Compromised Systems
Security Ratings
Breach and Ransomware Susceptibility Score
Data Leak Susceptibility Score
Cloud and SaaS Exposure Investigation Module
Dark Web Presence Investigation Module
Domain Intelligence Investigation Module
The "Compromised Systems" measure in security ratings assesses or quantifies systems within an organization breached, infiltrated, or compromised by unauthorized individuals or malicious entities. It is an indicator of the level of vulnerability or susceptibility of a system to security threats and attacks.
The measure of compromised systems is typically derived from various security monitoring and incident response mechanisms that detect and track unauthorized access attempts, malware infections, data breaches, or other security incidents. These incidents can result in unauthorized disclosure, alteration, or destruction of sensitive data, system availability, and functionality disruptions.
By tracking and analyzing the number or percentage of compromised systems, organizations can evaluate the effectiveness of their security measures, identify vulnerabilities or weak points, and prioritize remediation efforts to enhance their overall security posture.
ThreatNG Security Ratings integrates various components to enhance the fidelity and validity of a Compromised Systems rating. Incorporating intelligence substantiated with external attack surface management and digital risk protection capabilities provides a comprehensive assessment of an organization's security posture.
Here is how each component contributes to the overall fidelity and validity of the rating:
External Attack Surface Management: This capability involves monitoring an organization's external-facing assets, such as domains, IP addresses, and network infrastructure. ThreatNG identifies vulnerabilities and potential entry points for attackers by continuously scanning and analyzing these assets. This information contributes to the rating by understanding the organization's exposure to external threats.
Digital Risk Protection: ThreatNG leverages digital risk protection capabilities to gather information from various sources, including the Dark Web. The solution identifies potential threats and indicators of compromised systems by monitoring the Dark Web presence. This component enhances the validity of the rating by uncovering any leaked credentials or sensitive information related to the organization.
Domain Intelligence: ThreatNG uses domain intelligence to assess an organization's domain's reputation and security posture. This information helps evaluate the likelihood of compromised systems and adds fidelity to the rating.
Sentiment and Financials: ThreatNG collects and analyzes sentiment data related to the organization, including negative news, lawsuits, SEC filings, and financial information. This data provides valuable context regarding potential security risks, breaches, or vulnerabilities. Considering this information, the rating gains validity by factoring in external indicators of potential compromise.
Cloud and SaaS Exposure: This component focuses on discovering an organization's cloud and Software-as-a-Service (SaaS) environment. ThreatNG identifies any misconfigurations or exposed open buckets that may pose security risks. By assessing the organization's cloud and SaaS exposure, the rating gains fidelity and validity by considering potential attack vectors and vulnerabilities.
Breach and Ransomware Susceptibility: ThreatNG conducts deeper inspections to evaluate an organization's susceptibility to breaches and ransomware attacks. It assesses the likelihood of a compromise by analyzing security controls, patching practices, and previous security incidents. This analysis enhances the validity of the rating by considering the organization's historical security performance.
Data Leak Susceptibility: ThreatNG also assesses an organization's susceptibility to data leakage incidents. By analyzing data handling practices, access controls, and encryption mechanisms, it identifies potential weaknesses that could lead to unauthorized data exposure. This analysis contributes to the rating's fidelity and validity by considering the organization's data protection measures.
By combining these various capabilities, ThreatNG comprehensively assesses an organization's security posture. Integrating intelligence from external sources, attack surface management, digital risk protection, and detailed inspections adds fidelity and validity to the rating of compromised systems, helping organizations understand and address potential security risks.