Analysts provide incident reports containing cyber threat and data exposure incident details, including exposed files, source identification, geolocation, severity and recommended actions.
Patented technology and cyber forensic methodologies combine to detect sensitive file exposure incidents relating to consumer, corporate and government clients. Exposed files are collected along with metadata indicating the source from which files were exposed.
Data and threat analysis is performed by a team of trained cyber forensic analysts who provide insight into cyber threat and data exposure incidents.
Detect and identify data exposure sources including IP address geolocation and metadata pertaining to cyber threat or data exposure incidents.
Discovers file spread or proliferation by identifying distinct instances of exposed file(s) emanating from various sources across Deep Web, Dark Web and file-sharing networks. A file spread analysis is also used to construct a cyber exposure incident timeline.
Incidents are assigned a severity based on the exposed information, the source of the incident and its potential adverse effects. Exposure incident categories include internal employees, third parties, suppliers, vendors, partners, customers, cyber criminals, etc.
Our automated feed is built on common TAXII and STIX schemas making it easy to consume our threat intelligence data.
Many organizations view data breach incidents as a matter of when, not if. Proactive identification of cyber threat incidents helps security teams mitigate potential vulnerabilities and the harm caused by these incidents. Quite simply, we think it’s one that you’ll learn to count on.
“I have found Tiversa's technology to work well via my own independent testing and believe it to be a piece of the overall solution to combat insider threat."
Jim Henderson, CEO Insider Threat Defense