The most powerful cyberwatch / Threat Intelligence tool in the market
Based on the observation that only an automated approach could be fast and exhaustive enough to review continuously hundreds of sources in the web, deep web and dark web, HTTPCS has worked closely with its clients and partners for several years to develop the most powerful Cyberwatch solution in the market.
Web, deep web and dark web monitoring
The goal of CYBERVIGILANCE is to collect sensitive information related to your company to offer you a 360° view of its presence in the networks. Its playing field is the web, the deep web and the dark web. HTTPCS CYBERVIGILANCE detects the critical information that the IT teams could have missed: indeed, our clients are able to act before potential attackers and to control efficiently their vulnerability.
Based on the robots that our R&D team developed, able to analyse hundred of thousands of sources and targets, CYBERVIGILANCE uses the provided targets (keywords, domain names, e-mail…) to detect any match and pass the wanted information.
Several types of files (images, pdf, doc, xls, ...) are collected through OSINT from various public sources (Pastebin, Zoomeye, Shodan, ...). These files are scanned thanks to optical character recognition tools (OCR).
With HTTPCS, get a head start on hackers and react before it's too late!
Data leakage detection, confidential files/documents, security flaws…
Most of the times, companies which suffered from hacking or data theft are the only ones to ignore they are being victim of an attack. Defacement, page hijacking, detected vulnerabilities or data theft… hackers loves to brag about their exploits in the web or deep web to increase their renown or resell their findings.
A large number of encrypted, non-indexed and so not accessible websites from classic search engines are in the dark web. In most cases, hackers share their information there.
HTTPCS CYBERVIGILANCE scans the web, the deep web and the darknet to gather this information and makes them available for our clients.
Domain squatting and typosquatting detection
This solution can detect, analyse and categorize the domains used in the context of typosquatting (ex: refund-irs-gov.com, bankofamericaa.com).
Domains can be used as an attack vector in classic phishing or spear phishing campaign aimed at your employees.
This tool allows you to monitor your domain, brand, product names… (detection of domain squatting)
By detecting suspicious domains early, you can proactively act on attacks and thus protect your business interests.
The SMS and/or e-mail HTTPCS alerts are sent in real time (unlimited number of recipients).
The HTTPCS REST API allows the integration of CYBERVIGILANCE into your runs and tools (Jira, Splunk, ServiceNow…) allowing you to deal with each incident very fast while mobilizing minimal staff.
HTTPCS CYBERVIGILANCE helps you in the incident management prioritization. At a glance, you can assess the criticality of the information.
Technical and Account manager support included
A dedicated Account Manager, assisted with a security experts teams, is in charge of your project. We support you through the onboarding and customization of the product.
In tune with you, we offer constantly relevant solutions to meet your needs, whereas it is via existing options or customized developments.
Ziwit (HTTPCS) holds the label
Ziwit (HTTPCS) expert in digital security, guarantees technical expertise as well as quality advice to prevent acts of cyber-surveillance and secure your IT installations and your websites.As an ExpertCyber certified service provider, Ziwit (HTTPCS) is committed to respecting its charter of commitments.
Ziwit (HTTPCS) holds the label
The France Cybersecurity label offers the guarantee that the labeled products, solutions and services are designed, developed and operated in France, by a dynamic and innovative industrial sector recognized by the market. It is therefore a mark of excellence for companies.
Ziwit (HTTPCS) holds the Cybersecurity Made In Europe certification
The "Cybersecurity made in Europe" certification is designed to promote European cybersecurity companies and increase their visibility on the European and global market. The certification raises awareness of the strategic value of cybersecurity companies originating in Europe and developing their activity on the basis of European values of trust.
Ziwit (HTTPCS) holds the Cyber Essentials certification
Cyber Essentials is a certification supported by the British government (United Kingdom) to help organizations ensure operational security against cyber attacks.
Ziwit (HTTPCS) is part of the national systemcyber malicious
mission is to support victims of cyberattacks through its cybersecurity solutions and tools.As a service provider listed on the french government platform Cyber Malicious, Ziwit (HTTPCS) is committed to respecting its charter of commitments.
Ziwit (HTTPCS) is an associated memberCampus Cyber
Campus Cyber will be a French hub of cybersecurity by 2022 that will bring together the main national and international players in the field.
Ziwit (HTTPCS), recognized as a solution byIncibe
(Spanish National Institute of Cybersecurity)
Ziwit (HTTPCS) is recognized as trusted solution by Incibe, the Spanish national cybersecurity institute.
The interactive HTTPCS map allows you to visualize, in real time, cyberattacks worldwide. HTTPCS Cyber Vigilance alerts you when a threat that could affect you is found.
Your user dashboard can be accessed directly from your user account at www.httpcs.com. No installation is required on your server. Create an HTTPCS account et login to your user dashboard.
The support of your cybervigilance policy benefits from the expertise of a dedicated Account Manager, your single contact available by email and phone.
Cyber Threat Intelligence (or CTI) is a concept at the heart of the HTTPCS CyberVigilance solution. This discipline aims to collect and classify information related to cyber threats.
Cyber Threat Intelligence collects its data from various places including Open Source (OSINT), social media and networks (SOCMINT), commercial and community data, human data (HUMINT) and finally information sourced from the Deep Web and Dark Web (Dark Web Monitoring).
Frequently asked questions about Cyber Vigilance
What is Cyber Vigilance?
Being Cyber Vigilant or practicing cyber vigilance, is to adopt simple reflexes, advocated by regulatory bodies to protect your business effectively against cyber threats. HTTPCS Cyber Vigilance helps businesses anticipate cyberattacks by maintaining a constant cyber watch.
Who should use HTTPCS Cyber Vigilance ?
HTTPCS Cyber Vigilance is aimed at all companies, whatever their size, who want to be warned before their infrastructure is attacked and their data hacked.
If you find hacked data, it's already too late, right?
HTTPCS Cyber Vigilance scans the web and the deep web in order to gather a maximum of information on what hackers say. When they quote you or say they have stolen data, that does not mean that they have already exploited them! This is exactly the right time to react quickly and get all passwords changed, for example, before hackers have a chance to act.
How can HTTPCS Cyber Vigilance scan the deep web?
HTTPCS has deployed robots, called Virtual Agents, on the web and deep web: they navigate and scan this parallel network in search of sensitive or even critical information.
How does the 14-day HTTPCS free trial work?
The 14-day free version of HTTPCS is available without obligation. This version allows you to discover the console and obtain an overview of the solution in its BASIC formula.
Can I add a site I don't own?
The use of HTTPCS is subject to prior verification. Only the owner or manager of the website is authorized to add it. This procedure can be carried out: by telephone, by transferring a witness file, or by signed written certificate (for consultants, web agencies or Managed Service Providers for example).
How does HTTPCS CyberVigilance work?
HTTPCS CyberVigilance can detect wether information about you or your company has been leaked. It can also passively analyze whether keywords such as your domain name are at the heart of a discussion on the Dark Web. It can also be used to check wether your site is subject to domain or typo squatting.
What types of alerts will I receive and can I choose them?
There are different types of notification in HTTPCS CyberVigilance. You can choose which of the following types of notification you would like to receive : events linked to keywords, events related to the domain, email-related events and events related to Domain Squatting
Where does the bot look for leaked data?
The HTTPCS CyberVigilance solution is based on the development of robots capable of analyzing hundreds of thousands of sources and targets, their playgrounds being the Web, the Deep Web, the Dark Web. They also monitor social networks (SOCMINT).
Can I use it as part of a Security Operations Center?
HTTPCS Cybervigilance helps SOCs to better understand their company's specific context and threats, thanks to the domain name and keyword event system.