Threat Intelligence Services by Intelidata - Onefede
Onefede > Products > Threat Intelligence Services by Intelidata

Threat Intelligence Services by Intelidata

Sold by: Intelidata Technologies Category:
(13 customer reviews)

Intelidata provides advanced threat intelligence with 360 degree coverage. The coverage includes:

  1. Brand monitoring
  2. Social media monitoring
  3. Attack surface monitoring
  4. Cyber threat and vulnerability intelligence
  5. Cyber crime and dark web monitoring
  6. Supplier risk monitoring

Report Abuse

Description

Intelidata provides advanced threat intelligence with 360 degree coverage.

Brand Monitoring –  Detection Coverage 

1. Phishing Websites 2. Smishing/Vishing  3. Fake/Typo-squatted Domains  4. Fake Mobile Apps Counterfeit Mobile Apps on official or thirdparty app stores  5. Malware/Phishing Campaigns 6. Website Content Misappropriation 7. Website Defacement

Social Media Monitoring –  Detection Coverage 

1. Suspicious/Malicious posts 2. Social Media Account Impersonation 3. Fake Social Media Profiles 4. Executive Profile Impersonation

Attack Surface Monitoring –  Detection Coverage 

1. Critical Vulnerabilities or Server Misconfigurations 2. Sensitive Open Ports 3. Expired SSL Certificates 4. Application Security weaknesses 5. Shadow IT Exposure (Unknown or Orphaned Assets) 6. Misconfigured Cloud Storage Buckets (AWS, Azure) 7. Data/Source Code Leaks 8. Exposed Secrets/API Keys/Access Tokens in public repositories 9. Sensitive PII or Confidential Business Data exposed in Public Unsecured Databases

Cyber Threat and Vulnerability Intelligence 

1. Indicators of Compromise (IOC Feed) 2. Research Advisories and Reports on  • Threat actors • Threat Campaigns • Zero-day malware and actively exploited vulnerabilities • APT and Ransomware Groups and their Tools, Techniques and  Procedures 3. Searchable repository of IOCs for improved visibility and context  during threat hunting and incident investigations 4. Integration with security tools (SIEM, TIP, SOAR) 5. Botnet communication involving your IP ranges

Cyber Crime and Dark Web Intelligence 

1. Compromised credit and debit cards sold on carding shops and  dark web forums 2. Compromised access credentials for consumer and enterprise  applications sold on  • Cybercrime forums • Marketplaces • Messenger Channels (Telegram/Discord) 3. Negative chatter involving your brand on Tor, .onion, IRC, P2P and  Telegram/Discord Channels 4. References to your company on Dark Net blogs, forums, chat  rooms and Data Leak/Ransomware leak sites 5. Data Leaks on dark web forums and marketplaces

Supplier Risk Monitoring 

1.Exposure of Supplier Credentials on the  Dark Web 2. Discussions / Negative chatter involving your supplier on Tor,  .onion, IRC, P2P and Telegram/Discord Channels 3. References to your supplier on Dark Net blogs, forums, chat  rooms and Data Leak/Ransomware leak sites 4. Business Data and Personally Identifiable Information (PII) Leaks  involving your supplier that exposes its own or your  organizational data or that of your customers 5. Critical Vulnerabilities and Sensitive ports exposed on Public  facing infrastructure of your supplier

Customer Reviews

Customer Ratings

3.1
Stars 5
(0)
Stars 4
(5)
Stars 3
(4)
Stars 2
(4)
Stars 1
(0)
Add a review

Your email address will not be published. Required fields are marked *

13 reviews for Threat Intelligence Services by Intelidata

  1. By Xxwuox on March 9, 2024

    order lipitor 80mg for sale order atorvastatin 20mg lipitor 10mg oral

  2. By Jymhzv on March 14, 2024

    purchase ciprofloxacin sale – amoxiclav for sale online augmentin price

  3. By Cpnplf on March 14, 2024

    oral ciprofloxacin 1000mg – amoxiclav for sale augmentin pills

  4. By Wxkzzf on March 17, 2024

    ciprofloxacin 500 mg ca – purchase doxycycline for sale erythromycin tablet

  5. By Xkdstc on March 17, 2024

    buy metronidazole medication – buy generic flagyl over the counter zithromax 500mg drug

  6. By Aaxorf on March 19, 2024

    stromectol coronavirus – buy ceftin 500mg pill generic tetracycline 500mg

  7. By Dngikl on March 19, 2024

    valacyclovir 1000mg cost – buy generic starlix 120mg order acyclovir generic

  8. By Wyasdr on March 21, 2024

    purchase ampicillin acillin oral amoxicillin for sale online

  9. By Meckgw on March 21, 2024

    order generic flagyl 400mg – amoxil buy online zithromax 250mg oral

  10. By Fnlyox on March 23, 2024

    buy lasix 100mg pills – prazosin 1mg canada buy generic capoten over the counter

  11. By Jdjesr on March 25, 2024

    glycomet 1000mg tablet – order duricef generic lincocin order online

  12. By Wgpxjf on March 26, 2024

    buy zidovudine 300 mg pills – buy allopurinol without a prescription

  13. By Kziqxe on March 27, 2024

    clozaril over the counter – where to buy pepcid without a prescription purchase pepcid online

Vendor Information

Description

Technical Experience

We are a qualified & highly technical team of Experienced Cyber Security Researchers, with cumulative experience of 25+ years. We partner with small to mid-sized companies to secure their businesses with easy step-by-step proven processes & Cert-in guidelines.

24/7 Services

We offer round-the-clock technical assistance.   We never turn the cell phone off. It’s on 24/7 and it gets answered whenever you call, to give you timely deliveries. By outsourcing your IT security to us, you can focus on what you do best–running your business.

Flexible Pricing

No unexpected bills. No budget blow-outs. No missed deadlines. No broken promises. No shoddy service.  No surprises. We believe in adding value to your business and provide meaningful service at a very cost efficient and budget -friendly pricing.

Training Assistance

We provide detailed steps & Cyber Security training to your Web Administrators and Developers for patching. No matter the budget, we pride ourselves on providing comprehensive professional assistance to them to secure your business.

  • Virtual CISO as a Service by Intelidata

    A V-CISO is your security point-of-contact for all security related issues, offering a direct line to experts as questions naturally arise. A virtual CISO will also respond to incidents, answer security-related questionnaires for your customers, and respond to data breach should that arise. In addition to ongoing and ad hoc support, a v CISO will tie into meetings when security expertise and guidance are needed. With our Cyber Security Consulting, we offer a no-compromise solution that eliminates new hire commitments while delivering the executive-level counsel needed to succeed. We’ll work alongside your management to best align security policies and practices with business objectives to advance your operational goals.

    Virtual CISO as a Service by Intelidata

    A V-CISO is your security point-of-contact for all security related issues, offering a direct line to experts as questions naturally arise. A virtual CISO will also respond to incidents, answer security-related questionnaires for your customers, and respond to data breach should that arise. In addition to ongoing and ad hoc support, a v CISO will tie into meetings when security expertise and guidance are needed. With our Cyber Security Consulting, we offer a no-compromise solution that eliminates new hire commitments while delivering the executive-level counsel needed to succeed. We’ll work alongside your management to best align security policies and practices with business objectives to advance your operational goals.
  • Vulnerability Assessment as a Service by Intelidata

    Vulnerability Assessment Tool: Continuous vulnerability scan across clouds and workloads. Context-based prioritization based on exposure and impact. It can cover: Web App Security:   Detect, patch security gaps in static websites, complex web apps and APIs Mobile App Security: Automated advanced security assessment of mobile applications - Android, iOS, Windows
    13 reviews

    Vulnerability Assessment as a Service by Intelidata

    Vulnerability Assessment Tool: Continuous vulnerability scan across clouds and workloads. Context-based prioritization based on exposure and impact. It can cover: Web App Security:   Detect, patch security gaps in static websites, complex web apps and APIs Mobile App Security: Automated advanced security assessment of mobile applications - Android, iOS, Windows
  • Red Team Assessment by Intelidata

    Secure your applications against real-world vulnerabilities and run your business with confidence. Maximize security readiness by identifying real world vulnerabilities through rigorous intelligence driven security tests and replicating threat landscapes related to your business. Our Red Team exercises collate and analyze intelligent options which can be used by persistent attackers. We also test your existing security framework for any vulnerabilities to real time attacks.
    14 reviews

    Red Team Assessment by Intelidata

    Secure your applications against real-world vulnerabilities and run your business with confidence. Maximize security readiness by identifying real world vulnerabilities through rigorous intelligence driven security tests and replicating threat landscapes related to your business. Our Red Team exercises collate and analyze intelligent options which can be used by persistent attackers. We also test your existing security framework for any vulnerabilities to real time attacks.
  • Static Analysis Security Testing by Intelidata

    Static Analysis Security Testing (SAST) services by Intelidata to support developers in writing secure code and ensure application security. Secure Code Review is performed in accordance with Open Web Application Security Project (OWASP) industry best practice guidelines. At minimum, security assessment must include OWASP Top 10 security risk. Techniques to secure code review:
    1. Automated tool based/ Black Box: In this approach, the secure code review is done using different open source/commercial tools.
    2. Manual/ White Box: The automatic tool scanner flags the whole code with vulnerabilities based on its perception. Thus a manual / white box testing is required.
    13 reviews

    Static Analysis Security Testing by Intelidata

    Static Analysis Security Testing (SAST) services by Intelidata to support developers in writing secure code and ensure application security. Secure Code Review is performed in accordance with Open Web Application Security Project (OWASP) industry best practice guidelines. At minimum, security assessment must include OWASP Top 10 security risk. Techniques to secure code review:
    1. Automated tool based/ Black Box: In this approach, the secure code review is done using different open source/commercial tools.
    2. Manual/ White Box: The automatic tool scanner flags the whole code with vulnerabilities based on its perception. Thus a manual / white box testing is required.
  • IT Policy and Certification Services by Intelidata

    Review & Implementation of IS/IT Policies and IS/IT controls for their adequacy and effectiveness vis-à-vis frameworks/standards of ISO 27001:2022, IT Act 2008 & Cert-in guidelines.
    1. IT Security, Data Protection & Information Security Compliance's Control Implementation
    2. Data Protection Control Architecture Layout as per new emerging Cyber Risks & Threats
    3. Recommendation for BCP & DR policies
    4. ISMS and Information Security Awareness Trainings for IT Staff
    14 reviews

    IT Policy and Certification Services by Intelidata

    Review & Implementation of IS/IT Policies and IS/IT controls for their adequacy and effectiveness vis-à-vis frameworks/standards of ISO 27001:2022, IT Act 2008 & Cert-in guidelines.
    1. IT Security, Data Protection & Information Security Compliance's Control Implementation
    2. Data Protection Control Architecture Layout as per new emerging Cyber Risks & Threats
    3. Recommendation for BCP & DR policies
    4. ISMS and Information Security Awareness Trainings for IT Staff
  • SOC as a Service by Intelidata

    Intelidata Managed Services powered with SOC tools believes in taking a holistic approach to cyber security by gathering deep insights from endpoints, servers, network devices, applications, IOT and security systems and applying user identity, threat intelligence and vulnerability assessment to establish threat profile, generate threat indicators, raise essential alerts and offer remediation path – automated or triaged. In essence, the solution ensures multi-layered threat detection and response, relying on EDR, Network Behavior, Advanced Correlation (SIEM), Network Traffic Analysis, UEBA (ML based) and SOAR for an All-In-One experience that is organically and seamlessly fused together.  It empowers SOC analysts to become more efficient and helps organizations to reduce MTTI and MTTR together providing continuous compliance for the business.
    13 reviews

    SOC as a Service by Intelidata

    Category: SOC Services |
    Intelidata Managed Services powered with SOC tools believes in taking a holistic approach to cyber security by gathering deep insights from endpoints, servers, network devices, applications, IOT and security systems and applying user identity, threat intelligence and vulnerability assessment to establish threat profile, generate threat indicators, raise essential alerts and offer remediation path – automated or triaged. In essence, the solution ensures multi-layered threat detection and response, relying on EDR, Network Behavior, Advanced Correlation (SIEM), Network Traffic Analysis, UEBA (ML based) and SOAR for an All-In-One experience that is organically and seamlessly fused together.  It empowers SOC analysts to become more efficient and helps organizations to reduce MTTI and MTTR together providing continuous compliance for the business.

Product Inquiry

Item added To cart