RiskView offers a comprehensive cyber threat intelligence and reputation management solution called ThreatView. ThreatView collects and analysis dark-web information including more than half a billion social posts; more than 20 million mobile applications; and millions of underground cyber communities discussions, security breaches, spams, vulnerabilities, and images to build a predictive intelligent prioritization engine. ThreatView helps organizations detect, analyze, and mitigate cyber threats and reputation attacks, while threats are still being developed. ThreatView leverages advanced Big Data technology, such as Hadoop, Machine Learning, Social Media, and advanced Crawling algorithms, to allow for early cyber threat detection.
Moreover, ThreatView continuously monitors millions of URLs, mobile applications, social media posts, zero day vulnerabilities, underground hacking communities, and third party vendors and their historical breaches. ThreatView also uses automation to analyze this massive amount of information. After it detects a relevant threat to one of your assets, the tools will immediately notify you. ThreatView’s security consultants analyze all relevant threats. Once a threat is confirmed after an investigation, security consultants take action to mitigate the threat in order to reduce its effectiveness. The tool also uses heuristic and machine learning algorithm to constantly evolve and get better at detecting relevant threats.
For complete details on ThreatView’s features and functionalities, see ThreatView Introduction or visit www.threatview.ca.
RiskView offers a product as a service called AssetView. This tool was built for managing Threat Risk Assessments (TRA) and all its moving parts, while following the Harmonized Threat Risk Assessment Model.
AssetView simplifies the data input process for TRA, including files and evidence. It performs all risk calculations automatically based on a well defined model.
The tool can generate customized reports using your company branding, also, making it very simple to follow up on open issues and securely share reports with third parties using the built in file sharing functionality.
Lastly, user accounts can be secured with two factor authentication or authenticated against an external LDAP/Active Directory services.
Read more at www.assetview.ca
Cyber Resiliency Assessment
– Coming Soon from RiskView –