-
Internet Data Overview RiskIQ's Security Intelligence Service Internet Data offering provides customers with access to RiskIQ’s high volume API endpoints to directly ingest RiskIQ data into their security operations tools and technology. ...
-
Overview Within the API settings of your workspace, you can set up an API Post URL. If this URL is set, then for each event-type with API POST enabled in it's configuration settings, a response will be pushed to the Post URL for the workspace a...
-
Created on: 06/01/2018
in User Guide Dashboards
Overview The Events Dashboard functions as a living report for activity RiskIQ has identified within your workspace. On the left-hand side, there are a number of facets and filters that can be used to reduce the overall data or tailor it to your ex...
-
Created on: 06/01/2018
in User Guide Dashboards
Overview The Global Phishing Dashboard functions as a visual tool to understand live phishing attacks that are being observed by RiskIQ and in what locations in the world. While not functional, the Global Phishing Dashboard is meant to serve as a n...
-
Created on: 06/01/2018
in User Guide Dashboards
Overview The Insights Dashboard acts like a summary for your Digital Footprint Inventory. The dashboard is split into three sections: Global Insights, Workspace Insights and Private Insights. Each insight has a title, description and count of asset...
-
Ability to analyse Risk Scores based on Organisation, Brand , Tags from Assets in Inventory. Visibility can be further controlled with Role Based Access Control. Using this feature business units can be compared and contrasted to observe best prac...
-
Metrics being Measured Security Posture (SP) & Threat Indicator (TI) Rank Category Metric Description 1 TI Blacklisted Hosts with Malware (High Confidence) The number of websites in the organization that have been listed on high c...
-
Categories & Subcategories Metrics are grouped into subcategories which are in turn grouped into a parent category. The scores at both the category and sub-category levels are derived directly from the component metrics. Threat Indicators: ...
-
The building block for a Risk Score is a METRIC that measures the raw quantity of a policy violation, vulnerability, configuration, exposed service or administrative complexity in a Digital Footprint of External Facing Assets. METRICs a...
-
Personas Targeted: Management & Executives Defenders - Vulnerability Management teams (Managers and analysts) Remediators - Incident Response teams who are tasked with reacting to breaches. IT and Business teams who either own...