Features

What is spidernext?

It is a powerful search engine based on artificial intelligence. Its main function is to identify key information linked to the data that users add to the platform, assess it, analyze it and classify it according to its value and the level of risk it may represent. Finally, it sends personalized alerts according to the degree of severity and provides a platform for generating reports and managing the data in real time.

spidernext analyzes the information on the web in order to maintain security, protect reputation and obtain intelligence data.

It allows to unify in a single platform the management and control of the different elements that make up the organization’s security.

It contributes to manage and improve the security of your organization through the intelligent defence system incorporated into the platform that allows an automated monitorization of assets and IOCs (Indicators of Compromise), vulnerability analysis and detection of elements susceptible to being harmful.

It also makes an important contribution to improving the ability to respond to security incidents, by having a security centralization that offers more information and visibility.

Identification of:

  • Attacks through the integration with EPPs, EDRs, SIEMS, Firewalls, etc.
  • Vulnerabilities in the organization’s infrastructure.
  • Technical information that could be useful for an attacker.
  • Outdated or misconfigured systems.
  • Preparation of APTs by groups of criminals.
  • Leaks of confidential data.

Detection of:

  • Possible weak spots that could be entry points for cyberattackers.
  • Infected systems.
  • Possible development of phishing attacks targeting our clients or our clients’ clients.
  • Pharming of corporate websites and online stores of the client.
  • Client domain hacking or infection.
  • Improper use of assets by employees
  • Abnormal behaviour of users or applications.
  • Client infrastructures that are the source of attacks on third parties.
  • Usernames and passwords stolen from our clients.
  • Vulnerable websites and systems belonging to our clients.

Contribute:

  • Security centralization.
  • Greater capacity for event correlation.
  • More information and visibility into incidents.
  • Better responsiveness.

Facilitates decision-making through the automated collection of intelligence information from hundreds of public and private sources.

Intelligence on our organization.

Intelligence on the competition.

Intelligence on employees or collaborators.

Intelligence on VIPs.

Detection of possible information leaks.

Real-time monitorization of the reputation of a company, institution or personality from the information published in the media, forums and social networks.

Information about news published relating to clients.

 Detection of misuse of clients’ brands.

 Detection of identity theft.

Detection of malicious news and publications.

 Detection of defamatory comments.

Helps raise employee security awareness, conducting phishing simulation campaigns and spreading security-related news.

Create and manage custom phishing simulation campaigns

What is the process of spidernext?

Alerts sent in real time

There are 5 types of alerts depending on the level of importance of the event. You can define what action to take, when, and how, for each of these levels.

Users can easily configure the alert methods depending on the level of risk, the increase in risk or even the detection of a specific event.

To classify the risk, the results processing engine and artificial intelligence will assign a value to each event that could be deemed likely to form part of a threat. This value will be from 1 to 5 depending on the severity of the event.

1 Event initially classified with a minimum effect in an APT or very low importance

2 Event classified with low importance

3 Event classified with medium importance

4 Event classified with high importance

5 Event classified with critical importance

Alerts sent in real time

There are 5 types of alerts depending on the level of importance of the event. You can define what action to take, when, and how, for each of these levels.

Users can easily configure the alert methods depending on the level of risk, the increase in risk or even the detection of a specific event.

To classify the risk, the results processing engine and artificial intelligence will assign a value to each event that could be deemed likely to form part of a threat. This value will be from 1 to 5 depending on the severity of the event.

1 Event initially classified with a minimum effect in an APT or very low importance

2 Event classified with low importance

3 Event classified with medium importance

4 Event classified with high importance

5 Event classified with critical importance