“THE MOST COMPREHENSIVE AND
ACCURATE TECHNICAL INTELLIGENCE”
The NormShield Technical Report provides letter grades and defensible data details behind 20 risk categories. The non-intrusive report does not touch an organization’s systems or network assets, passively evaluating third-party vendors and cyber insurance subscribers. NormShield follows and applies commonly-used frameworks developed by the MITRE Corporation for scoring software weaknesses in a consistent, flexible, and transparent manner while converting highly technical terms into business language for executives.
We collect details related to the version number of your systems and software from internet-wide scanners like Censys, Shodan, Zoomeye etc. These version numbers are converted into the corresponding common platform enumeration number (CPE-ID) and are correlated with NIST NVD and MITRE CVSS databases to detect and approximate any unmitigated known vulnerabilities.
We generate a DNS health report from 40+ control items collected from online services like IntoDNS, Robtex, Netcraft, and HackerTarget. Since DNS queries are recursive, it is almost impossible to detect hacker footprints from DNS servers.
SSL/TLS configurations and vulnerabilities are provided by several third-party online services. The results come from various online SSL grading services, including Qualys SSL Labs scanner, HTBridge, and Mozilla Website Observatory.
An Asset reputation score is based on the number of IPs or domains that are blacklisted or used for sophisticated APT attacks. The reputation feeds are collected from VirusTotal, Cymon, Firehol, BlackList DNS servers, and more.
Hackers publicize their targets in underground forums or the dark web. NormShield collects information from hundreds of dark forums, criminal sites and hacktivist sites, and filters the results for the corresponding company.
Fraudulent or pirate mobile or desktop applications are used to hack/phish employee or customer data. Possible fraudulent or pirate mobile/desktop apps on Google Play, App Store, and pirate app stores are provided.
Company employees may disclose local IPs, email addresses, version numbers, whois privacy records or even misconfigure a service in a way that may expose sensitive information to the internet.
Brand monitoring is a business analytics process that monitors various channels on the web or media to gain insight about the company, brand, and anything explicitly connected to the cyberspace.
This section shows the result of 15 different potential DDoS checks and detects any potential DDoS amplification endpoints. The data is collected from non-intrusive scanners and internet-wide scanners.
A content delivery network (CDN) is a large distributed system of servers deployed in multiple data centers across the Internet. Companies use CDNs for online libraries like JQuery. This section analyzes the CDN content to detect possible vulnerabilities
We collect the contents of web applications from various Internet-wide scanners and analyze them for application-level weaknesses, such as Cross Site Request Forgery, Cross Content Mixing, and Plain Text Transmission of Sensitive Information. The results are correlated with the MITRE CWE database to detect the severity level of each finding.
We collect vulnerabilities related to potential email servers and SMTP misconfigurations like open relay, unauthenticated logins, restricted relay, and SMTP ‘Verify’ vulnerabilities from online services like MxToolbox and eMailSecurityGrader.
There are more than five billion hacked emails/passwords available on the Internet and underground forums. This section shows the leaked or hacked emails and passwords.
Hackers publicize their targets or even victims on social networking sites to motivate other hackers to attack the same target. The results are filtered from billions of social media posts.
Fraudulent domains and subdomains are extracted from the domain registration database. The registered domains’ database holds more than 300M records.
A digital footprint is determined by open ports, services, and application banners. This information is gathered from NormShield crawlers, Censys, VirusTotal, Robtext, Alexa, Shodan, and others.
Attack surface is the technical analysis of open critical ports, out-of-date services, application weaknesses, SSL/TLS strength, and any misconfigurations. This information is gathered from Censys and Shodan databases and service/application versions are correlated with Passive Vulnerability Scan results.
This section analyzes network-level problems and detects any critical ports, unprotected network devices, misconfigured firewalls, and service endpoints.
Cisco, Alexa and Majestic track web sites and rank them according to popularity, back-links, and references. This subcategory shows Alexa and Majestic trends, Google Page insight speed test results, as well as Web Content Accessibility Guidelines (WCAG) 2.0 parsing compliance findings.
This is a special analysis of a company’s main website. We collect findings related to your SSL/TLS strength, patch management, application security, web ranking and brand monitoring.
NormShield® provides a graphical distribution in the form of a heat map to determine the status and severity of each finding. Our platform leverages MITRE and NIST to further confirm the criticality of each threat.
NormShield’s Strategy Report shares feedback for executives to understand their cyber risk posture and scale return on cybersecurity investments. The report provides simple steps to help remediate issues and mitigate cyber risks with suppliers and partners.
NormShield’s ticketing system provides an automated workflow to audit and control problem remediation. With the click of a button, you can share specific findings with any contact. This feature provides a paper trail of problem areas, and the status of their remediation. Users can submit tickets through NormShield’s Ticketing System, or through ServiceNow.
Audit and control problem remediation