The most powerful cyberwatch / Threat Intelligence tool in the market
Based on the observation that only an automated approach could be fast and exhaustive enough to review continuously hundreds of sources in the web, deep web and dark web, HTTPCS has worked closely with its clients and partners for several years to develop the most powerful Cyberwatch solution in the market.
Web, deep web and dark web monitoring
The goal of CYBERVIGILANCE is to collect sensitive information related to your company to offer you a 360° view of its presence in the networks. Its playing field is the web, the deep web and the dark web. HTTPCS CYBERVIGILANCE detects the critical information that the IT teams could have missed: indeed, our clients are able to act before potential attackers and to control efficiently their vulnerability.
Based on the robots that our R&D team developed, able to analyse hundred of thousands of sources and targets, CYBERVIGILANCE uses the provided targets (keywords, domain names, e-mail…) to detect any match and pass the wanted information.
Several types of files (images, pdf, doc, xls, ...) are collected through OSINT from various public sources (Pastebin, Zoomeye, Shodan, ...). These files are scanned thanks to optical character recognition tools (OCR).
With HTTPCS, get a head start on hackers and react before it's too late!
Data leakage detection, confidential files/documents, security flaws…
Most of the times, companies which suffered from hacking or data theft are the only ones to ignore they are being victim of an attack. Defacement, page hijacking, detected vulnerabilities or data theft… hackers loves to brag about their exploits in the web or deep web to increase their renown or resell their findings.
A large number of encrypted, non-indexed and so not accessible websites from classic search engines are in the dark web. In most cases, hackers share their information there.
HTTPCS CYBERVIGILANCE scans the web, the deep web and the darknet to gather this information and makes them available for our clients.
Domain squatting and typosquatting detection
This solution can detect, analyse and categorize the domains used in the context of typosquatting (ex: refund-irs-gov.com, bankofamericaa.com).
Domains can be used as an attack vector in classic phishing or spear phishing campaign aimed at your employees.
This tool allows you to monitor your domain, brand, product names… (detection of domain squatting)
By detecting suspicious domains early, you can proactively act on attacks and thus protect your business interests.
The SMS and/or e-mail HTTPCS alerts are sent in real time (unlimited number of recipients).
API integration
The HTTPCS REST API allows the integration of CYBERVIGILANCE into your runs and tools (Jira, Splunk, ServiceNow…) allowing you to deal with each incident very fast while mobilizing minimal staff.
HTTPCS CYBERVIGILANCE helps you in the incident management prioritization. At a glance, you can assess the criticality of the information.
Technical and Account manager support included
A dedicated Account Manager, assisted with a security experts teams, is in charge of your project. We support you through the onboarding and customization of the product.
In tune with you, we offer constantly relevant solutions to meet your needs, whereas it is via existing options or customized developments.
They trust us
Ziwit (HTTPCS) has the VISA
The PASSI qualification is a security VISA issued by the ANSSI (National Agency for the Security of Information Systems). This certificate issued by ANSSI bears witness to our skills and expertise as auditors, but also to the attention we pay to protecting the integrity of the confidential information to which we may have access during our services to our customers.
Ziwit (HTTPCS) holds the label
Ziwit (HTTPCS) expert in digital security, guarantees technical expertise as well as quality advice to prevent acts of cyber-surveillance and secure your IT installations and your websites.
As an ExpertCyber certified service provider, Ziwit (HTTPCS) is committed to respecting its charter of commitments.Ziwit (HTTPCS) holds the label
The France Cybersecurity label offers the guarantee that the labeled products, solutions and services are designed, developed and operated in France, by a dynamic and innovative industrial sector recognized by the market. It is therefore a mark of excellence for companies.
Ziwit (HTTPCS) holds the label Qualiopi
QUALIOPI is the unique quality certification mark for training organizations. It has been mandatory since January 1, 2022. ZIWIT fully complies with the 32 new indicators in the national quality reference framework, organized around 7 quality criteria. Our training courses can therefore be referenced by accredited organizations and are eligible for funding.
Ziwit (HTTPCS) is part of the national systemcyber malicious
mission is to support victims of cyberattacks through its cybersecurity solutions and tools.
As a service provider listed on the french government platform Cyber Malicious, Ziwit (HTTPCS) is committed to respecting its charter of commitments.Our C)PTE certified cybersecurity experts (CERTIFIED Penetration Testing Engineer)
Developed on the basis of the US Force One methodology, and accredited by both the NSA and the FBI, this certification allows us to explore all the existing technical and non-technical means of accessing an information system in an illicit way. Our pentesters are trained in the art of ethical hacking and the latest techniques in penetration testing, with the aim of recognizing each key element: Information gathering, scanning, enumeration, exploitation and reporting.
Our CEH certified cybersecurity experts (Certified Ethical Hacker)
Our pentesters are experienced in vulnerability research. They have the internationally recognized CEH certification to guarantee you a qualified and ethical technical auditor.
Ziwit is certified OSCP (Offensive Security Certified Professional)
OSCP is an ethical hacking certification offered by Offensive Security (or OffSec) that teaches penetration testing methodologies and the use of the tools included with the Kali Linux distribution. The OSCP is a hands-on penetration testing certification, requiring holders to successfully attack and penetrate various live machines in a safe lab environment.
Ziwit is certified OSCP (Practical Network Penetration Tester)
Delivered by TCM Security, the PNPT certification is a unique ethical hacking exam that evaluates a pentester's ability to perform a professional level network penetration test and its potential to perform open source research (OSINT) to gather information on how to properly attack that network. Our pentesters know how to make the most of their Active Directory exploitation skills to perform A/V and egress bypasses, lateral and vertical network movements, and ultimately compromise the domain controller under investigation.
Ziwit (HTTPCS) holds the Cyber Essentials certification
Cyber Essentials is a certification supported by the British government (United Kingdom) to help organizations ensure operational security against cyber attacks.
Ziwit holds the IASME GDPR certification
Issued by the IASME consortium and supported by the UK Government, "IASME GDPR" reinforces Cyber Essential by validating Ziwit's GDPR skills, and its ability to comply with its requirements. IASME GDPR certification is proof that ZIWIT has taken enhanced measures to protect your business and your data from cyber-attacks on the Internet.
Ziwit (HTTPCS) holds the Cybersecurity Made In Europe certification
The "Cybersecurity made in Europe" certification is designed to promote European cybersecurity companies and increase their visibility on the European and global market. The certification raises awareness of the strategic value of cybersecurity companies originating in Europe and developing their activity on the basis of European values of trust.
Ziwit (HTTPCS) is a member (Alliance for digital trust)
ACN is a group of companies that award services, solutions and technologies that mitigate risk and therefore increase trust.
Ziwit (HTTPCS) is an associated memberCampus Cyber
Campus Cyber will be a French hub of cybersecurity by 2022 that will bring together the main national and international players in the field.
Full
Managed Services
Our SaaS HTTPCS solutions can be fully managed so you can benefit from the expertise of product engineers to optimize your vulnerability management.
Contact usREAL TIME MAP
The interactive HTTPCS map allows you to visualize, in real time, cyberattacks worldwide. HTTPCS Cyber Vigilance alerts you when a threat that could affect you is found.
NOTHING TO INSTALL
Your user dashboard can be accessed directly from your user account at www.httpcs.com. No installation is required on your server. Create an HTTPCS account et login to your user dashboard.
The support of your cybervigilance policy benefits from the expertise of a dedicated Account Manager, your single contact available by email and phone.
Cyber Threat Intelligence (or CTI) is a concept at the heart of the HTTPCS CyberVigilance solution. This discipline aims to collect and classify information related to cyber threats.
Cyber Threat Intelligence collects its data from various places including Open Source (OSINT), social media and networks (SOCMINT), commercial and community data, human data (HUMINT) and finally information sourced from the Deep Web and Dark Web (Dark Web Monitoring).
Frequently asked questions about Cyber Vigilance
What is Cyber Vigilance?
Being Cyber Vigilant or practicing cyber vigilance, is to adopt simple reflexes, advocated by regulatory bodies to protect your business effectively against cyber threats. HTTPCS Cyber Vigilance helps businesses anticipate cyberattacks by maintaining a constant cyber watch.
Who should use HTTPCS Cyber Vigilance ?
HTTPCS Cyber Vigilance is aimed at all companies, whatever their size, who want to be warned before their infrastructure is attacked and their data hacked.
If you find hacked data, it's already too late, right?
HTTPCS Cyber Vigilance scans the web and the deep web in order to gather a maximum of information on what hackers say. When they quote you or say they have stolen data, that does not mean that they have already exploited them! This is exactly the right time to react quickly and get all passwords changed, for example, before hackers have a chance to act.
How can HTTPCS Cyber Vigilance scan the deep web?
HTTPCS has deployed robots, called Virtual Agents, on the web and deep web: they navigate and scan this parallel network in search of sensitive or even critical information.
How does the 14-day HTTPCS free trial work?
The 14-day free version of HTTPCS is available without obligation. This version allows you to discover the console and obtain an overview of the solution in its BASIC formula.
Can I add a site I don't own?
The use of HTTPCS is subject to prior verification. Only the owner or manager of the website is authorized to add it. This procedure can be carried out: by telephone, by transferring a witness file, or by signed written certificate (for consultants, web agencies or Managed Service Providers for example).
How does HTTPCS CyberVigilance work?
HTTPCS CyberVigilance can detect wether information about you or your company has been leaked. It can also passively analyze whether keywords such as your domain name are at the heart of a discussion on the Dark Web. It can also be used to check wether your site is subject to domain or typo squatting.
What types of alerts will I receive and can I choose them?
There are different types of notification in HTTPCS CyberVigilance. You can choose which of the following types of notification you would like to receive : events linked to keywords, events related to the domain, email-related events and events related to Domain Squatting
Where does the bot look for leaked data?
The HTTPCS CyberVigilance solution is based on the development of robots capable of analyzing hundreds of thousands of sources and targets, their playgrounds being the Web, the Deep Web, the Dark Web. They also monitor social networks (SOCMINT).
Can I use it as part of a Security Operations Center?
HTTPCS Cybervigilance helps SOCs to better understand their company's specific context and threats, thanks to the domain name and keyword event system.