C2SEC iRisk Security Operation
Operational Business Intelligence
Core Data Platform
A big data platform to gather and store various structured, semi-structured, and unstructured data, such as public, deep, and dark web data, OSINT feeds, scanning data, user data, etc
A BI-layer to support management and decision making workflow including trend and benchmark analysis
An analytic layer to support tagging, classification, correlation, and pattern identification via data mining and machine learning algorithms to build data insights
A global scalable computation and storage cluster to support real-time operational assessment of various risk factors
iRisk discovers an organization's internet-exposed on-premise and cloud assets: IPs, sub domains, root domains, shadow ITs, cloud storage accounts, code repositories, etc., in real time.
It then classifies and tags these assets based on numerous gathered internal and external data points, and provides an interactive asset explorer for security teams to identify, monitor, and secure critical assets.
iRisk continuously analyzes an organization's exposed attack surfaces via both non-intrusive and intrusive assessments, such as 0-day vulnerability scans.
Complementary to traditional vectors such as network and web application, iRisk covers emerging Cloud and SaaS risks, such as Cloud Storage, Code Repository Secrets, SaaS API Security, SaaS subdomain hijacking, etc.
In-Depth Attack Surface Analysis with Cloud/SaaS Focus
Real-time Operation Insights
iRisk correlates thousands of data points, including public data, partner data, digital asset data, security scan data, users' proprietary data input etc. to build actionable insights for security teams to prioritize each reported risk and guide the corresponding remediation.
iRisk also provides peer, industry benchmark, and historical trend risk analysis.
Third-party cyber risks introduced by IaaS, PaaS, or SaaS providers are daily OPERATIONAL security risks, not just compliance risks. iRisk provides a single platform that enables security teams to centralize security operation management for both first party and third parties.
iRisk automatically identifies third-party IaaS, PaaS, and SaaS dependencies. Security teams can perform the same level of in-depth analysis for these third parties as they would with the first party. For example, a fully automated penetration test of SaaS API integration endpoints.
Security Operation for Both First Party and Third Parties
Aggregation Risk Analysis for Fourth Parties
iRisk builds a visual model of the organization's IT supply chain and evaluates the aggregation risk of each third party as well as their corresponding fourth parties with proprietary algorithms. Organizations that have high aggregation risk index in your supply chain are highlighted in the visualized graph and can be inspected for specific issues.
Global Deployment, Data Isolation, and Data Residency
iRisk is a cloud-native SaaS platform with a multi-cloud focus that can be deployed globally within minutes. No software agent is required to be installed locally.
iRisk commits to strong data isolation. Customers’ data are strictly isolated, encrypted, and stored in global data centers per customers' data residency requirements.