Features

Spidernext centralization of security and much more

It is a centralized cyber defense platform based on a Virtual SOC (Virtual Security Operations Center), which goes beyond the centralization and correlation of security events, incorporates a powerful engine based on Artificial Intelligence, whose main function is to identify Key information related to the assets added to the platform, value it, analyze it and classify it according to its value and the level of risk it represents.

Finally, send personalized alerts according to the degree of criticality and provide a platform to generate reports and manage data in real time. This provides the ability to identify events that may affect security, including a potential cyberattack before it occurs, retrieve intelligence information, and detect attacks on an organization’s reputation.

It allows the organization’s security management and control to be centralized in a single platform.

It contributes to improving the security of your organization through the intelligent defense system incorporated into the platform that allows an automated monitoring of assets and IOCs (Indicators of Compromise), vulnerability analysis and detection of events that may be harmful.

It also makes an important contribution to improving the response capacity to security incidents, by having a centralization that offers more information and visibility, as well as the automation of the response.

Identification of:

  • Attacks through the integration with EPP, EDR, DLP, MDM, SIEM, Firewall, etc.
  • Vulnerabilities in the organization’s infrastructure.
  • Technical information that could be useful for an attacker.
  • Outdated or misconfigured systems.
  • Preparation of APTs by groups of criminals.
  • Leaks of confidential data.

Detection of:

  • Possible weak spots that could be entry points for cyberattackers.
  • Possible malware-infected systems.
  • Possible development of phishing attacks targeting our clients or our clients’ clients.
  • Pharming of corporate websites and online stores of the client.
  • Impersonations of domains..
  • Improper use of assets by employees
  • Abnormal behaviour of users or applications.
  • Client infrastructures that are the source of attacks on third parties.
  • Usernames and passwords stolen from our clients.
  • Vulnerable websites and systems belonging to our clients.

Contribute:

  • Security centralization.
  • Greater capacity for event correlation.
  • More information and visibility into incidents.
  • Better responsiveness and incident management.
  • Automatic and custom metrics and KPIs.
  • Facilitates regulatory compliance (ISO 27001, PCI-DDS, NIST, ENS and others).

Facilitates decision-making through the automated collection of intelligence information from hundreds of public and private sources.

Intelligence on our organization.

Intelligence on the competition.

Intelligence on employees or collaborators.

Intelligence on VIPs.

Detection of possible information leaks.

Real-time monitorization of the reputation of a company, institution or personality from the information published in the media, forums and social networks.

Information about news published relating to clients.

 Detection of misuse of clients’ brands.

 Detection of identity theft.

Detection of malicious news and publications.

 Detection of defamatory comments.

Helps raise employee security awareness, conducting phishing simulation campaigns and spreading security-related news.

Create and manage custom phishing simulation campaigns

What is the process of spidernext?

Alerts sent in real time

There are 5 types of alerts depending on the level of importance of the event. You can define what action to take, when, and how, for each of these levels.

Users can easily configure the alert methods depending on the level of risk, the increase in risk or even the detection of a specific event.

To classify the risk, the results processing engine and artificial intelligence will assign a value to each event that could be deemed likely to form part of a threat. This value will be from 1 to 5 depending on the severity of the event.

1 Event initially classified with a minimum effect in an APT or very low importance

2 Event classified with low importance

3 Event classified with medium importance

4 Event classified with high importance

5 Event classified with critical importance

Alerts sent in real time

There are 5 types of alerts depending on the level of importance of the event. You can define what action to take, when, and how, for each of these levels.

Users can easily configure the alert methods depending on the level of risk, the increase in risk or even the detection of a specific event.

To classify the risk, the results processing engine and artificial intelligence will assign a value to each event that could be deemed likely to form part of a threat. This value will be from 1 to 5 depending on the severity of the event.

1 Event initially classified with a minimum effect in an APT or very low importance

2 Event classified with low importance

3 Event classified with medium importance

4 Event classified with high importance

5 Event classified with critical importance