Overview
Kartos Corporate Threat Watchbots
Kartos, a cyber surveillance intelligence platform designed for brand protection to fight against phishing, discover leaked credentials and analyze 3rd-party risk compliance and social engineering.
Kartos Corporate Threat Watchbots
Enthec Threat Watchbots Platform. We Already Know.
Kartos is an automated Extended Threat Intelligence (XTI) platform that provides companies with information that cybercriminals have about them in their reconnaissance stage when preparing an attack. Conceived from an outside-in hacker strategy approach, it's in an ongoing R&D process to incorporate categories and capabilities ahead of the evolution of cyberattacks.
- AI layer that allows operation 100% automated without intervention in any part of the process.
- Strictly non-intrusive tool. The research is conducted on the Internet, the Deep Web and the Dark Web, and does not penetrate or attack the IT perimeter so the operation and the information obtained strictly comply with the limits imposed by the legislation.
- Only platform that analyzes conversations on social networks from the perspective of detecting threats and attacks beyond that relating to reputation and branding.
- Continuous operation 365x24x7, allowing you to detect new information leaks practically in real time.
- Maximum ease of use. No complex configuration is required. Simply enter the domain in the platform and it works autonomously without configuring search parameters or other criteria for locating information.
- Automated, objective, and continuous monitoring of risks caused by 3rd-parties belonging to the External Attack Surface of the organization.
Kartos platform capabilities:
- EASM (External Attack Surface Management)
- DRPS (Digital Risk Protection Services)
- SRS (Security Rating Services)
- TPRA/TPRM (Third-Party Risk Assessment/Management)
Kartos' XTI Watchbots are expertly trained to collect all company's data through non-intrusive means. Its advanced Data Analytics capabilities help determine the security score of organizations and provide clear guidelines to raise it to the maximum level. There is no human intervention in the configuration, search, analysis, categorization, and presentation of information. Kartos employs a powerful artificial intelligence engine that guarantees confidentiality and allows continuous, real-time detection of incidents and activation of alerts.
It classifies threats into 9 critical categories to ensure comprehensive protection: Network, DNS Health / Phishing, Patch Management, IP Reputation, Web Security, Email Security, Document Leaks, Credential Leaks and Social Networks.
Main features:
- External Vulnerability Scanning: Identifies and evaluates vulnerabilities in an organization's public-facing systems, networks, and applications that are accessible from outside the internal network. Focuses on uncovering weaknesses that attackers might exploit remotely. Includes publicly accessible assets like websites, web applications, mail servers, cloud services, DNS servers, VPN gateways, and IoT devices exposed to the internet. Identifies misconfigurations, outdated software, open ports, weak encryption, and vulnerabilities in public-facing services.
- Detection of Leaked Data and Credentials: Locates all leaked and exposed information about organizations on the surface web, dark web and dark net which could be exploited by cybercriminals or anyone with malicious intent, helping them take proactive measures to secure their data.
- Detection of Information Leak Points: Identifies security gaps that cause information leaks, enabling organizations to take actions to improve defense systems and protect against possible attacks.
- Supplier Evaluation: Enables the evaluation of an organization suppliers' cybersecurity levels before starting and throughout the commercial relationship. Automated and real-time detection of vulnerabilities associated with suppliers ensures continuous protection.
- Brand Protection: Offers a unique approach in the market that detects conversations related to hacktivism, fraud, phishing, fake news campaigns, and other threats. It identifies discussions that may indicate an attack in preparation, ensuring proactive defense.
No installation is required, simply enter the domain in the platform and it works autonomously without a need to configure search parameters or other criteria for locating information. Dashboards are SaaS-hosted with a highly user-friendly interface and have a multitenant architecture. An API also allows the integration of Kartos with most SIEMs or other existing security solutions and dashboards.
Kartos' licensing by domain that includes all subdomains and IP addresses allows flexibility and scalability when monitoring the risk exposure of organizations and their 3rd-party suppliers and partners.
A TakeDown service is also available that will remove content from the internet that could pose damage or risk to organizations, based on the discoveries detected by Kartos. It helps find fake websites operating fraudulently, which use brand impersonation to carry out scam, fraud or phishing actions, and remove content from impersonation profiles on social networks using fake profiles of brands or people.
Highlights
- EASM (External Attack Surface Management): Detection of corporate assets and vulnerabilities about systems, cloud services, and applications that are available and visible in the public domain to any cybercriminal. - Threat hunting - Net - CVEs - Locating filtered and exposed databases - Locating leaked and exposed corporate information - Patch management - IP reputation - Web security
- DRPS (Digital Risk Protection Services): Detection of contextual information about attack agents, tactics and processes to carry out malicious activities and removal of malicious activities. - Social Media Intelligence: Telegram, Facebook, X, LinkedIn, Instagram - Tracking of social networks for accounts containing cloned or similar corporate identity elements - Analysis of detected profiles - Issuance of real-time alerts - Continuous monitoring - Takedown service
- TPRA/TPRM (Third-Party Risk Assessment/Management): Help secure organizations against threats related to 3rd-parties by providing real-time security status updates for their suppliers and partners, continuously and in real-time. - Real-time monitoring of value chain risk - Non-intrusive, no permission needed - Objective data - Complement traditional valuation tests such as pen testing or due diligence for M&As - 3rd-party security scoring - 3rd-party compliance
Details
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
---|---|---|
Kartos Full Annual License - 10 Users | AI-based, fully automated Threat Intelligence Platform that offers continuous and real-time information. You can use this information to stay one step ahead of cybercriminals before they launch attacks. The platform combines several services into one solution, including External Attack Surface Management, Data Risk Protection Services, Brand Protection, and VIP Protection Services. | $95,000.00 |
Kartos TPRM Scoring Annual License - 10 Users - Pack 50 Licenses | AI-based and fully automated threat intelligence solution offering continuous, real-time risk assessment information monitoring. You can use this information to guarantee that your third parties comply with the company's cybersecurity requirements. This license integrates multiple features into one platform, including External Attack Surface Management, Data Risk Assessment, and Leaked Data Monitoring. Pricing is available for a pack of 50 domains. | $45,000.00 |
Vendor refund policy
No Refund Policy
Thank you for choosing Kartos. All purchases of Kartos on AWS Marketplace are final. We do not offer refunds, credits, or prorated billing for cancellations or unused services. Please evaluate the product using a free trial version to ensure it meets your needs before purchasing. In rare cases of technical issues caused by Kartos, we may, at our sole discretion, issue a refund. For assistance, contact us at support@enthec.com .
By purchasing, you agree to this policy.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
To contact our support team, please send an email to: support@enthec.com .
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.