ALL-IN-ONE SOLUTION BRIEF
Threat Intelligence.
Contextualized.
SOCRadar Cyber Intelligence Inc.
ThreatFusion
Cyber Threat Intelligence
Make better-informed decisions
KEY FEATURES through contextualized intelligence.
Global dark web coverage Monitoring a wide variety of internet sources and layers
Blackmarkets, darknet and TOR network pose difficult challenges, but ThreatFusion’s autonomous
technology accurately crawls, analyzes, and interprets data
Precise API integration from many sources to identify leaked credentials and other
For ticketing, SIEM and SOAR solutions confidential data.
A timely, enriched IOCs ThreatFusion's historical precision and growing robust
database help analysts cut through the noise, narrowing
Rapid, relevant and enriched IOCs and
IOAs down relevant security items and prioritizing SOC analyst
time and energy on the most critical security incidents.
In-depth threat analysis
The cloud-based platform provides API-ready realtime
Uplevel your threat intelligence information on a broad range of cyber threats giving
capabilities
customers the power to get prepared for tactical and
strategic responses proactively.
Realtime trends intelligence
Better-understand existing and emerging global cyber threats.
30K+ critical vulnerability alerts generated annually. 3M+ phishing attacks classified.
Vulnerability Intelligence Global Phishing Radar
Better prioritize patches. Get proactive on the phishing threat landscape.
To prevent adversaries disrupt your business, see which Understanding and monitoring how the phishing threat
vulnerabilities are being leveraged by threat actors. Get landscape looks like is key to achieve a solid security
actionable insights and context on potentially vulnerable program. ThreatFusion proactively monitors phishing threat
technologies to speed up the assessment and verification landscape and brings you the latest in global phishing
processes. statistics and attacks from the wild.
Threat Actors Monitoring CyberSec News Monitoring
Stay one step ahead of APT groups. Digital footprint centric cyber security news.
Through automated data collection, classification and AI- To prevent you from losing focus, ThreatFusion CyberSec
powered analysis of hundreds of sources across deep/dark News module features the latest cyber security news you'd
web, SOCRadar's ThreatFusion keeps you alerted on APT not want to miss. Auto-aggregated from credible RSS,
groups’ activities, helping you define use cases to detect Twitter and Telegram channels to bring you the most
and prevent malicious activities. relevant news.
1
KEY BENEFITS
Near-zero false positives
Get actionable intelligence filtered
through advanced technology
STIX/TAXII support
Collect and send STIX-formatted threat
intelligence
Shed light on APT actors
Get essential insights into the latest
activities of APT groups
Immediate start
Start in hours with minimal input
CTIA support
Ready to work with clients, helping them Superior 3rd party integration
build in-house skills
Smooth integration with SIEM, SOAR and ticketing platforms for
faster incident response and investigation.
IP, Keyword, Hash, Domain…
Threat investigation module:
ThreatHose
SOCRadar’s ThreatFusion provides a big-data powered threat investigation module
ThreatHose to enable threat intelligence teams search for deeper context and
realtime threat analysis. The module is fed by massive number of data sources across
surface, deep and dark web.
SOCRadar made a significant contribution to our security maturity and posture with its
advanced cyber intelligence capabilities.
CISO, Retail Industry
2
How ThreatFusion works?
Malware Honeypot HUMINT APT
archives sensors sources groups
Vulnerability Industry-specific Cybersecurity
databases CERTs media
Domains, IPs...
ThreatHose Investigation
Big Data Analysts
Artificial Intelligence
FEEDS REALTIME TRENDS
IPs / URLs Vulnerability Intelligence
Phishing domains Threat Actors Monitor
DDoS Attackers Phishing Radar
Hashes CyberSec News
OUTPUT
THREATS REPORTS
APT groups' activities
IOAs IOCs Malspam campaigns
Indicators of Indicators of Massive DDoS attacks
Attack Compromise
Global ransomware outbreaks
CURRENT FUTURE
Significant hacking incidents
3
RiskPrime
Digital Risk Protection
Protect your customers, employees
KEY CAPABILITIES and hard-earned brand reputation.
Detect sensitive data belonging to 360° monitoring of surface, deep and dark web
employees, customers, or 3 parties
rd
Every day, threat actors launch thousands of attacks
Compromised credentials targeting businesses, employees and their customers
Personal data (PII) resulting in brand reputation and financial loss.
Proprietary code
SOCRadar’s RiskPrime builds on industry-leading instant
Credit card information
phishing domain detection, internet-wide scanning, and
Data breaches
Intellectual Property compromised credential detection technologies by
Confidential documents aggregating and correlating massive data points into
DLP identifiers intelligence-driven alerts. This enables organizations to
swiftly understand how particular risks have evolved and
Identify upcoming threats & attacks what to do for mitigation.
Crimeware-as-a-service
Autonomous Process
Typosquatted/phishing domains
Malicious mobile applications Continuous Accurate Realtime
Impersonating social accounts monitoring detection alerting
Rogue SSL/TLS certificates
Unrivaled, curated data sources
As the threat landscape grows, SOCRadar Labs is constantly qualifying new data sources and channels.
SOCRadar’s RiskPrime draws on a growing collection of data from these sources then through advanced
analytics algorithms and a team of talented analysts, alerts organizations to know if their sensitive data,
documents, financial information or customers’ PII have been compromised.
SOURCES
Social media / Chat Dark web Content / File sharing News Technical
Twitter, Linkedin, YouTube TOR/I2P network Paste sites Blogs Google Dorks
Facebook, Instagram Cyber criminal forums Amazon s3 buckets Security news Web hack archives
IRC, Chatters Breaches, dumps Code repositories Hacktivism news VirusTotal
ICQ, Discord, Telegram Blackmarkets Torrent Mainstream news Hybrid analysis
Hacker channels Autoshops Trello Geopolitical news Bug bounty sites
4
KEY FEATURES
Improve your overall security
posture.
Get proactive with actionable threat
intelligence.
Identify and remediate faster.
Reduce risk of…
! IP theft
! Brand reputation loss
! Data breaches
! GDPR/CCPA penalties
! Business Email Compromise attacks
! CEO Fraud
! Credential stuffing attacks
All-in-one digital risk protection platform
4M+ domains analyzed per week. 5.5B+ breach dataset records processed.
Detect newly-registered phishing domains Secure your C-level executives
AI-enabled SOCRadar Digital Risk Protection platform SOCRadar enables you to search & monitor critically
analyzes millions of domains every day across most major important email addresses, PII, SSNs or credit card details of
domain registrars to detect malicious or look-alike domains C-suite executives whether it’s indexed somewhere in the
targeting your brand and entire business network. growing database of major worldwide breaches that may be
sought by your adversaries.
Get proactive to block credential stuffing and Autonomous dark web intelligence
credit
Empowercard
yourfraud
existing login security mechanisms to prevent RiskPrime provides thorough dark/deep web monitoring
hackers from stealing your customer’s trust. Enhance your solution that enables organizations to identify and mitigate
credit card fraud prevention mechanisms with SOCRadar threats rapidly. Using unparalleled, autonomous
Digital Risk Protection platform’s AI-powered intelligence at reconnaissance and crawling technology, we help you
scale. proactively secure your organization.
Use playbook to handle prioritized alerts Integrated remediation & takedown service
SOCRadar's historical precision, accurate playbook and SOCRadar provides on-demand takedown services for
growing robust database help analysts cut through the phishing, malware, social media, mobile apps, and brand
noise, narrowing down relevant security items and abuse sites. Completing the protection offering, with one-
prioritizing SOC analyst time and energy on the most critical click you can initiate takedown process without any
security incidents. additional legal and procedural burden to security teams.
By monitoring thousands of surface/dark web sources, SOCRadar helped us to be more
informed and resilient against cyber attacks.
CISO, Finance Sector
5
AttackMapper
Attack Surface Management
Sharpen your view outside your
KEY BENEFITS perimeter.
Detect hacker-exposed Take control of your ever-evolving attack surface.
vulnerabilities early Threat actors use thousands of entry points to launch ever-
Identify shadow digital assets sophisticated attacks. Using an advanced, AI-enabled asset
Monitor essential IT infrastructure identification and classification algorithm, SOCRadar’s
Identify major cryptographic threats AttackMapper enables enterprise security teams to
automatically detect and view all external-facing digital
Eliminate the blind spots like:
assets with infrastructure including IP addresses, DNS
! Open ports configurations, network software, domains, and cloud
! Unpatched software
applications. It enables organizations to detect and
! DNS misconfiguration issues
eliminate unknown threats and vulnerabilities by providing
! Invalid, expired certificates
! Publicly-found employee data extensive, continuous visibility in an automated manner.
! Unauthorized social profiles
! Vulnerable JavaScript frameworks Gain visibility into hackers’ perspective.
! Outdated CMS applications
! Shadow cloud services Prevent RDP exposure and ransomware attacks.
! Forgotten domains
The successful cyberattacks are due to open ports and cyber
! Forgotten subdomains
assets visible to cybercriminals and threat actors. Threat actors
! Blacklisted IP addresses
frequently target internet-exposed RDP servers millions of
which are protected by no more than username and password.
From an external monitoring perspective, SOCRadar enables you to gain continuous visibility into critical or dangerous
open ports which can be abused for exploiting vulnerable services or malicious traffic via worms or malware.
Adapt to the age of machine-speed vulnerability exploitation.
The possibility of discovering an unknown asset or vulnerability that could be exploited by adversaries keeps the
security teams up at night. Verizon’s 2020 data breach investigations report states that vulnerability exploitation is
the second most common type of hacking in breaches. AttackMapper continuously monitors your perimeter from an
external perspective to spot critical internet-facing vulnerabilities to be exploited.
Highly-precise scanning engine alerts you when a critical vulnerability is cross-referenced to your digital assets like:
Web application firewalls SSL/TLS certificates Software
VPN appliances Web applications CMS applications
Network services JavaScript libraries Operating system
6
KEY FEATURES
Power of automation
Skyrocket team efficiency by automating
time-consuming manual tasks
On-time alerting
Get alerted by email or through API for
faster remediation
Intuitive web portal
Find what you’re looking for with precise
asset categorization and interactive
maps
Real-time inventory
Maintain real-time asset inventory
through continuous, automated
discovery
Monitor digital-footprint-centric risks.
SOCRadar helps solving today’s toughest attack surface
3 party visibility
rd
Scalable underlying technology to discovery challenges through monitoring every digital asset for
maximize the ecosystem visibility rapidly any change.
Accurate asset inventory From the actionable threat intelligence perspective, get alerted
Easily find the digital assets you're on any suspicious incident or baseline change to respond faster.
looking for
Attack surface alert types:
Website uptime SSL/TLS Certificate Grading Malware / CryptoMining Risk
Domain Expiry/WHOIS Perimeter Appliance (FW/WAF/IPS) Dynamic Forms / Skimming Code
DNS Records IP Reputation / Torrent traffic BGP Hijacking Risk
Domain TakeOver SMTP MX Blacklist IP Routing / MiTM / Hijack
Subdomain TakeOver Website Defacement DDoS Amplification Target
Domain Shadowing Website Title-Content Change PortMap Malicious Port/Service
By monitoring and reporting on all public-facing assets of us at large scale, SOCRadar
generates actionable insights for our SOC team.
CISO, Finance Sector
7
The SOCRadar Advantage
Consolidated architecture for operational efficiency and unmatched ROI.
SOCRadar combines attack surface management, digital risk protection, and threat intelligence capabilities
to protect your entire business against sophisticated multi-vector cyber attacks.
CLOUD
ThreatFusion DELIVERED RiskPrime
Cyber Threat Intelligence Digital Risk Protection
Threat actor / API-ready Sensitive data Phishing domain
APT tracking threat feeds AI BIG DATA leak detection detection
POWERED DRIVEN
Multilingual Threat hunting Compromised VIP protection
CTI support & investigation account
detection
AttackMapper
Attack Surface Management
Continuous Digital footprint
scanning discovery
& mapping
Start your free trial now!
Sign up for a test drive to try out SOCRadar free for 14 days.
4.9 OUT OF 5 STARS
IN 7 REVIEWS
AS OF 06/2020
8609 Westwood Center Dr. SOCRadar delivers intelligent digital risk protection platform against sophisticated
Vienna, VA 22182 USA cyber attacks for organizations of any size. Its portfolio of digital assets and perimeter
monitoring platforms hardened with targeted threat intelligence – all automated and
+1 (571) 249-4598 supported by a global team of qualified intelligence analysts – provides unparalleled
visibility, management, and protection of digital risks. Prioritized, up-to-date, and
[email protected]
relevant cyber threat insights empower customers to take action starting from the
www.socradar.io reconnaissance stage of the cyberattack life cycle.
8