet and curate this intelligence, ensuring high-fidelity threat identification. EFFECTIVE MITIGATION We use this intelligence to mitigate attacks and prevent impact to brands, customers, and employees. Threat-specific Technology & Operations Different threats …

Fortra – Cybersecurity & Automation Solutions – EN

Fortra’s best-in-class portfolio is designed to be your go-to singular resource for a straightforward strategy that makes you stronger, more effective, and more adaptable. Our offerings give you the tools you need to meet the challenges of today’s threat landscape head on while streamlining and automating your IT infrastructure. Automation  |  IBM i Cybersecurity Solutions Data Security After your employees, your data is your company’s most valuable asset. Your customer, employee, and financial data, as well as your own intellectual property, are your crown jewels. You need to make sure each is well protected. To do that, you need complete visibility into where your data is (on premises or in the cloud) and how it’s being stored and shared at all times. Without the proper controls, you risk a costly data breach that will damage your company’s reputation and customer relationships. Just like your security journey, data has a journey too. Fortra has you covered throughout the lifecycle of data at rest, in use, and in motion. Infrastructure Protection Our Infrastructure Protection suite allows your organization to identify and prioritize the risks that truly pose the biggest threat to your infrastructure. IT infrastructure is not limited to the technology inside facilities, but includes anything that can connect to the internal network, like cloud resources or IoT devices. You need the right stack of solutions and services that provide both web-application and network security. By assembling an offensive security strategy with our proactive infrastructure protection solutions, you’ll gain actionable insight into where your security gaps exist and what steps you can take to eliminate them. The result is a more efficient and more effective cybersecurity program that can remove weaknesses before they are exploited. Fortra’s Infrastructure Protection and Data Security solutions includes: Identify and quantify the security vulnerabilities in your system, so you can make improvements that reduce risk.   Keep emails, brands, and data safe from sophisticated phising attacks, insider threats, and accidental data loss. Safeguard critical digital assets through expert-curated threat intelligence and complete mitigation. Proactively test your security with ethical hacking such as prevention testing and adversary simulation/red teaming. Safeguard valuable information from malicious and unintentional compromise or loss with proper access controls. Secure, automate, and streamline sensitive file transfers among internal and external users. More Powerful Solutions From Fortra Infrastructure Automation Monitoring Performance & Cost Optimization Business Intelligence Document Management Capacity Planning & Analysis Identity & Access Management Identity Governance & Administration Privileged Access Management Access Intelligence

Cencys – Threat Hunting & Exposure Management – EN

The Leading Internet Intelligence Platform for Threat Hunting and Exposure Management. Censys empowers security teams with the most comprehensive, accurate, and up-to-date map of the internet to defend attack surfaces and hunt for threats. What is Censys? Censys is a platform that helps information security practitioners discover, monitor, and analyze devices that are accessible from the Internet. We regularly probe every public IP address and popular domain names, curate and enrich the resulting data, and make it intelligible through an interactive search engine and API. Enterprises use Censys to understand their network attack surfaces. CERTs and security researchers use it to discover new threats and assess their global impact. Censys was founded by computer scientists at the University of Michigan, and data we collect has been used in hundreds of scientific papers by researchers around the world. The threat environment is rapidly evolving and bad actors are adjusting their tactics at alarming rates. As a result, today’s organizations need to be vigilant in order to protect themselves and their customers from harmful breaches. With Censys, organizations can get the most accurate data available, enabling teams to take down threats as close to real-time as possible. Censys Scanning and Data Collection One way that Censys finds publicly-reachable devices is by using Internet-wide scanning. We make a small number of harmless connection attempts to every IPv4 address worldwide each day. When we discover that a computer or device is configured to accept connections, we follow up by completing protocol handshakes to learn more about the running services. We never attempt to bypass any technical barriers, exploit security problems, or otherwise access non-public-facing services, and we follow community best practices to reduce any burden on remote networks. The only data we receive is information that is publicly visible to anyone who connects to a particular address and port. For technical information about the kinds of data Censys collects, visit our data definitions page. Censys scans the Internet from the subnets listed on this page, which you can allowlist or blocklist if you wish. We sometimes make follow-up connections from other machines at dynamic IP addresses, but blocking the addresses above is sufficient to prevent your device from appearing in our IPv4 dataset. Censys data is sometimes used by researchers and network administrators to detect security problems and alert the operators of vulnerable systems. If you block our scans, you might not receive these important security notifications. About Censys Censys Attack Surface Management Platform The ASM platform leverages Censys’ Internet-wide scan data with other tools to map the entirety of an organization’s digital presence, including traditional on-premise assets and ephemeral cloud-hosted services. In the web app and via API, customers can track changes to their network, investigate risks, and improve their security posture. ASM platform pricing is based on the size of an organization’s network. Censys Search 2.0 Censys Search is the most prestigious Internet-wide scan data on the market: with datasets representing the entire IPv4 address space, the largest IPv6 inventory, game-changing name-based scanning breakthroughs, and the largest certificate repository in existence. In addition to accessing data through the web search or via the API, higher-tier accounts have access to Censys data as a Google BigQuery dataset that customers can load and query, and raw JSON data files that customers can download. A download link for the latest version of these files is provided through the Censys Data API. Access Censys’s Datasheet HERE. Access Censys’s White Paper HERE.