TI, TDS Flashcards
(17 cards)
Does Threat Intelligence page have a product tour?
Yes
Which products have a free leaflet download?
TI, TDS, SB/SP
Which products have a video?
TI, SB/SP, BP
What are the current three modules of BP
Anti-Piracy, Anti-Counterfeit, and Anti-Fraud
What is Anti-Piracy?
Copyright infringement, distribution of pirated content
What is Anti-Counterfeit?
Illegal online sales and distribution of counterfeit goods
What is Anti-Fraud?
Brand abuse and internet fraud
What percentage of BP violations are eliminated before ever getting to trial
85%
How many BP violations are eliminated daily?
20,000
How any BP resources are monitored every day?
Over 3 million
What is BP?
A technological service designed to detect and eliminate threats to your brand on the Internet.
We prevent financial and reputational damage caused to businesses by brand abuse, Internet fraud, online piracy, counterfeiting.
What are the three steps are BP?
Monitoring, threat detection, elimination of violation
Name the four success stories tied with BP
EuroChem
Evelina Khromchenko
tutu.ru
Channel 1
What results does BP promise?
Restores traffic to official channels by blocking fraudulent resources, which intercept up to 50% of the audience.
Minimize losses by blocking sources of pirated content, reducing the amount of online counterfeiting and damage from brand abuse.
Prevent future losses by detecting fraudulent activities during the domain registration phase.
What are the “ingredients” to the BP solution?
Advanced tech: a) machine learning b) big data c) intelligence driven
Team of professionals: a) CERT-GIB b) experts in IS investigations and digital forensics
Reputation: both among violators (who don’t want to mess with a company that has prosecuted violators and cooperates with law enforcement) and among hosting platforms (we use our reputation among hosting providers and domain registrars and cooperate with Internet management organizations).
What are the 9 benefits from TI?
Track threat actors targeting or planning to target your company
Actionable security briefs on potential threats
Dedicated analysts passionate about solving complex cases
Acquire Strategic Intel & Forecasts
Monitor the Deep and Dark Web
Detect leaked data before it ends up for sale on the black market
Enrich your existing security stack
Detect, investigate and remove phishing
Monitor and counteract brand abuse
What is coolest feature of TI and what are its main tasks?
Graph Network Analysis
fast cybercrime investigations
global threat hunting
proactive phishing hunting