CYFIRMA Solutions for the Public Sector
-
DeCYFIR 3.0
By leveraging DeCYFIR insights and alerts organization can quickly pinpoint and identify shortfalls within their cyber security controls and processes. These indicators will be the building blocks to formulate a strategic plan to uplift controls and be used for continuous visibility and improvements to the controls.
- Attack Surface Discovery
- Discover external-facing assets, processes, and technology weaknesses that can be exploited by hackers.
- Vulnerability Intelligence
- Threat-led vulnerability enrichment based on evolving external cyber environment. Prioritization of identified vulnerabilities based on cybercriminals’ interest, attribution, and association to provide end-to-end threat visibility.
- Brand Intelligence
- Monitor brand, product, solutions & service, executive infringement; and connect them with ongoing cybercrime campaigns.
- Digital Risk Discovery
- Dark web, deep web, surface web, and social media monitoring for data and identity leaks, confidential files, source code, sensitive information exposure, impersonation of domain, and much more.
- Situational Awareness
- Understand cyber trends & threats specific to an organization’s industry, technology ecosystem & geopolitical influences.
- Cyber- Intelligence
- Predictive, personalized, contextual, outside-in and multi-layered cyber intelligence that address the who, why, what, when & how of a cyberattack. Actionable and prioritized remediations.
- Third-Party Risk
- Discover weaknesses of suppliers’ digital assets. Be alerted to data leaks and exposures that could impact you.
-
DeTCT
Monitors your attack surface so you would never be blindsided.
- Domain/IP Vulnerability
- Certificate Weaknesses
- Configuration: DNS/SMTP/HTTP
- IP/Domain Reputation
- Open Ports
- Cloud Weakness
- Data Breach Monitoring
Brings to your attention data which has been stolen and available for sale in underground marketplaces. This includes data which has been exfiltrated by ransomware groups.
- Emails/Identities/Credentials
- Leaks
- Dark Web
- Phishing
- Ransomware
- Public & Social Media Exposures
Know if IP and confidential data has been exposed, including lookalike or malicious apps. Receive alerts on social sentiments that could present a threat to you or your business.
- Source Code
- Confidential Files
- PII/CII Dumps
- Malicious Mobile Apps
- Social Threat
- Impersonation & Infringement
Scour deep/dark/surface web and social media to look to signs of impersonation and infringement.
- Domain/IP Assets
- Executive/People
- Product/Solution
- Social Handlers
- 3rd Party Cyber Risk Monitoring
Secures your digital ecosystem and gives you visibility to third-party cyber risk.
- Discover weaknesses of your suppliers' digital assets
- Be alerted to their data leaks and exposures which could impact you
- Receive recommended remedial actions to help strengthen your suppliers' cyber posture
- Keeps your company and people safe from cyberattacks
- Recommended Remedial Actions
Triage risks quickly and decisively with clear and prioritized actions.
- With hackability and risk scores, you can activate the right resources at the right time to close security gaps.
- Takedown services for lookalike domains, social media profiles, fake apps, and more, are provided.