{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"comparison":{"compare":{"en":"Compare","ru":"Сравнить","_type":"localeString"},"characteristics":{"ru":"Характеристики","_type":"localeString","en":"Characteristics"},"additional_template":{"ru":"Дополнительные характеристики","_type":"localeString","en":"Additional characteristics"},"nothing_to_show":{"en":"No data to compare","ru":"Нет данных для отображения","_type":"localeString"}},"header":{"help":{"_type":"localeString","en":"Help","de":"Hilfe","ru":"Помощь"},"how":{"_type":"localeString","en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает"},"login":{"ru":"Вход","_type":"localeString","en":"Log in","de":"Einloggen"},"logout":{"en":"Sign out","ru":"Выйти","_type":"localeString"},"faq":{"_type":"localeString","en":"FAQ","de":"FAQ","ru":"FAQ"},"references":{"ru":"Мои запросы","_type":"localeString","en":"Requests","de":"References"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"en":"My account","ru":"Мой кабинет","_type":"localeString"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_our_it_catalogs":{"en":"Our IT Catalogs","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"en":"Our Products","_type":"localeString"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"_type":"localeString","en":"About us","de":"Über uns","ru":"О нас"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference"},"our_social":{"_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"_type":"localeString","en":"we pay for content","ru":"платим за контент"},"categories":{"en":"categories","ru":"категории","_type":"localeString"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"_type":"localeString","en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"comparison":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"comparison":{"title":{"en":"Compare products","ru":"Сравнить продукты","_type":"localeString"}}},"pageMetaDataStatus":{"comparison":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"132":{"id":132,"title":"DRP - Digital Risk Protection","characteristics":[{"id":2521,"title":"IP addresses","required":0,"type":"binary"},{"id":2523,"title":"URLs","required":0,"type":"binary"},{"id":2525,"title":"TTPs category threats","required":0,"type":"binary"},{"id":2527,"title":"Hashes","required":0,"type":"binary"},{"id":2529,"title":"Domains","required":0,"type":"binary"},{"id":2531,"title":"Registry keys","required":0,"type":"binary"},{"id":2533,"title":"Card BINs","required":0,"type":"binary"},{"id":2535,"title":"Code","required":0,"type":"binary"},{"id":2537,"title":"Email Addresses","required":0,"type":"binary"},{"id":2539,"title":"Phone Numbers","required":0,"type":"binary"},{"id":2541,"title":"Crypto Wallet Addresses","required":0,"type":"binary"},{"id":2543,"title":"Indicators from Social Media","required":0,"type":"binary"},{"id":2545,"title":"Vulnerability Intelligence (CVE’s)","required":0,"type":"binary"},{"id":2547,"title":"Actors","required":0,"type":"binary"},{"id":2549,"title":"VIP Protection","required":0,"type":"binary"},{"id":2551,"title":"Mobile app protection","required":0,"type":"binary"},{"id":2553,"title":"Brand protection","required":0,"type":"binary"},{"id":2555,"title":"Data Leakage","required":0,"type":"binary"},{"id":2557,"title":"Data enrichment (threat ratings, threat tagging, additional and other additional information)","required":0,"type":"binary"},{"id":2559,"title":"Feed Exchange Platform","required":0,"type":"binary"},{"id":2561,"title":"Ways of interaction","required":0,"type":"multiselect"},{"id":2563,"title":"The amount of data provided","required":0,"type":"select"},{"id":2565,"title":"Data format","required":0,"type":"multiselect"}]}},"comparisonByTemplateId":{},"products":[{"id":3509,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/DIGITAL_SHADOWS_logo.png","logo":true,"scheme":false,"title":"Digital Shadows SearchLight","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"digital-shadows-searchlight","companyTypes":[],"description":"<p>Digital Shadows SearchLight minimizes your digital risk by detecting data loss, securing your online brand, and reducing your attack surface. The service enables you to identify unwanted exposure, protect against external threats and thereby reduce digital risk.</p>\r\n<p>SearchLight enables you to minimize your digital risk by detecting data loss, securing your online brand, and reducing your attack surface:</p>\r\n<ul>\r\n<li>Data Loss Detection (Credentials, Sensitive Documents, Intellectual Property, Customer Data)</li>\r\n<li>Online Brand Security (Domain Infringement, Malicious Mobile Apps, Spoof Social Media Profiles, Counterfeits and Fraud)</li>\r\n<li>Attack Surface Reduction (Vulnerabilities, Certifcate Issues, Open Ports, Misconfigured Devices)</li>\r\n</ul>\r\n<p>SearchLight comprises four main stages:</p>\r\n<ul>\r\n<li>Configure: Identify Key Assets</li>\r\n<li>Collect: Monitor for Exposure</li>\r\n<li>Contextualize: Add Threat Intelligence</li>\r\n<li>Mitigate: Take Action and Protect</li>\r\n</ul>\r\n<p>This is an iterative process and organizations will continually loop back to further refine and add to their key assets. Crucially, at each stage, we act as an extension of your team to help configure SearchLight, collect from hard-to-reach sources, add analysis of threat intelligence, and provide recommended actions.</p>","shortDescription":"Digital Shadows SearchLight is a managed service that enables you to minimize your digital risk by detecting data loss, securing your online brand, and reducing your attack surface.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Digital Shadows SearchLight","keywords":"","description":"<p>Digital Shadows SearchLight minimizes your digital risk by detecting data loss, securing your online brand, and reducing your attack surface. The service enables you to identify unwanted exposure, protect against external threats and thereby reduce digital ","og:title":"Digital Shadows SearchLight","og:description":"<p>Digital Shadows SearchLight minimizes your digital risk by detecting data loss, securing your online brand, and reducing your attack surface. The service enables you to identify unwanted exposure, protect against external threats and thereby reduce digital ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/DIGITAL_SHADOWS_logo.png"},"eventUrl":"","translationId":3510,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":836,"title":"DRP - Digital Risk Protection","alias":"drp-digital-risk-protection","description":"Digital risks exist on social media and web channels, outside most organization's line of visibility. Organizations struggle to monitor these external, unregulated channels for risks targeting their business, their employees or their customers.\r\nCategories of risk include cyber (insider threat, phishing, malware, data loss), revenue (customer scams, piracy, counterfeit goods) brand (impersonations, slander) and physical (physical threats, natural disasters).\r\nDue to the explosive growth of digital risks, organizations need a flexible, automated approach that can monitor digital channels for organization-specific risks, trigger alerts and remediate malicious posts, profiles, content or apps.\r\nDigital risk protection (DRP) is the process of protecting social media and digital channels from security threats and business risks such as social engineering, external fraud, data loss, insider threat and reputation-based attacks. DRP reduces risks that emerge from digital transformation, protecting against the unwanted exposure of a company’s data, brand, and attack surface and providing actionable insight on threats from the open, deep, and dark web.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a digital risk?</span>\r\nDigital risks can take many forms. Most fundamentally, what makes a risk digital? Digital risk is any risk that plays out in one form or another online, outside of an organization’s IT infrastructure and beyond the security perimeter. This can be a cyber risk, like a phishing link or ransomware via LinkedIn, but can also include traditional risks with a digital component, such as credit card money flipping scams on Instagram.\r\n<span style=\"font-weight: bold;\">What are the features of Digital Risk Protection?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">The features are:</span></span>\r\n<ul><li>Protecting yourself from digital risk by building a watchtower, not a wall. A new Forrester report identifies two objectives for any digital risk protection effort: identifying risks and resolving them.</li><li>Digital risk comes in many forms, like unauthorized data disclosure, threat coordination from cybercriminals, risks inherent in the technology you use and in your third-party associates and even from your own employees.</li><li>The best solutions should automate the collection of data and draw from many sources; should have the capabilities to map, monitor, and mitigate digital risk and should be flexible enough to be applied in multiple use cases — factors that many threat intelligence solutions excel in.</li></ul>\r\n<span style=\"font-weight: bold;\">What elements constitute a digital risk?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Unauthorized Data Disclosure</span></span>\r\nThis includes the theft or leakage of any kind of sensitive data, like the personal financial information of a retail organization’s customers or the source code for a technology company’s proprietary products.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Threat Coordination Activity</span></span>\r\nMarketplaces and criminal forums on the dark web or even just on the open web are potent sources of risk. Here, a vulnerability identified by one group or individual who can’t act on it can reach the hands of someone who can. This includes the distribution of exploits in both targeted and untargeted campaigns.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Supply Chain Issues</span></span>\r\nBusiness partners, third-party suppliers, and other vendors who interact directly with your organization but are not necessarily following the same security practices can open the door to increased risk.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Employee Risk</span></span>\r\nEven the most secure and unbreakable lock can still easily be opened if you just have the right key. Through social engineering efforts, identity or access management and manipulation, or malicious insider attacks coming from disgruntled employees, even the most robust cybersecurity program can be quickly subverted.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Technology Risks</span></span>\r\nThis broad category includes all of the risks you must consider across the different technologies your organization might rely on to get your work done, keep it running smoothly, and tell people about it.\r\n<ul><li><span style=\"font-weight: bold;\">Physical Infrastructure:</span> Countless industrial processes are now partly or completely automated, relying on SCADA, DCS, or PLC systems to run smoothly — and opening them up to cyber- attacks (like the STUXNET attack that derailed an entire country’s nuclear program).</li><li><span style=\"font-weight: bold;\">IT Infrastructure:</span> Maybe the most commonsensical source of digital risk, this includes all of the potential vulnerabilities in your software and hardware. The proliferation of the internet of things devices poses a growing and sometimes underappreciated risk here.</li><li><span style=\"font-weight: bold;\">Public-Facing Presence:</span> All of the points where you interact with your customers and other public entities, whether through social media, email campaigns, or other marketing strategies, represent potential sources of risk.</li></ul>"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"132":{"2521":{"id":11081,"characteristicId":2521,"templateId":132,"value":true},"2523":{"id":11082,"characteristicId":2523,"templateId":132,"value":true},"2525":{"id":11083,"characteristicId":2525,"templateId":132,"value":true},"2527":{"id":11084,"characteristicId":2527,"templateId":132,"value":true},"2529":{"id":11085,"characteristicId":2529,"templateId":132,"value":true},"2531":{"id":11086,"characteristicId":2531,"templateId":132,"value":true},"2533":{"id":11087,"characteristicId":2533,"templateId":132,"value":true},"2535":{"id":11088,"characteristicId":2535,"templateId":132,"value":true},"2537":{"id":11089,"characteristicId":2537,"templateId":132,"value":true},"2539":{"id":11090,"characteristicId":2539,"templateId":132,"value":true},"2541":{"id":11091,"characteristicId":2541,"templateId":132,"value":true},"2543":{"id":11092,"characteristicId":2543,"templateId":132,"value":true},"2545":{"id":11093,"characteristicId":2545,"templateId":132,"value":true},"2547":{"id":11094,"characteristicId":2547,"templateId":132,"value":true},"2549":{"id":11095,"characteristicId":2549,"templateId":132,"value":true},"2551":{"id":11096,"characteristicId":2551,"templateId":132,"value":true},"2553":{"id":11097,"characteristicId":2553,"templateId":132,"value":true},"2555":{"id":11098,"characteristicId":2555,"templateId":132,"value":true},"2557":{"id":11099,"characteristicId":2557,"templateId":132,"value":true},"2559":{"id":11100,"characteristicId":2559,"templateId":132,"value":true},"2561":{"id":11101,"characteristicId":2561,"templateId":132,"value":"API"},"2563":{"id":11102,"characteristicId":2563,"templateId":132,"value":"14M+"},"2565":{"id":11103,"characteristicId":2565,"templateId":132,"value":"JSON, XML, STIX, CSV"}}}},{"id":1179,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Group-IB_Threat_Intelligence.png","logo":true,"scheme":false,"title":"Group-IB Threat Intelligence","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"group-ib-threat-intelligence","companyTypes":[],"description":"\r\n<ul>\r\n<li>Prompt attack and threat notifications for your company, clients and partners</li>\r\n<li>Direct access to compromised data and TTPs of malicious activity</li>\r\n<li>Detections, analysis and forecasts of hacking activity in the areas of your interest</li>\r\n<li>Convenient web interface for data search and analysis – no installation required</li>\r\n<li>STIX/TAXII ready, official OASIS Cyber Threat Intelligence (CTI) Technical Committee Member</li>\r\n<li>24x7 Personal cyber intelligence analyst support: tailored reports, malware analysis and much more</li>\r\n</ul>\r\n<p>We give you vital intelligence about upcoming threats and actual cyber security risks</p>\r\n<p>It takes a few minutes to infect a computer, while incident detection and remediation activities may last months. Even if you feel confident in your systems' safety, vulnerabilities of your clients, employees, or partners may become your problem – this potential threat has become a reality for financial institutions, payment systems and telecommunications operators. Security breach in a company of your industry may be a warning sign of future attacks on your business, while insiders will help criminals bypass your defensive barriers.</p>\r\n<p>Be prepared to any attack scenario with Intelligence cyber analytics: receive the most specific and detailed information for prompt response and the most recent data for threat prevention.</p>\r\n<p><span style=\"font-weight: bold;\">Strategic planning with cyber intelligence</span></p>\r\n<p>Keep up with the constantly changing threat landscape, learn about threats targeting your business area, evaluate and improve your IT security investment strategy</p>\r\n<ul>\r\n<li>Evaluate risks, analyze statistics and assess potential damages</li>\r\n<li>Prioritize threats based on expert forecasts</li>\r\n<li>Learn attack tactics and cybercrime strategy</li>\r\n<li>Know your enemy</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Taking control on upcoming cyber threats</span></p>\r\n<p>Prepare for cyber attacks with comprehensive information on malware threatening your company and clients, attack targets and methods, cyber espionage tools, news and notifications on potential threats from private hacker resources.</p>\r\n<p> </p>\r\n<ul>\r\n<li>Adapt your security tools and response plans</li>\r\n<li>Learn about data leaks and identify insiders</li>\r\n<li>Prevent confidential data from being sold to third parties</li>\r\n<li>Monitor hacking attacks and activity peaks correlating with your incidents</li>\r\n<li>Apply IoCs to you layered cyber security infrastructure</li>\r\n</ul>\r\n<p>Minimize the time you spend on incident response with instant notifications to critical threats, direct access to compromised data and a variety of technical indicators used to bolster your security.</p>\r\n<p> </p>\r\n<ul>\r\n<li>Protect your clients, employees, and partners against fraud and personal data theft</li>\r\n<li>Receive attack confirmation, learn about the attack source and mechanisms used</li>\r\n<li>Prevent leakage and industrial espionage</li>\r\n<li>Effectively stop targeted attacks</li>\r\n<li>Prevent illegal use of your brand</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Intelligence and data collection</span></p>\r\n<p>Group-IB specialists daily analyze thousands of compromised credentials, bank card numbers, messages and postings of “black hats” on deep web hacking forums, information on hundreds of attacks. We analyze the most recent malware, attack mechanisms and participate in incident investigations collecting the most recent and detailed information about cybercriminals, their strategies and tools.</p>\r\n<p>THREE PILLARS OF COMPETENCEWHAT’S SPECIAL</p>\r\n<p> </p>\r\n<ul>\r\n<li>More than 10 patented technologies, automation and special tactics, algorithms and machine learning are helping us to collect raw data on cyber threats.</li>\r\n<li>Best analysts are making intelligence out of threat data, enriching them with context, revealing kill chains and TTPs (tactics, technics and procedures) of cyber criminals.</li>\r\n<li>Building links between incidents, IoCs and cyber criminals activities all over the world with the help of CERTs, Europol, Interpol and other international cyber crime fighters.</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Analytics</span></p>\r\n<p>Group-IB leverages its 14 years of unique expertise in cybercrime investigations to discover hidden connections buried within disparate data. We closely cooperate with best experts in cyber security around the world, which helps us to solve the most complicated global cases. Information analysis enables us to understand motives of criminals and create hacker profiles to forecast their future activity.</p>\r\n<ul>\r\n<li>Deep knowledge of Russian-speaking and international cybercriminal markets</li>\r\n<li>Adjustable amount of hours of remote analysts</li>\r\n<li>Ability to request assistance from special team of Group-IB security experts responsible for handling high-profile investigations</li>\r\n</ul>\r\n","shortDescription":"Actionable Threat Intelligence from the World's Top Cybercrime Experts.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Group-IB Threat Intelligence","keywords":"your, cyber, data, with, attack, threats, security, about","description":"\r\n<ul>\r\n<li>Prompt attack and threat notifications for your company, clients and partners</li>\r\n<li>Direct access to compromised data and TTPs of malicious activity</li>\r\n<li>Detections, analysis and forecasts of hacking activity in the areas of your interest<","og:title":"Group-IB Threat Intelligence","og:description":"\r\n<ul>\r\n<li>Prompt attack and threat notifications for your company, clients and partners</li>\r\n<li>Direct access to compromised data and TTPs of malicious activity</li>\r\n<li>Detections, analysis and forecasts of hacking activity in the areas of your interest<","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Group-IB_Threat_Intelligence.png"},"eventUrl":"","translationId":1180,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":836,"title":"DRP - Digital Risk Protection","alias":"drp-digital-risk-protection","description":"Digital risks exist on social media and web channels, outside most organization's line of visibility. Organizations struggle to monitor these external, unregulated channels for risks targeting their business, their employees or their customers.\r\nCategories of risk include cyber (insider threat, phishing, malware, data loss), revenue (customer scams, piracy, counterfeit goods) brand (impersonations, slander) and physical (physical threats, natural disasters).\r\nDue to the explosive growth of digital risks, organizations need a flexible, automated approach that can monitor digital channels for organization-specific risks, trigger alerts and remediate malicious posts, profiles, content or apps.\r\nDigital risk protection (DRP) is the process of protecting social media and digital channels from security threats and business risks such as social engineering, external fraud, data loss, insider threat and reputation-based attacks. DRP reduces risks that emerge from digital transformation, protecting against the unwanted exposure of a company’s data, brand, and attack surface and providing actionable insight on threats from the open, deep, and dark web.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a digital risk?</span>\r\nDigital risks can take many forms. Most fundamentally, what makes a risk digital? Digital risk is any risk that plays out in one form or another online, outside of an organization’s IT infrastructure and beyond the security perimeter. This can be a cyber risk, like a phishing link or ransomware via LinkedIn, but can also include traditional risks with a digital component, such as credit card money flipping scams on Instagram.\r\n<span style=\"font-weight: bold;\">What are the features of Digital Risk Protection?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">The features are:</span></span>\r\n<ul><li>Protecting yourself from digital risk by building a watchtower, not a wall. A new Forrester report identifies two objectives for any digital risk protection effort: identifying risks and resolving them.</li><li>Digital risk comes in many forms, like unauthorized data disclosure, threat coordination from cybercriminals, risks inherent in the technology you use and in your third-party associates and even from your own employees.</li><li>The best solutions should automate the collection of data and draw from many sources; should have the capabilities to map, monitor, and mitigate digital risk and should be flexible enough to be applied in multiple use cases — factors that many threat intelligence solutions excel in.</li></ul>\r\n<span style=\"font-weight: bold;\">What elements constitute a digital risk?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Unauthorized Data Disclosure</span></span>\r\nThis includes the theft or leakage of any kind of sensitive data, like the personal financial information of a retail organization’s customers or the source code for a technology company’s proprietary products.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Threat Coordination Activity</span></span>\r\nMarketplaces and criminal forums on the dark web or even just on the open web are potent sources of risk. Here, a vulnerability identified by one group or individual who can’t act on it can reach the hands of someone who can. This includes the distribution of exploits in both targeted and untargeted campaigns.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Supply Chain Issues</span></span>\r\nBusiness partners, third-party suppliers, and other vendors who interact directly with your organization but are not necessarily following the same security practices can open the door to increased risk.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Employee Risk</span></span>\r\nEven the most secure and unbreakable lock can still easily be opened if you just have the right key. Through social engineering efforts, identity or access management and manipulation, or malicious insider attacks coming from disgruntled employees, even the most robust cybersecurity program can be quickly subverted.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Technology Risks</span></span>\r\nThis broad category includes all of the risks you must consider across the different technologies your organization might rely on to get your work done, keep it running smoothly, and tell people about it.\r\n<ul><li><span style=\"font-weight: bold;\">Physical Infrastructure:</span> Countless industrial processes are now partly or completely automated, relying on SCADA, DCS, or PLC systems to run smoothly — and opening them up to cyber- attacks (like the STUXNET attack that derailed an entire country’s nuclear program).</li><li><span style=\"font-weight: bold;\">IT Infrastructure:</span> Maybe the most commonsensical source of digital risk, this includes all of the potential vulnerabilities in your software and hardware. The proliferation of the internet of things devices poses a growing and sometimes underappreciated risk here.</li><li><span style=\"font-weight: bold;\">Public-Facing Presence:</span> All of the points where you interact with your customers and other public entities, whether through social media, email campaigns, or other marketing strategies, represent potential sources of risk.</li></ul>"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"132":{"2521":{"id":7777,"characteristicId":2521,"templateId":132,"value":true},"2523":{"id":7778,"characteristicId":2523,"templateId":132,"value":true},"2525":{"id":7779,"characteristicId":2525,"templateId":132,"value":true},"2527":{"id":7780,"characteristicId":2527,"templateId":132,"value":true},"2529":{"id":7781,"characteristicId":2529,"templateId":132,"value":true},"2531":{"id":7782,"characteristicId":2531,"templateId":132,"value":"N/A"},"2533":{"id":7783,"characteristicId":2533,"templateId":132,"value":"N/A"},"2535":{"id":7784,"characteristicId":2535,"templateId":132,"value":"N/A"},"2537":{"id":7785,"characteristicId":2537,"templateId":132,"value":"N/A"},"2539":{"id":7786,"characteristicId":2539,"templateId":132,"value":"N/A"},"2541":{"id":7787,"characteristicId":2541,"templateId":132,"value":"N/A"},"2543":{"id":7788,"characteristicId":2543,"templateId":132,"value":true},"2545":{"id":7789,"characteristicId":2545,"templateId":132,"value":"N/A"},"2547":{"id":7790,"characteristicId":2547,"templateId":132,"value":true},"2549":{"id":7791,"characteristicId":2549,"templateId":132,"value":"N/A"},"2551":{"id":7792,"characteristicId":2551,"templateId":132,"value":"N/A"},"2553":{"id":7793,"characteristicId":2553,"templateId":132,"value":true},"2555":{"id":7794,"characteristicId":2555,"templateId":132,"value":"N/A"},"2557":{"id":7795,"characteristicId":2557,"templateId":132,"value":true},"2559":{"id":7796,"characteristicId":2559,"templateId":132,"value":"N/A"},"2561":{"id":7797,"characteristicId":2561,"templateId":132,"value":"API"},"2563":{"id":7798,"characteristicId":2563,"templateId":132,"value":"N/A"},"2565":{"id":7799,"characteristicId":2565,"templateId":132,"value":"STIX"}}}},{"id":3517,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Intsights_logo.png","logo":true,"scheme":false,"title":"IntSights Threat Intelligence Platform (TIP)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"intsights-threat-intelligence-platform-tip","companyTypes":[],"description":"<p>There’s no shortage of new IOCs, malicious IPs, and CVEs. These indicators flood in from multiple sources and often overwhelm SOC and threat, intelligence teams. The IntSights Threat Intelligence Platform (TIP) helps organizations centralize and operationalize various sources of intelligence to ensure blocklists are up to date.</p>\r\n<p><span style=\"font-weight: bold;\">IOC Enrichment and Prioritization</span></p>\r\n<p>Bring context and clarity to your threat feeds to streamline operations. We correlate new IOCs with your unique digital assets to help you understand how you are impacted and coordinate an appropriate response.</p>\r\n<p><span style=\"font-weight: bold;\">Visualized Investigation</span></p>\r\n<p>Quickly see how new campaigns connect with known malicious assets. Use our interactive Investigation tool to gain additional context and conduct deep threat investigation.</p>\r\n<p><span style=\"font-weight: bold;\">Streamlined Blocking</span></p>\r\n<p>Defend against new targeted campaigns with integrated and automated threat blocking. Automatically push IOCs to your existing security devices for enriched, prioritized, and up-to-date blocklists.</p>\r\n<p><span style=\"font-weight: bold;\">Centralized Dashboard</span></p>\r\n<p>Organize and search all your IOCs within a single, easy-to-use dashboard. Our centralized TIP dashboard summarizes IOCs by severity and confidence level so you can easily understand which malicious IOCs pose the greatest risk to your organization.</p>","shortDescription":"Threat Intelligence Platform (TIP) - a centralized platform for IOC enrichment and deep investigation.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IntSights Threat Intelligence Platform (TIP)","keywords":"","description":"<p>There’s no shortage of new IOCs, malicious IPs, and CVEs. These indicators flood in from multiple sources and often overwhelm SOC and threat, intelligence teams. The IntSights Threat Intelligence Platform (TIP) helps organizations centralize and opera","og:title":"IntSights Threat Intelligence Platform (TIP)","og:description":"<p>There’s no shortage of new IOCs, malicious IPs, and CVEs. These indicators flood in from multiple sources and often overwhelm SOC and threat, intelligence teams. The IntSights Threat Intelligence Platform (TIP) helps organizations centralize and opera","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Intsights_logo.png"},"eventUrl":"","translationId":3518,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":836,"title":"DRP - Digital Risk Protection","alias":"drp-digital-risk-protection","description":"Digital risks exist on social media and web channels, outside most organization's line of visibility. Organizations struggle to monitor these external, unregulated channels for risks targeting their business, their employees or their customers.\r\nCategories of risk include cyber (insider threat, phishing, malware, data loss), revenue (customer scams, piracy, counterfeit goods) brand (impersonations, slander) and physical (physical threats, natural disasters).\r\nDue to the explosive growth of digital risks, organizations need a flexible, automated approach that can monitor digital channels for organization-specific risks, trigger alerts and remediate malicious posts, profiles, content or apps.\r\nDigital risk protection (DRP) is the process of protecting social media and digital channels from security threats and business risks such as social engineering, external fraud, data loss, insider threat and reputation-based attacks. DRP reduces risks that emerge from digital transformation, protecting against the unwanted exposure of a company’s data, brand, and attack surface and providing actionable insight on threats from the open, deep, and dark web.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a digital risk?</span>\r\nDigital risks can take many forms. Most fundamentally, what makes a risk digital? Digital risk is any risk that plays out in one form or another online, outside of an organization’s IT infrastructure and beyond the security perimeter. This can be a cyber risk, like a phishing link or ransomware via LinkedIn, but can also include traditional risks with a digital component, such as credit card money flipping scams on Instagram.\r\n<span style=\"font-weight: bold;\">What are the features of Digital Risk Protection?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">The features are:</span></span>\r\n<ul><li>Protecting yourself from digital risk by building a watchtower, not a wall. A new Forrester report identifies two objectives for any digital risk protection effort: identifying risks and resolving them.</li><li>Digital risk comes in many forms, like unauthorized data disclosure, threat coordination from cybercriminals, risks inherent in the technology you use and in your third-party associates and even from your own employees.</li><li>The best solutions should automate the collection of data and draw from many sources; should have the capabilities to map, monitor, and mitigate digital risk and should be flexible enough to be applied in multiple use cases — factors that many threat intelligence solutions excel in.</li></ul>\r\n<span style=\"font-weight: bold;\">What elements constitute a digital risk?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Unauthorized Data Disclosure</span></span>\r\nThis includes the theft or leakage of any kind of sensitive data, like the personal financial information of a retail organization’s customers or the source code for a technology company’s proprietary products.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Threat Coordination Activity</span></span>\r\nMarketplaces and criminal forums on the dark web or even just on the open web are potent sources of risk. Here, a vulnerability identified by one group or individual who can’t act on it can reach the hands of someone who can. This includes the distribution of exploits in both targeted and untargeted campaigns.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Supply Chain Issues</span></span>\r\nBusiness partners, third-party suppliers, and other vendors who interact directly with your organization but are not necessarily following the same security practices can open the door to increased risk.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Employee Risk</span></span>\r\nEven the most secure and unbreakable lock can still easily be opened if you just have the right key. Through social engineering efforts, identity or access management and manipulation, or malicious insider attacks coming from disgruntled employees, even the most robust cybersecurity program can be quickly subverted.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Technology Risks</span></span>\r\nThis broad category includes all of the risks you must consider across the different technologies your organization might rely on to get your work done, keep it running smoothly, and tell people about it.\r\n<ul><li><span style=\"font-weight: bold;\">Physical Infrastructure:</span> Countless industrial processes are now partly or completely automated, relying on SCADA, DCS, or PLC systems to run smoothly — and opening them up to cyber- attacks (like the STUXNET attack that derailed an entire country’s nuclear program).</li><li><span style=\"font-weight: bold;\">IT Infrastructure:</span> Maybe the most commonsensical source of digital risk, this includes all of the potential vulnerabilities in your software and hardware. The proliferation of the internet of things devices poses a growing and sometimes underappreciated risk here.</li><li><span style=\"font-weight: bold;\">Public-Facing Presence:</span> All of the points where you interact with your customers and other public entities, whether through social media, email campaigns, or other marketing strategies, represent potential sources of risk.</li></ul>"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"132":{"2521":{"id":11150,"characteristicId":2521,"templateId":132,"value":true},"2523":{"id":11151,"characteristicId":2523,"templateId":132,"value":true},"2525":{"id":11152,"characteristicId":2525,"templateId":132,"value":true},"2527":{"id":11153,"characteristicId":2527,"templateId":132,"value":"N/A"},"2529":{"id":11154,"characteristicId":2529,"templateId":132,"value":true},"2531":{"id":11155,"characteristicId":2531,"templateId":132,"value":"N/A"},"2533":{"id":11156,"characteristicId":2533,"templateId":132,"value":true},"2535":{"id":11157,"characteristicId":2535,"templateId":132,"value":true},"2537":{"id":11158,"characteristicId":2537,"templateId":132,"value":true},"2539":{"id":11159,"characteristicId":2539,"templateId":132,"value":true},"2541":{"id":11160,"characteristicId":2541,"templateId":132,"value":true},"2543":{"id":11161,"characteristicId":2543,"templateId":132,"value":true},"2545":{"id":11162,"characteristicId":2545,"templateId":132,"value":"N/A"},"2547":{"id":11163,"characteristicId":2547,"templateId":132,"value":"N/A"},"2549":{"id":11164,"characteristicId":2549,"templateId":132,"value":true},"2551":{"id":11165,"characteristicId":2551,"templateId":132,"value":"N/A"},"2553":{"id":11166,"characteristicId":2553,"templateId":132,"value":true},"2555":{"id":11167,"characteristicId":2555,"templateId":132,"value":"N/A"},"2557":{"id":11168,"characteristicId":2557,"templateId":132,"value":true},"2559":{"id":11169,"characteristicId":2559,"templateId":132,"value":true},"2561":{"id":11170,"characteristicId":2561,"templateId":132,"value":"API"},"2563":{"id":11171,"characteristicId":2563,"templateId":132,"value":"N/A"},"2565":{"id":11172,"characteristicId":2565,"templateId":132,"value":"N/A"}}}},{"id":3513,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/recorded_future_logo.png","logo":true,"scheme":false,"title":"Recorded Future","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"recorded-future","companyTypes":[],"description":"Recorded Future’s unique technology collects and analyzes vast amounts of data to deliver relevant cyber threat insights in real time. Our solution aggregates this rich intelligence with any other threat data sources, empowering security teams to collaborate on analysis and delivering intelligence wherever you need it most, including rapid integration with your existing security solutions.\r\nOur machine learning, natural language processing, and pattern recognition technology indexes and understands more than 350 facts per second, equivalent to 8,774 full-time human analysts.\r\n<span style=\"font-weight: bold;\">Collection</span>\r\nAutomated collection of threat data from a huge range of technical, open web, and dark web sources, combined with our expert research and any other threat data.\r\n<span style=\"font-weight: bold;\">Analysis</span>\r\nData in every language is analyzed and organized into insightful intelligence using machine learning, augmented with analysis from our team of experts.\r\n<span style=\"font-weight: bold;\">Delivery</span>\r\nIntelligence is available via our intuitive web application, integrated into any cybersecurity solution, or in deep-dive analyst reports.","shortDescription":"Recorded Future’s unique technology collects and analyzes vast amounts of data to deliver relevant cyber threat insights in real time.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Recorded Future","keywords":"","description":"Recorded Future’s unique technology collects and analyzes vast amounts of data to deliver relevant cyber threat insights in real time. Our solution aggregates this rich intelligence with any other threat data sources, empowering security teams to collaborate o","og:title":"Recorded Future","og:description":"Recorded Future’s unique technology collects and analyzes vast amounts of data to deliver relevant cyber threat insights in real time. Our solution aggregates this rich intelligence with any other threat data sources, empowering security teams to collaborate o","og:image":"https://old.roi4cio.com/fileadmin/user_upload/recorded_future_logo.png"},"eventUrl":"","translationId":3514,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":836,"title":"DRP - Digital Risk Protection","alias":"drp-digital-risk-protection","description":"Digital risks exist on social media and web channels, outside most organization's line of visibility. Organizations struggle to monitor these external, unregulated channels for risks targeting their business, their employees or their customers.\r\nCategories of risk include cyber (insider threat, phishing, malware, data loss), revenue (customer scams, piracy, counterfeit goods) brand (impersonations, slander) and physical (physical threats, natural disasters).\r\nDue to the explosive growth of digital risks, organizations need a flexible, automated approach that can monitor digital channels for organization-specific risks, trigger alerts and remediate malicious posts, profiles, content or apps.\r\nDigital risk protection (DRP) is the process of protecting social media and digital channels from security threats and business risks such as social engineering, external fraud, data loss, insider threat and reputation-based attacks. DRP reduces risks that emerge from digital transformation, protecting against the unwanted exposure of a company’s data, brand, and attack surface and providing actionable insight on threats from the open, deep, and dark web.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a digital risk?</span>\r\nDigital risks can take many forms. Most fundamentally, what makes a risk digital? Digital risk is any risk that plays out in one form or another online, outside of an organization’s IT infrastructure and beyond the security perimeter. This can be a cyber risk, like a phishing link or ransomware via LinkedIn, but can also include traditional risks with a digital component, such as credit card money flipping scams on Instagram.\r\n<span style=\"font-weight: bold;\">What are the features of Digital Risk Protection?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">The features are:</span></span>\r\n<ul><li>Protecting yourself from digital risk by building a watchtower, not a wall. A new Forrester report identifies two objectives for any digital risk protection effort: identifying risks and resolving them.</li><li>Digital risk comes in many forms, like unauthorized data disclosure, threat coordination from cybercriminals, risks inherent in the technology you use and in your third-party associates and even from your own employees.</li><li>The best solutions should automate the collection of data and draw from many sources; should have the capabilities to map, monitor, and mitigate digital risk and should be flexible enough to be applied in multiple use cases — factors that many threat intelligence solutions excel in.</li></ul>\r\n<span style=\"font-weight: bold;\">What elements constitute a digital risk?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Unauthorized Data Disclosure</span></span>\r\nThis includes the theft or leakage of any kind of sensitive data, like the personal financial information of a retail organization’s customers or the source code for a technology company’s proprietary products.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Threat Coordination Activity</span></span>\r\nMarketplaces and criminal forums on the dark web or even just on the open web are potent sources of risk. Here, a vulnerability identified by one group or individual who can’t act on it can reach the hands of someone who can. This includes the distribution of exploits in both targeted and untargeted campaigns.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Supply Chain Issues</span></span>\r\nBusiness partners, third-party suppliers, and other vendors who interact directly with your organization but are not necessarily following the same security practices can open the door to increased risk.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Employee Risk</span></span>\r\nEven the most secure and unbreakable lock can still easily be opened if you just have the right key. Through social engineering efforts, identity or access management and manipulation, or malicious insider attacks coming from disgruntled employees, even the most robust cybersecurity program can be quickly subverted.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Technology Risks</span></span>\r\nThis broad category includes all of the risks you must consider across the different technologies your organization might rely on to get your work done, keep it running smoothly, and tell people about it.\r\n<ul><li><span style=\"font-weight: bold;\">Physical Infrastructure:</span> Countless industrial processes are now partly or completely automated, relying on SCADA, DCS, or PLC systems to run smoothly — and opening them up to cyber- attacks (like the STUXNET attack that derailed an entire country’s nuclear program).</li><li><span style=\"font-weight: bold;\">IT Infrastructure:</span> Maybe the most commonsensical source of digital risk, this includes all of the potential vulnerabilities in your software and hardware. The proliferation of the internet of things devices poses a growing and sometimes underappreciated risk here.</li><li><span style=\"font-weight: bold;\">Public-Facing Presence:</span> All of the points where you interact with your customers and other public entities, whether through social media, email campaigns, or other marketing strategies, represent potential sources of risk.</li></ul>"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"132":{"2521":{"id":11104,"characteristicId":2521,"templateId":132,"value":true},"2523":{"id":11105,"characteristicId":2523,"templateId":132,"value":true},"2525":{"id":11106,"characteristicId":2525,"templateId":132,"value":true},"2527":{"id":11107,"characteristicId":2527,"templateId":132,"value":true},"2529":{"id":11108,"characteristicId":2529,"templateId":132,"value":true},"2531":{"id":11109,"characteristicId":2531,"templateId":132,"value":"N/A"},"2533":{"id":11110,"characteristicId":2533,"templateId":132,"value":"N/A"},"2535":{"id":11111,"characteristicId":2535,"templateId":132,"value":"N/A"},"2537":{"id":11112,"characteristicId":2537,"templateId":132,"value":"N/A"},"2539":{"id":11113,"characteristicId":2539,"templateId":132,"value":"N/A"},"2541":{"id":11114,"characteristicId":2541,"templateId":132,"value":"N/A"},"2543":{"id":11115,"characteristicId":2543,"templateId":132,"value":"N/A"},"2545":{"id":11116,"characteristicId":2545,"templateId":132,"value":true},"2547":{"id":11117,"characteristicId":2547,"templateId":132,"value":true},"2549":{"id":11118,"characteristicId":2549,"templateId":132,"value":"N/A"},"2551":{"id":11119,"characteristicId":2551,"templateId":132,"value":"N/A"},"2553":{"id":11120,"characteristicId":2553,"templateId":132,"value":true},"2555":{"id":11121,"characteristicId":2555,"templateId":132,"value":"N/A"},"2557":{"id":11122,"characteristicId":2557,"templateId":132,"value":true},"2559":{"id":11123,"characteristicId":2559,"templateId":132,"value":true},"2561":{"id":11124,"characteristicId":2561,"templateId":132,"value":"API, https, TAXII"},"2563":{"id":11125,"characteristicId":2563,"templateId":132,"value":"N/A"},"2565":{"id":11126,"characteristicId":2565,"templateId":132,"value":"JSON, STIX, TAXII"}}}},{"id":3515,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/riskiq_logo.jpg","logo":true,"scheme":false,"title":"RiskIQ Illuminate","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"riskiq-illuminate","companyTypes":[],"description":"<p>The RiskIQ Illuminate platform is built upon the widest breadth of data in the industry to provide the insight and automation needed to map and monitor your organization’s internet-exposed digital attack surface, understand and mitigate exposures, and expedite external threat investigation.</p>\r\n<p>By discovering exactly what belongs to your organization and layering on 10+ years worth of historical internet data, RiskIQ customers have visibility into attacks ranging from the deep and dark web to the surface web and even the physical world, and the analytics necessary to receive the most relevant, real-time alerts that inform quick and decisive action.</p>\r\n<p>RiskIQ provides the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence. Our platform approach enables security organizations to match and scale digital attack surface management capabilities to their needs, and augment their security teams with the most advanced internet-scale security data available.</p>","shortDescription":"The platform combines advanced internet data reconnaissance, analytics to expedite investigations, understand digital attack surfaces, assess risk, take action to protect business, brand, customers.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"RiskIQ Illuminate","keywords":"","description":"<p>The RiskIQ Illuminate platform is built upon the widest breadth of data in the industry to provide the insight and automation needed to map and monitor your organization’s internet-exposed digital attack surface, understand and mitigate exposures, and","og:title":"RiskIQ Illuminate","og:description":"<p>The RiskIQ Illuminate platform is built upon the widest breadth of data in the industry to provide the insight and automation needed to map and monitor your organization’s internet-exposed digital attack surface, understand and mitigate exposures, and","og:image":"https://old.roi4cio.com/fileadmin/user_upload/riskiq_logo.jpg"},"eventUrl":"","translationId":3516,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":836,"title":"DRP - Digital Risk Protection","alias":"drp-digital-risk-protection","description":"Digital risks exist on social media and web channels, outside most organization's line of visibility. Organizations struggle to monitor these external, unregulated channels for risks targeting their business, their employees or their customers.\r\nCategories of risk include cyber (insider threat, phishing, malware, data loss), revenue (customer scams, piracy, counterfeit goods) brand (impersonations, slander) and physical (physical threats, natural disasters).\r\nDue to the explosive growth of digital risks, organizations need a flexible, automated approach that can monitor digital channels for organization-specific risks, trigger alerts and remediate malicious posts, profiles, content or apps.\r\nDigital risk protection (DRP) is the process of protecting social media and digital channels from security threats and business risks such as social engineering, external fraud, data loss, insider threat and reputation-based attacks. DRP reduces risks that emerge from digital transformation, protecting against the unwanted exposure of a company’s data, brand, and attack surface and providing actionable insight on threats from the open, deep, and dark web.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a digital risk?</span>\r\nDigital risks can take many forms. Most fundamentally, what makes a risk digital? Digital risk is any risk that plays out in one form or another online, outside of an organization’s IT infrastructure and beyond the security perimeter. This can be a cyber risk, like a phishing link or ransomware via LinkedIn, but can also include traditional risks with a digital component, such as credit card money flipping scams on Instagram.\r\n<span style=\"font-weight: bold;\">What are the features of Digital Risk Protection?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">The features are:</span></span>\r\n<ul><li>Protecting yourself from digital risk by building a watchtower, not a wall. A new Forrester report identifies two objectives for any digital risk protection effort: identifying risks and resolving them.</li><li>Digital risk comes in many forms, like unauthorized data disclosure, threat coordination from cybercriminals, risks inherent in the technology you use and in your third-party associates and even from your own employees.</li><li>The best solutions should automate the collection of data and draw from many sources; should have the capabilities to map, monitor, and mitigate digital risk and should be flexible enough to be applied in multiple use cases — factors that many threat intelligence solutions excel in.</li></ul>\r\n<span style=\"font-weight: bold;\">What elements constitute a digital risk?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Unauthorized Data Disclosure</span></span>\r\nThis includes the theft or leakage of any kind of sensitive data, like the personal financial information of a retail organization’s customers or the source code for a technology company’s proprietary products.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Threat Coordination Activity</span></span>\r\nMarketplaces and criminal forums on the dark web or even just on the open web are potent sources of risk. Here, a vulnerability identified by one group or individual who can’t act on it can reach the hands of someone who can. This includes the distribution of exploits in both targeted and untargeted campaigns.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Supply Chain Issues</span></span>\r\nBusiness partners, third-party suppliers, and other vendors who interact directly with your organization but are not necessarily following the same security practices can open the door to increased risk.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Employee Risk</span></span>\r\nEven the most secure and unbreakable lock can still easily be opened if you just have the right key. Through social engineering efforts, identity or access management and manipulation, or malicious insider attacks coming from disgruntled employees, even the most robust cybersecurity program can be quickly subverted.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Technology Risks</span></span>\r\nThis broad category includes all of the risks you must consider across the different technologies your organization might rely on to get your work done, keep it running smoothly, and tell people about it.\r\n<ul><li><span style=\"font-weight: bold;\">Physical Infrastructure:</span> Countless industrial processes are now partly or completely automated, relying on SCADA, DCS, or PLC systems to run smoothly — and opening them up to cyber- attacks (like the STUXNET attack that derailed an entire country’s nuclear program).</li><li><span style=\"font-weight: bold;\">IT Infrastructure:</span> Maybe the most commonsensical source of digital risk, this includes all of the potential vulnerabilities in your software and hardware. The proliferation of the internet of things devices poses a growing and sometimes underappreciated risk here.</li><li><span style=\"font-weight: bold;\">Public-Facing Presence:</span> All of the points where you interact with your customers and other public entities, whether through social media, email campaigns, or other marketing strategies, represent potential sources of risk.</li></ul>"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"132":{"2521":{"id":11173,"characteristicId":2521,"templateId":132,"value":true},"2523":{"id":11174,"characteristicId":2523,"templateId":132,"value":true},"2525":{"id":11175,"characteristicId":2525,"templateId":132,"value":"N/A"},"2527":{"id":11176,"characteristicId":2527,"templateId":132,"value":true},"2529":{"id":11177,"characteristicId":2529,"templateId":132,"value":true},"2531":{"id":11178,"characteristicId":2531,"templateId":132,"value":"N/A"},"2533":{"id":11179,"characteristicId":2533,"templateId":132,"value":true},"2535":{"id":11180,"characteristicId":2535,"templateId":132,"value":true},"2537":{"id":11181,"characteristicId":2537,"templateId":132,"value":true},"2539":{"id":11182,"characteristicId":2539,"templateId":132,"value":"N/A"},"2541":{"id":11183,"characteristicId":2541,"templateId":132,"value":true},"2543":{"id":11184,"characteristicId":2543,"templateId":132,"value":true},"2545":{"id":11185,"characteristicId":2545,"templateId":132,"value":true},"2547":{"id":11186,"characteristicId":2547,"templateId":132,"value":"N/A"},"2549":{"id":11187,"characteristicId":2549,"templateId":132,"value":true},"2551":{"id":11188,"characteristicId":2551,"templateId":132,"value":true},"2553":{"id":11189,"characteristicId":2553,"templateId":132,"value":true},"2555":{"id":11190,"characteristicId":2555,"templateId":132,"value":true},"2557":{"id":11191,"characteristicId":2557,"templateId":132,"value":true},"2559":{"id":11192,"characteristicId":2559,"templateId":132,"value":true},"2561":{"id":11193,"characteristicId":2561,"templateId":132,"value":"API"},"2563":{"id":11194,"characteristicId":2563,"templateId":132,"value":"N/A"},"2565":{"id":11195,"characteristicId":2565,"templateId":132,"value":"JSON, XML, STIX, CSV"}}}},{"id":3511,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/ZEROFOX_Platform.jpg","logo":true,"schemeURL":"https://old.roi4cio.com/fileadmin/user_upload/ZEROFOX_Platform_scheme.jpg","scheme":true,"title":"ZeroFOX Platform","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"zerofox-platform","companyTypes":[],"description":"<p>With a global data collection engine, artificial intelligence-based analysis, and automated remediation, the ZeroFOX Platform protects you from cyber, brand and physical threats on social media & digital platforms.</p>\r\n<p><span style=\"font-weight: bold;\">Gain Visibility</span></p>\r\n<p>Immediately see beyond your perimeter to catch more threats faster, before they impact your business & employees.</p>\r\n<p><span style=\"font-weight: bold;\">Ensure Control</span></p>\r\n<p>Dramatically reduce your risk with artificial intelligence-driven analysis, custom policies rules, role-based administration, and robust analytics.</p>\r\n<p><span style=\"font-weight: bold;\">Automate Protection</span></p>\r\n<p>Eliminate costly, time-intensive threat hunting, manual remediation and data coverage gaps that leave you and your organization exposed.<br /><br /><span style=\"text-decoration: underline;\"><span style=\"font-weight: bold;\">Our products:</span></span></p>\r\n<p><span style=\"font-weight: bold;\">ZeroFOX Social Employee Protection.</span> Empower employees to safeguard their accounts, publish security training and harden security posture across the workforce.</p>\r\n<p><span style=\"font-weight: bold;\">ZeroFOX Social Executive & VIP Protection.</span> Protect your executives and VIPs by identifying cyber and physical risks and gaining real-world situational awareness.</p>\r\n<p><span style=\"font-weight: bold;\">ZeroFOX Social Brand Protection.</span> Protect your business from revenue-damaging threats to your brand, your hard-earned social presence and your engaged customers.</p>\r\n<p><span style=\"font-weight: bold;\">ZeroFOX Social Enterprise Protection.</span> Find and eliminate complex, targeted security threats and business risks across all social media & digital platforms.</p>\r\n<p><span style=\"font-weight: bold;\">ZeroFOX Social Web & Domain Protection.</span> Protect your web and social experiences by finding and eliminating domain squatting and typo phishing.</p>","shortDescription":"ZeroFOX Platform ingests data from the social networks and web, analyze it and alert for malicious activity, and work on behalf of the customer to remediate issues to and remove risks.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ZeroFOX Platform","keywords":"","description":"<p>With a global data collection engine, artificial intelligence-based analysis, and automated remediation, the ZeroFOX Platform protects you from cyber, brand and physical threats on social media & digital platforms.</p>\r\n<p><span style=\"font-weight: bold","og:title":"ZeroFOX Platform","og:description":"<p>With a global data collection engine, artificial intelligence-based analysis, and automated remediation, the ZeroFOX Platform protects you from cyber, brand and physical threats on social media & digital platforms.</p>\r\n<p><span style=\"font-weight: bold","og:image":"https://old.roi4cio.com/fileadmin/user_upload/ZEROFOX_Platform.jpg"},"eventUrl":"","translationId":3512,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":836,"title":"DRP - Digital Risk Protection","alias":"drp-digital-risk-protection","description":"Digital risks exist on social media and web channels, outside most organization's line of visibility. Organizations struggle to monitor these external, unregulated channels for risks targeting their business, their employees or their customers.\r\nCategories of risk include cyber (insider threat, phishing, malware, data loss), revenue (customer scams, piracy, counterfeit goods) brand (impersonations, slander) and physical (physical threats, natural disasters).\r\nDue to the explosive growth of digital risks, organizations need a flexible, automated approach that can monitor digital channels for organization-specific risks, trigger alerts and remediate malicious posts, profiles, content or apps.\r\nDigital risk protection (DRP) is the process of protecting social media and digital channels from security threats and business risks such as social engineering, external fraud, data loss, insider threat and reputation-based attacks. DRP reduces risks that emerge from digital transformation, protecting against the unwanted exposure of a company’s data, brand, and attack surface and providing actionable insight on threats from the open, deep, and dark web.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a digital risk?</span>\r\nDigital risks can take many forms. Most fundamentally, what makes a risk digital? Digital risk is any risk that plays out in one form or another online, outside of an organization’s IT infrastructure and beyond the security perimeter. This can be a cyber risk, like a phishing link or ransomware via LinkedIn, but can also include traditional risks with a digital component, such as credit card money flipping scams on Instagram.\r\n<span style=\"font-weight: bold;\">What are the features of Digital Risk Protection?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">The features are:</span></span>\r\n<ul><li>Protecting yourself from digital risk by building a watchtower, not a wall. A new Forrester report identifies two objectives for any digital risk protection effort: identifying risks and resolving them.</li><li>Digital risk comes in many forms, like unauthorized data disclosure, threat coordination from cybercriminals, risks inherent in the technology you use and in your third-party associates and even from your own employees.</li><li>The best solutions should automate the collection of data and draw from many sources; should have the capabilities to map, monitor, and mitigate digital risk and should be flexible enough to be applied in multiple use cases — factors that many threat intelligence solutions excel in.</li></ul>\r\n<span style=\"font-weight: bold;\">What elements constitute a digital risk?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Unauthorized Data Disclosure</span></span>\r\nThis includes the theft or leakage of any kind of sensitive data, like the personal financial information of a retail organization’s customers or the source code for a technology company’s proprietary products.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Threat Coordination Activity</span></span>\r\nMarketplaces and criminal forums on the dark web or even just on the open web are potent sources of risk. Here, a vulnerability identified by one group or individual who can’t act on it can reach the hands of someone who can. This includes the distribution of exploits in both targeted and untargeted campaigns.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Supply Chain Issues</span></span>\r\nBusiness partners, third-party suppliers, and other vendors who interact directly with your organization but are not necessarily following the same security practices can open the door to increased risk.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Employee Risk</span></span>\r\nEven the most secure and unbreakable lock can still easily be opened if you just have the right key. Through social engineering efforts, identity or access management and manipulation, or malicious insider attacks coming from disgruntled employees, even the most robust cybersecurity program can be quickly subverted.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Technology Risks</span></span>\r\nThis broad category includes all of the risks you must consider across the different technologies your organization might rely on to get your work done, keep it running smoothly, and tell people about it.\r\n<ul><li><span style=\"font-weight: bold;\">Physical Infrastructure:</span> Countless industrial processes are now partly or completely automated, relying on SCADA, DCS, or PLC systems to run smoothly — and opening them up to cyber- attacks (like the STUXNET attack that derailed an entire country’s nuclear program).</li><li><span style=\"font-weight: bold;\">IT Infrastructure:</span> Maybe the most commonsensical source of digital risk, this includes all of the potential vulnerabilities in your software and hardware. The proliferation of the internet of things devices poses a growing and sometimes underappreciated risk here.</li><li><span style=\"font-weight: bold;\">Public-Facing Presence:</span> All of the points where you interact with your customers and other public entities, whether through social media, email campaigns, or other marketing strategies, represent potential sources of risk.</li></ul>"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"132":{"2521":{"id":11127,"characteristicId":2521,"templateId":132,"value":true},"2523":{"id":11128,"characteristicId":2523,"templateId":132,"value":true},"2525":{"id":11129,"characteristicId":2525,"templateId":132,"value":true},"2527":{"id":11130,"characteristicId":2527,"templateId":132,"value":true},"2529":{"id":11131,"characteristicId":2529,"templateId":132,"value":true},"2531":{"id":11132,"characteristicId":2531,"templateId":132,"value":true},"2533":{"id":11133,"characteristicId":2533,"templateId":132,"value":true},"2535":{"id":11134,"characteristicId":2535,"templateId":132,"value":"N/A"},"2537":{"id":11135,"characteristicId":2537,"templateId":132,"value":true},"2539":{"id":11136,"characteristicId":2539,"templateId":132,"value":true},"2541":{"id":11137,"characteristicId":2541,"templateId":132,"value":true},"2543":{"id":11138,"characteristicId":2543,"templateId":132,"value":true},"2545":{"id":11139,"characteristicId":2545,"templateId":132,"value":true},"2547":{"id":11140,"characteristicId":2547,"templateId":132,"value":true},"2549":{"id":11141,"characteristicId":2549,"templateId":132,"value":"N/A"},"2551":{"id":11142,"characteristicId":2551,"templateId":132,"value":"N/A"},"2553":{"id":11143,"characteristicId":2553,"templateId":132,"value":true},"2555":{"id":11144,"characteristicId":2555,"templateId":132,"value":"N/A"},"2557":{"id":11145,"characteristicId":2557,"templateId":132,"value":true},"2559":{"id":11146,"characteristicId":2559,"templateId":132,"value":true},"2561":{"id":11147,"characteristicId":2561,"templateId":132,"value":"API"},"2563":{"id":11148,"characteristicId":2563,"templateId":132,"value":"N/A"},"2565":{"id":11149,"characteristicId":2565,"templateId":132,"value":"JSON, STIX, TAXII"}}}}],"selectedTemplateId":132},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}