About Us     G-Cloud     Service Catalogue    Services     Sectors    Media     Trust Centre

+44 2380 429429

Amicus viper™ - Threat management

Amicus Viper™ turns global threat information into predictive, actionable intelligence to identify, correlate and remediate targeted cyber threats.  Only by continuously developing new solutions and adding new intelligence to the threat platform, will companies be empowered to counter the heightened threat and exposure.

THREAT INTELLIGENCE

Threat intelligence marks the next evolution in addressing how companies can turn the tables on received and perceived threat and create order out of chaos.

 

The new world of being informed and utilising the Dark Web is here today. Make sure you are on the inside track, even when the threat is outside your control.

data security

You do not know if you are truly protected if you do not know what your protecting yourself from.

 

  • Can you afford to put yourself personally at risk?
  • A director can face a fine of £5,000, or a conviction
  • A company can face a fine of £500,000 and an individual prosecution.

 

Do you know why?

HOW IS THE SERVICE DELIVERED?

Our targeted cyber threat intelligence platform is delivered through the cloud and consists of three different modules, delivering unique benefits and actionable cyber threat intelligence to your company or organisation.

Modules

HACTIVISM

BRAND ABUSE

DATA LEAKAGE

This module looks at collecting information around the technological assets of an organisation.  It does this by gathering data from the IPs, domains, websites etc.   Intelligence is also gathered around the respective industry sector which could also be a target.

This module looks for any brand abuse about the organisation across different social networks and internet repositories including blogs, forums, websites, advertisements (ad word abuse). This will include user thoughts and trends regarding a brand, product or the organisation.

This module will identify any documents which contain sensitive or confidential information about the organisation which should not be in the public domain.  It does this by looking at different public or Cloud storage areas and P2P networks to map information affecting data confidentiality.

Social Media

Credentials

Our Sectors

Healthcare

Regulated Industries

© Amicus ITS All rights reserved.

About Us     G-Cloud     Service Catalogue    Services     Sectors    Media     Trust Centre

Social Media

Clicking on 'OK' or using this website, you accept our cookie policy. OK