Intel 471 Attack Surface Protection
About the product
Intel 471 Attack Surface Protection is an advanced attack surface management (ASM) tool that provides organizations with complete visibility into their external threat landscape and enables them to proactively respond, neutralize threats, and minimize risk. The product is based on world-class cyber threat intelligence (CTI) from Intel 471, which enables the identification of vulnerabilities and misconfigurations that could pose a significant threat to external network resources.
A key distinguishing feature of the Intel 471 solution is its integration with uniquely sourced cyber intelligence based on the work of analysts, which not only enables comprehensive mapping of digital assets and vulnerability detection, but also the identification of early signs of cybercriminal activity in covert communication channels and criminal environments. As a result, the organization receives not only information about its own weaknesses, but also about who and how they might try to exploit them.
The solution consists of three main components:
• Attack Surface Discovery: Scanning and inventorying all digital assets of the organization and its external partners to gain full visibility, including shadow IT, unmanaged applications, domains similar to company domains (typosquatting), and cryptocurrency wallet addresses
• Attack Surface Management: Continuous monitoring, regular scanning and alerting on changes in the attack surface, integration via API, comparison of results and reporting of security indicators (KPI)
• Attack Surface Intelligence: Extension of monitoring to include analysis of the broadly understood Dark Web, use of intelligence on malware, adversaries, data leaks, and compromises, including access to closed forums and messengers where cybercriminals plan attacks.
Intel 471 stands out from the competition thanks to its own unique intelligence sources and a team of analysts who manually select and interpret data. As a result, organizations receive not only information about technical vulnerabilities, but also about real threats and the motivations of attackers.