- Instant cyber risk score generated under 60 seconds
- 11 risk categories and 100+ control items
- User interface or API based and fully automated
- Perfect for cyber insurance, M&A and suppliers
- Available with a volume license
The Rapid Cyber Risk Scorecard evaluates a company in ten security-related categories and one informational category, as shown below. Each category provides specific information about an aspect of a firm’s cyber security posture. The security-related categories are divided into four main groups:
(1) Safeguard – Patch Management, Website & Application Security
(2) Resiliency – DNS Health, Email Security
(3) Privacy – Leaked Credentials, Information Disclosure, Fraudulent Domains
(4) Reputation – Brand Monitoring, Web Ranking, IP/Domain Reputation
Rapid Cyber Risk Scorecard evaluates a company in many different categories. Each category provides specific information about an aspect of a firm’s cyber security posture.
We collect details related to the version number of your systems and software from internet-wide scanners like Censys, Shodan, Zoomeye etc. These version numbers are converted into the corresponding common platform enumeration number (CPE-ID) and are correlated with NIST NVD and MITRE CVSS databases to detect and approximate any unmitigated known vulnerabilities.
e generate DNS health report from 40+ control items which are collected from online services like IntoDNS, Robtex, Netcraft and HackerTarget. Since DNS queries are recursive, it is almost impossible to detect a hacker footprints from the DNS servers.
Asset reputation score is based on the number of IPs or domains are blacklisted or they are used for sophisticated APT attacks. The reputation feeds are collected from VirusTotal, Cymon, Firehol, BlackList DNS servers, etc.
Attack surface is the technical analysis of open critical ports, out-of-date services, application weaknesses, SSL/TLS strength and any misconfigurations. This information is gathered from Censys & Shodan database and service / application versions are correlated with Passive Vulnerability Scan results.
Cisco, Alexa and Majestic track web sites and rank them according to popularity, back-links, references, etc. This subcategory shows Alexa and Majestic trends, Google Page insight speed test results as well as Web Content Accessibility Guidelines (WCAG) 2.0 parsing compliance findings.
We collect vulnerabilities related to potential email servers and SMTP misconfigurations like open relay, unauthenticated logins, restricted relay, SMTP ‘Verify’ vulnerabilities from the online services like MxToolbox and eMailSecurityGrader.
There are more than 5 billion hacked email / password available on the internet and underground forums. This section shows the leaked or hacked emails & passwords.
Fraudulent Domains and subdomains are extracted from the domain registration database. The registered domains database holds more than 300M records.
Digital Footprint is determined by open ports, services and application banners. This information is gathered from NormShield crawlers, Censys, VirusTotal, Robtext, Alexa, Shodan etc.
Company employees may disclose Local IPs, email addresses, version numbers, whois privacy records or even misconfigure a service in a way that it may expose sensitive information to the internet.
Brand monitoring is a business analytics process concerned with monitoring various channels on the web or media in order to gain insight about the company, brand, and anything explicitly connected to the cyber space.
Our grading methodology is based on Cyber Threat Susceptibility Assessment (TSA). TSA is a methodology for evaluating the susceptibility of a system to cyber-attack developed by MITRE. TSA quantitatively assesses a system’s [in]ability to resist cyber-attack over a range of cataloged attack Tactics, Techniques, and Procedures (TTPs).
NormShield has analyzed data in different risk categories from 1,000,000 servers for hundreds of companies and calculated letter grades. For example, a grade of ‘B’ indicates an organization has opened the door to a sophisticated hacker, a grade of ‘F’ means hackers of all types are being invited in. The overall grade of cyber risk scorecard shows “how easy is it to hack the corresponding environment?”.
It would take world-class, state-sponsored hackers to exploit
Skills of persistent, highly experienced hackers are required
Average to professional hackers are capable of exploiting
Beginner hacker practicing their skills
Script kiddies can hack (i.e. 6th Graders)