Technical Datasheet

The Digital Asset Management solution provides the business with a range of services to discover, track, catalog, monitor, and secure these assets. The Digital Asset Management solution provides the business with a range of services to discover, track, catalog, monitor, and secure these assets.

DMARC and monitoring of Messaging Platforms

DMARC is integral to the Messaging Suite, which dovetails in the brand protection and reputation solution portfolio. This solution can proactively detect and respond to spoofed domains and phishing solutions that target businesses.

Phishing intelligence and propriety solutions

The Phishing Solutions will help the business readily detect and respond to phishing attacks and successfully resolve them for a real-time mitigation prior to fraud events.
A variety of proprietary techniques and methodologies will be provided as a robust suite of phishing solutions.

Data Loss Recovery and monitoring of the Surface, Dark and Deep Web

The Data Loss Recovery solution can identify and recover compromised banking-related data, including pilfered bank account information, cloned credit card details, stolen Personal Identifiable Information (PII), hacking documents and tools, leaked source code, copyright or trademark infringement, and technical information or data that threat actors use in targeting corporate systems.

Threat Management and Security Policy Enforcement

Security Policy Enforcement is a solution that allows businesses to exercise their legal rights across the jurisdiction to protect their digital and channel engagement.
With various underlying solutions, including the iZOOlabs security platform, incident response, policy framework consultation, legal framework of enforcement, and enforcement and controls, the business will be aided with their rights to practice common law legal rights across the internet that protect their trademark and copyright assets.

Third Party Risk Assessment

Third Party Vulnerability Assessment is a suite of solutions to model, predict, and assess digital vulnerabilities allowing the client to understand their risks and exposure.

Services Resources

Threat Advisory via the iZOOlabs Threat Management platform

The Threat Advisory Services is composed of assessing and monitoring the threat actor landscape to protect business networks from emerging threats and digital risks and collecting and managing situational awareness from a large volume of threat intelligence and vulnerability information.

Domain Names – Management and Security

Domain Name Management help businesses have a first line of defence against domain abuse through privileged access to the global community of domain registries and registrars. With legal expertise within the ICANN framework, businesses are aided with a successful resolution against domain name disputes.

DNS Monitoring and Intelligence

DNS Intelligence involves monitoring a business’ DNS infrastructure to protect its brand from cyberattack threats, such as phishing, pharming, DNS poisoning, and DNS hijacking. A DNS Assurance is also provided as a mechanism to ensure the uptime and availability of the client name servers and DNS function.

Data Loss Recovery and monitoring of the Surface, Dark and Deep Web

In Dark Web Monitoring, the business will be provided with a suite of propriety services and techniques to monitor an evolving set of surface, dark, and deep web channels.
Immediate remediation and recovery of data loss will also be provided through site surveillance and data loss recovery efforts.

Financial Malware / Trojan Monitoring

Financial Malware / Trojan Monitoring helps the business monitor, detect, and provide mitigation controls to combat malware and brand hijacking. This is achieved through agentless services to detect infected endpoints without any end-user intervention or compliance seamlessly.
The business will also be assisted with identifying malware attacks and be provided with effective mitigation.

Executive Protection

Executive Protection and Monitoring employs a suite of services and data correlations, keyword heuristics, including multiple languages, and reverse image-based detections across a broad range of platforms, repositories, and the dark web.

With a high degree of expertise in removing offending web content and resolving more complex and sensitive incidents where defamatory or liable cases against individuals occur, executives and VIPs are guarded against a broad range of social fraud and abuse.

Proactively detect and respond to spoofed domains and phishing emails targeting the business

DMARC MSS is provided to the business for a robust and scalable solution that fully utilises email frameworks to protect the organisation. This solution can proactively detect and respond to spoofed domains and phishing solutions that target businesses.

Brand Protection: total surface web monitoring

Brand Protection provides the business with total surface web monitoring, visibility, and management across their digital footprint and enables a range of responses against brand infringement and reputational risks.
The most complex or disputed cases of brand misuse and fraud associated with client brands can be resolved through a great deal of experience in negotiation with third parties across the globe.

Social Media protection via a global distribution of monitoring tools

Social Media Monitoring solution entails a suite of services that penetrates deep into the social media spectrum through a range of techniques and tools to reach beyond normal vendor APIs.
The solution also provides the business with deep and broad visibility across social networks and affords total control and management against abusive and rogue elements.

Phishing Solution – Mobile App Monitoring

Mobile App Monitoring is part of a wide array of phishing solutions that will protect the organisation’s end-users from mobile malware and ensure that only the latest and official organisation mobile app is available for download.

Services- Threat Management

Threat Management and Security Policy Enforcement

Through Threat Management and Security Policy Enforcement, a dedicated Security platform is provided to the business for real-time threat identification and evaluation, as in-depth forensic analysis for an immediate response – attack mitigation and attack shutdown.

Data Integration

Data Integration provides the business with incident raw data, data integration services, and proprietary intelligence, all assembled in the iZOOlabs – Threat Management.

Threat Visualisation

Threat Visualisation provides the business with data integration, threat data curation, and user interaction and experience, all assembled in the iZOOlabs – Threat Management.

Threat & Forensic Analysis

Threat & Forensic Analysis provides the business with threat categorisation, threat analysis, and forensic investigations, all assembled in the iZOOlabs – Threat Management.

Services-Anti-Phishing

Phishing Solutions – Anti-Smishing

Anti-Smishing solutions employ various techniques and methodologies to analyse SMS honeypots and data sources to detect mobile-based phishing sites.

Anti-Vishing

Anti-Vishing solutions incorporate a tool for swift response and mitigation to a vishing campaign. Third parties and agencies are teamed up to discover and respond to the compromised voice systems and will provide shutdown and incident resolution.

DNS Monitoring and Intelligence

DNS Monitoring and Intelligence is an essential component of brand protection and phishing prevention, alongside a defence against pharming, DNS poisoning, and DNS hijacking, which are all related attacks against the domain name request infrastructure.

services-Digital Asset Management

Digital Asset Management - an External Attack Surface Monitoring solution

Digital Asset Management is an External Attack Surface Monitoring solution that provides the business with a range of services to discover, track, catalogue, monitor, and secure these assets.

Website Scanning Suite

The Website Scanning Suite provides the business with a range of real-time web app monitoring services that continuously monitor client-whitelisted web apps for a variety of threats, ranging from malware and hacking attempts to zero-day attacks.