A: I PLUS CYBER gathers threat intelligence data from multiple sources, including APT and botnet infrastructure, the dark web, social media and instant messaging, and open-source and proprietary data collection methods. The collected information is considered reliable and accurate.
A: The threat intelligence is updated on a daily basis.
A: Yes, I Plus Cyber uses AI and machine learning to provide additional insights and predictions.
A: I Plus Cyber's technology stack performs scans to identify security vulnerabilities and does not collect client information.
A: I Plus Cyber's technology stack stores information such as subdomains, IPs, WAF-related information, site technologies, screenshots of web applications, cloud instance information, website sitemaps, information regarding hijackable subdomains, identified vulnerabilities per asset, emails of employees for a domain name, and leaked credentials of employees.
A: Yes, I Plus Cyber's technology stack ensures compliance with NIST, ISO27991, SOC2, GDPR, and CCPA.
A: I Plus Cyber's technology stack encrypts all information at rest and in-transit and ensures data privacy through multitenancy, where each user has their own DB schema and storage. Sensitive data is not collected.
A: I Plus Cyber uses a combination of passive and active scanning techniques to conduct agentless discovery, such as querying multiple DNS providers, scanning actual hosts and services, and using various crawling techniques to gather information. The collected information is then normalized and fed to their AI for additional insights and predictions. I Plus Cyber also has automated scanning modules for infrastructure assets, cloud asset instances and buckets, web applications, employee leaks, and sensitive data leaks in paste sites and Github.
A: I Plus Cyber does not scan Kubernetes pods or instances, APIs, or single page applications.
Copyright © 2023 I PLUS CYBER LTD. All Rights Reserved.