Overview
Cyberint is a cloud-based SaaS solution that continuously and proactively reduces cyber risk. By combining threat intelligence, deep and dark web monitoring, external attack surface management, digital risk protection, and supply chain intelligence into a single holistic solution, the Argos platform provides protection against a broad scope of external cyber risks while maintaining a low total cost of ownership and ensuring substantial value.
Key Benefits: Continuously monitor, detect, prioritize, and mitigate a wide array of external cyber risks. Gain visibility on exposures in your attack surface as well as relevant threats on the deep and dark web. Protect your organization, brands, domains, and executives against malicious impersonation attacks. Support your team with managed services from Cyberints nation-state level cybersecurity experts. Maximize security spend with a low-touch platform engineered for efficiency and simplicity of use. Consume alerts in the platform or within your existing security stack via integrations and REST APIs.
Highlights
- Cyberint Attack Surface Monitoring provides a real-time view of an organizations external digital footprint, detecting vulnerabilities and exposed assets across websites, networks, and cloud environments. It continuously identifies risky misconfigurations and unknown assets that could be exploited by attackers. With integrated threat intelligence and actionable insights, it empowers security teams to prioritize and remediate risks effectively, reducing overall exposure to cyber threats.
- Cyberint Targeted Threat Intelligence delivers actionable insights focused on threats specific to an organizations industry, assets, and digital footprint. By monitoring surface, deep, and dark web sources, it identifies potential attacks, compromised data, and indicators of targeting by known threat actors. This intelligence enables organizations to stay ahead of emerging threats, prioritize responses, and better protect critical assets.
- Cyberint Digital Risk Protection safeguards organizations by identifying and mitigating risks across their digital footprint, including social media, online marketplaces, and the dark web. It detects threats such as brand impersonation, data leakage, and fraudulent activities, enabling quick action to prevent reputational and financial harm.
Details
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
---|---|---|
Complete_1K | External Risk Management Complete package- A managed service package that include multiple modules: High cadence Attack Surface Discovery and Exposure scanning, Targeted & Global Threat Intelligence, Darkweb monitoring, Brand and Impersonation protection, Phishing detection with Takedown services as well as dedicated CTI Expert for on-going Intelligence triaging | $136,320.00 |
Vendor refund policy
No Refunds.
Custom pricing options
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
With the Managed Service of Cyberint, you can expect: Monthly/quarterly meetings, ongoing support, and ad-hoc meetings as needed Threat Intelligence monitoring and reporting Assisted online assets discovery, and scanning for vulnerabilities Threat Intelligence Incident response SLA In case of a suspected cyber incident, a managed service customer can initiate an incident response activity utilizing the available coins. According to the acquired SLA (24 hours / 4 hours), upon the opening of an incident ticket, Cyberint will assign an experienced analyst(s) to support with relevant threat hunting activities concerning the incident. This can include: Providing content on the threat actor and main TTPs in previous attacks. Hunting for information which has being leaked following an incident and assessing the availability of the exposed information to other parties. Anonymized and covert interaction with the threat actor in order to collect additional information, asses the risk and the targeting level. Recommend actions required by the organization for optimal response.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.