Who can access the Community Edition?
The Community Edition is a free version of the CTM360's consolidated platform that offers a range of features and functionalities to help organizations understand their external digital presence. It is accessible to any authorized cybersecurity personnel from a legitimate organization worldwide.
For how long is the Community Edition available for free?
The Community Edition is accessible to one authorized user per organization. This access is valid until revoked by the end-user or by CTM360.
How does the Community Edition differ from the full CTM360 platform?
The Community Edition of CTM360 offers a subset of features from the full platform, focusing on External Attack Surface Management, Digital Risk Protection, and DMARC360. This edition is designed to provide maximum value to the community at no cost, making it accessible to small and medium-sized enterprises (SMEs) who can leverage from the three technologies and take control of their digital presence.
Can I upgrade to the full CTM360 platform if needed?
The Community Edition users can upgrade to any plan with transparent pricing options available through the platform.
How does the Community Edition handle incident response?
The Community Edition allows users to submit up to three takedown requests for free, enabling users to respond to incidents targeting their brand.
What kind of support does the Community Edition offer?
Support is provided through the platform.
What is CTM360?
CTM360 is a leading cybersecurity company based in Bahrain. It offers comprehensive cybersecurity solutions and services to help organizations detect, prevent, and respond to cyber threats.
What industries does CTM360 serve?
CTM360 serves a wide range of industries, including banking and finance, healthcare, government, telecommunications, energy, and manufacturing. Its solutions are tailored to meet the unique cybersecurity needs of each industry.
Can CTM360 assist with regulatory compliance requirements?
Yes, CTM360's solutions are designed to help organizations meet regulatory compliance requirements, such as GDPR, PCI DSS, HIPAA, and ISO 27001. It offers tools and services to assess, manage, and monitor compliance in a streamlined manner.
How does CTM360 help organizations protect against cyber threats?
CTM360 employs a proactive approach to cybersecurity. Its solutions combine advanced technologies, threat intelligence, and human expertise to identify and mitigate potential security risks, monitor for ongoing threats, and respond quickly to incidents.
How does CTM360 handle incident response?
CTM360has a dedicated incident response team that provides 24/7 support to its clients. In the event of a cybersecurity incident, the team follows a well-defined incident response process to contain, investigate, and remediate the incident in a timely and effective manner.
Can CTM360 help organizations with employee cybersecurity awareness training?
Absolutely. CTM360 offers comprehensive cybersecurity awareness training programs to educate employees about common cyber threats, best practices for secure behavior, and how to recognize and report potential security incidents.
In what versions does ThreatCover provide its feeds?
ThreatCover offers feeds in two versions: TAXII 1 and TAXII 2.1. These versions allow users to choose the format that best suits their threat intelligence integration needs.
What are the main products offered by CTM360?
CTM360 provides a range of cybersecurity products, including threat intelligence platforms, security incident and event management (SIEM) systems, vulnerability management tools, and advanced threat detection solutions.
What is External Attack Surface Management?
External Attack Surface Management (EASM) continuously identifies, monitors, and secures an organization's externally-facing or publicly accessible assets. This process enables organizations to address weaknesses, misconfigurations, and potential entry points that adversaries could exploit to gain unauthorized access or cause harm.
What pivoting points does Hackerview or CTM360 utilize?
The platform can pivot via various points such as WHOIS Records, Reverse WHOIS records, DNS Entries, SSL Certificates, and more.
How frequently are ThreatCover feeds updated?
ThreatCover feeds are consistently refreshed on daily bases from diverse and reputable threat intelligence sources, enabling users to remain abreast of the latest emerging threats.
Does CTM360 manage the actions and takedowns?
Yes. CTM360 CIRT fully manages all Incident Response/Response actions. Unlike most other platforms, each incident submitted for takedowns or response is handled directly by our Cyber Incident Response Team (CIRT) with standardized workflows. It is much more detailed than a simple automated Digital Millennium Copyright Act (DMCA) request. The process includes initial report submissions via multiple channels, escalations across different levels (Site owners, Host providers, and Registrars), and direct communication with different points of contact if needed.
What does enhancing SPF record mean from an IP perspective?
After stage 1, we will have more clarity as to which of your email providers (IPs) are being used to send out your Emails. The first step in this stage is to review your current process on outgoing Emails and identify any recommended changes. This would reflect by modifying IPs that may or may not be involved as your Email outgoing IPs. With that information, we can configure those IPs in the DNS record to reflect as your authorized IPs to send out your Emails.
What is the quarantine policy?
DMARC quarantine policy tells the recipient of your emails that if both SPF and DKIM checks fail, accept the email, but mark it as spam.
Can I integrate ThreatCover with other security tools?
Yes, ThreatCover provides integration capabilities through its APIs. You can integrate threatCover with other security tools and platforms, such as SIEMs, threat intelligence platforms, and security orchestration tools.
What is the Reject policy of DMARC?
DMARC reject policy tells the recipient of your emails that if both SPF and DKIM checks fail, reject the email.
How does HackerView scan for these issues?
HackerView utilizes Open Source Intelligence (OSINT) and in-house built tools to carry out its scanning activities.
How does the platform avoid false positives?
The platform employs a comprehensive approach to minimize false positives by verifying every incident. It combines both automated systems and human intervention to monitor threats and identify them as incidents specifically targeting your brand. To achieve this, the platform utilizes in-house scoring mechanisms and manual verification processes that effectively reduces false positive.
How do you detect threats relevant to our organization in the Surface, Deep & Dark web?
CyberBlindspot detects threats relevant to your organization across the Surface, Deep, and Dark web using a combination of identifiers and scouting techniques. These identifiers include regex patterns, brands and executives' names, images and logos, IP addresses, domains, BINs, and mobile apps names and publishers and more.
How do you perform takedowns on incidents targeting our brand?
Our dedicated Cyber Incident Response Team (CIRT) handles each incident submitted for takedowns or response using standardized workflows. This includes direct engagements with global CIRTs, ISPs, hosts, registrars etc. Additionally, we have attained tier 1 status with select high-value escalation points, including direct API access.
How accurate are the data found in the dark web?
The accuracy of data found in the dark web is a significant concern, as it is a high-noise environment where falsified information is prevalent. To address this challenge, CTM360 prioritizes obtaining highly relevant information that is tailored to your organization from paid and privileged sources.
What types of actions does CTM360 take?
CTM360 offers 15+ remediation actions, including but not limited to the following: Takedown, Shutdown, Global Threat Disruption (GTD), Account Suspension, Account Reclamation, Domain Suspension, Blacklisting, Deindexing, and more.
Does CTM360 provide ongoing monitoring and threat intelligence updates?
Yes, CTM360's solutions include continuous monitoring of network activity, threat intelligence feeds, and real-time alerts. It keeps organizations informed about the latest threats and vulnerabilities, allowing them to proactively protect their systems and data.
How can I export threat intelligence data from ThreatCover?
ThreatCover provides capabilities to generate and export data in CSV & JSON format. These exports can be used to share threat intelligence data with external systems or partners.
Can Vendors attach evidence to their assessments?
Vendors can attach all necessary or requested evidence in one link or provide separate links for each piece of evidence. Vendors should ensure that these link(s) are secured and accessible to the authorized requestor only. Additionally, vendors may utilize their preferred cloud storage service (e.g., Google Drive, Dropbox, Sharepoint, etc.), thereby maintaining full control over any shared data.
Is it possible to create a new custom questionnaire?
Yes, users can create new custom questionnaires by navigating to the 'Builder' section. Within this section, users can leverage our comprehensive control question library to create a tailored questionnaire that aligns with their requirements.