Intelligence Detection

Threat inSights System is improved for helping organizations detect threats faster and also working with surveillance at the same time. We have data leak detection technology to protect the data of the organization's internet and dark web.

Threat Sharing

Threat Sharing

Threat data connect and indicators from data providers gathering in threat sharing and connect with Log (SIEM) system as well.

Type of IOC

  • IP Address

    IP Address

  • Domain

    Domain

  • Hash

    Hash

  • URLs

    URLs

  • URLs

    Other

Asset Discovery

To help you find any interesting information and gathering servers and asset which service on the internet and collecting from OSINT. In the same way, we are able to import data for gap detection and threats continuously.
  • IP Address

    IP Address

  • Sub-Domian

    Sub-Domian

  • Email

    Email

  • Discovery Tool

    Discovery Tool

Data Leak Detection

Surface Web

Data leak detection from dark web that brings data of organization for publishing and selling.
  • Web Site

    Web Site

  • Communities

    Communities

  • Social Network

    Social Network

We use indicators from insights data to detect threats from hackers stealing data or infecting Backdoor on the server.
  • Credential

    Credential

  • Credit Card

    Credit Card

  • Finance Info

    Finance Info

  • Confidential Data

    Confidential Data

Dark Web

Threat Hunting

Threat Hunting

Threat Hunting is a system that can detect proactive threats. Also, Detection threats on cyber by using proactive indicators of insights data which come from hacker and be attacked by malware.
  • AgentBasedDetection

    Persistent
    Activities

  • System Compromised

    System Compromised
    (MITRE ATT&CK)
    - File System
    - Executable
    - Registry

  • Malware Infected

    Malware Infected
    (Indicator)

Compromised Detection

Compromised Detection

We use indicators from insights data to detect threats from hackers stealing data or infecting Backdoor on the server.
  • System Compromised

    System
    Compromised

  • Web Server Compromised

    Web Server
    Compromised

Automate Update Indicator

Automate Update Indicator

Threat Hunting system use indicators data and detect faster also update data for real – time
  • Automate Update Indicator

    Automate
    Update
    Indicator

  • AgentBasedDetection

    Agent-Based
    Detection

Web Defaced Detection

Web Defaced Detection

เฝ้าระวังการโจมตีด้วยเทคนิคการเปลี่ยนหน้าเว็บไซต์ (Web Defaced)
เพื่อรักษาความน่าเชื่อถือขององค์กร

Advanced Vulnerability Detection

Threat inSights System is able to detect the gap of the system. This system is based on a database of the Common Vulnerabilities and Exposures (CVE) system.
  • Passive Detection

    Passive Detection

  • Active Detection

    Active Detection

  • Mis-Configuration Detection

    Mis-Configuration Detection

  • Hardening and Remediation

    Hardening and Remediation

Detection OS System

ระบบสนับสนุนการตรวจจับ

Mis-Configuration Detection

The system can detect unsafe configurations based on Security Guideline from the CIS center.
Also, editing configuration for safety from the system.
Mis-Configuration Detection
Detection user attack by using social engineering technique such as Phishing, Fake mobile application, Drive-By-Download.
  • Phishing

    Phishing

  • Mobile

    Fake Mobile
    Application

  • Drive

    Drive-By
    Download

Social Engineering Detection

Cybersecurity News Feed

Update news about cybersecurity from other sources around the world and getting notifications via Email.
Mis-Configuration Detection