Loading...
Attack surface management tools for discovering, monitoring, and reducing external attack vectors to minimize cybersecurity risks. Task: Digital Risk Protection
Browse 71 security tools
Narrative intelligence platform detecting disinformation & brand narrative threats.
AI-driven platform for monitoring & detecting disinformation and influence ops.
AI-driven narrative intelligence to detect disinformation targeting investor sentiment.
Digital risk protection platform monitoring surface, deep, and dark web threats
Managed digital footprint protection for executives, employees & families.
Monitors and detects lookalike domains used for brand impersonation attacks.
Continuous cyber risk monitoring platform for SMB employees and orgs.
Monitors web & dark web for credential leaks to give orgs early breach warnings.
Automated SaaS platform monitoring web sources for brand and domain threats.
Threat monitoring platform for Web3 startups covering dark web, phishing & on-chain risks.
Managed brand protection service covering abuse, infringement, and threat intel.
AI platform detecting fake profiles, disinformation & deepfakes on social media.
DRP platform monitoring 2000+ sources for data breaches & dark web threats.
Centralized agent for BeyGoo platform enabling takedowns, findings & reports.
AI-powered rogue & spoof mobile app detection and takedown service.
Managed AI service detecting & removing brand impersonations across web, social & apps.
AI-powered fake website detection, blocklisting, and takedown managed service.
AI platform for detecting and mitigating disinformation and info ops.
Managed OSINT monitoring service covering all web layers for data leak detection.
Deep & dark web search engine for threat monitoring and data leak detection.
OSINT tool for mapping & monitoring risk ecosystems on Clear & Deep Web.
Free dark web scanning service to identify compromised credentials and data
Proactive attack surface protection preventing info exposure about employees
Dark web monitoring service that detects leaked credentials and user data
Get strategic cybersecurity insights in your inbox