Hacker-powered Threat Intelligence

80% of breaches are caused by hackers finding and exploiting known vulnerabilities. Radar gives you the power to find these vulnerabilities before the bad guys do.

Portal

What is Threat Intelligence & why do we need it?

Threat intelligence involves gathering, analysing, and applying information about potential or current cyber attacks that could threaten an organisation's security. It provides insights into threat actors, their tactics, techniques, and procedures (TTPs), as well as indicators of compromise (IOCs). The ultimate goal of threat intelligence is to equip organisations with the knowledge to proactively defend against and respond to cybersecurity threats.

Breached Credentials

There are hundereds of data breaches every year containing leaked credentials. Attackers use these to gain access to sensitive accounts at scale.

Password Reuse

Gain insight into whether your users are reusing passwords across multiple sites. Reused breached credentials present additional risk.

Domain Fraud

Identify registered typosquat domains which may be attempting to impersonate your brand, as well as subdomain takeovers that would allow attackers to manipulate user's trust in your branding.

Sub Resource Integrity

Continuous monitoring of your application sub-resource integrity, to ensure your users don't inadvertently run malicious code like Magecart.

Attack surface monitoring

Get alerted when new services are exposed on your attack surface.

Certificate Monitoring

Get alerted for newly issued TLS certificates that belong to your company, or configure your own match rules to detect potential attacks. Manage Shadow IT and detect phishing attacks impersonating you, or your supply chain partners in the planning stage.

How it works

See Radar in Action

Watch how Radar can detect a phishing attack before the attack even takes place.

product-showcase
1

Detect

Radar identifies a newly issued certificate for a domain containing your companies name (or one of your chosen keywords) by monitoring certificate transparency logs. This means a new website has been setup which is using your companies name within its URL.

2

Report

Radar notifies you in real-time about the newly issued certificate. Using the information provided by Radar, you can make the decision as to whether the domain the certificate was issued for is hosting malicious content. Get instant alerts with our Slack and Teams integrations.

3

Prevent

If you deem that the domain is hosting content that is a potential risk, Radar will tell you all you need to know to block the planned attack. A targeted attack has been thwarted, and Radar gets back to work.

Frequently Asked Questions

Got a question you need answering? Hopefully our FAQs should help guide you

What is Radar and why is it useful?

Do I need a security team to use Radar?

What kind of things does Radar search for?

Where does Radar look for information related to my organisation?

Can I track my security posture over time?

Can Radar help me avoid a breach?

How do I get notified of findings?

Do you search for missing security controls?

How often does Radar check for information related to my organisation?

Do I need to have an enterprise-sized budget to use Radar?

© 2024 ONSECURITY TECHNOLOGY LIMITED (company registered in England and Wales. Registered number: 14184026 Registered office: Runway East, 101 Victoria Street, Bristol, England, BS1 6PU). All rights reserved.