Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

    Listing Thumbnail

    Kartos Corporate Threat Watchbots

     Info
    Sold by: Enthec 
    Kartos is a non-intrusive cybersecurity tool that, in real-time, captures all the information that is publicly available on the Internet, the Deep Web, and the Dark Web, and hands it over to organizations so they can come up with a defensive strategy before cyber criminals use it to execute an attack.
    Listing Thumbnail

    Kartos Corporate Threat Watchbots

     Info
    Sold by: Enthec 

    Overview

    Play video

    Kartos is an automated Extended Threat Intelligence (XTI) platform that provides companies with information that cybercriminals have about them in their reconnaissance stage when preparing an attack. Conceived from an outside-in hacker strategy approach, it's in an ongoing R&D process to incorporate categories and capabilities ahead of the evolution of cyberattacks.

    • AI layer that allows operation 100% automated without intervention in any part of the process.
    • Strictly non-intrusive tool. The research is conducted on the Internet, the Deep Web and the Dark Web, and does not penetrate or attack the IT perimeter so the operation and the information obtained strictly comply with the limits imposed by the legislation.
    • Only platform that analyzes conversations on social networks from the perspective of detecting threats and attacks beyond that relating to reputation and branding.
    • Continuous operation 365x24x7, allowing you to detect new information leaks practically in real time.
    • Maximum ease of use. No complex configuration is required. Simply enter the domain in the platform and it works autonomously without configuring search parameters or other criteria for locating information.
    • Automated, objective, and continuous monitoring of risks caused by 3rd-parties belonging to the External Attack Surface of the organization.

    Kartos platform capabilities:

    • EASM (External Attack Surface Management)
    • DRPS (Digital Risk Protection Services)
    • SRS (Security Rating Services)
    • TPRA/TPRM (Third-Party Risk Assessment/Management)

    Kartos' XTI Watchbots are expertly trained to collect all company's data through non-intrusive means. Its advanced Data Analytics capabilities help determine the security score of organizations and provide clear guidelines to raise it to the maximum level. There is no human intervention in the configuration, search, analysis, categorization, and presentation of information. Kartos employs a powerful artificial intelligence engine that guarantees confidentiality and allows continuous, real-time detection of incidents and activation of alerts.

    It classifies threats into 9 critical categories to ensure comprehensive protection: Network, DNS Health / Phishing, Patch Management, IP Reputation, Web Security, Email Security, Document Leaks, Credential Leaks and Social Networks.

    Main features:

    • External Vulnerability Scanning: Identifies and evaluates vulnerabilities in an organization's public-facing systems, networks, and applications that are accessible from outside the internal network. Focuses on uncovering weaknesses that attackers might exploit remotely. Includes publicly accessible assets like websites, web applications, mail servers, cloud services, DNS servers, VPN gateways, and IoT devices exposed to the internet. Identifies misconfigurations, outdated software, open ports, weak encryption, and vulnerabilities in public-facing services.
    • Detection of Leaked Data and Credentials: Locates all leaked and exposed information about organizations on the surface web, dark web and dark net which could be exploited by cybercriminals or anyone with malicious intent, helping them take proactive measures to secure their data.
    • Detection of Information Leak Points: Identifies security gaps that cause information leaks, enabling organizations to take actions to improve defense systems and protect against possible attacks.
    • Supplier Evaluation: Enables the evaluation of an organization suppliers' cybersecurity levels before starting and throughout the commercial relationship. Automated and real-time detection of vulnerabilities associated with suppliers ensures continuous protection.
    • Brand Protection: Offers a unique approach in the market that detects conversations related to hacktivism, fraud, phishing, fake news campaigns, and other threats. It identifies discussions that may indicate an attack in preparation, ensuring proactive defense.

    No installation is required, simply enter the domain in the platform and it works autonomously without a need to configure search parameters or other criteria for locating information. Dashboards are SaaS-hosted with a highly user-friendly interface and have a multitenant architecture. An API also allows the integration of Kartos with most SIEMs or other existing security solutions and dashboards.

    Kartos' licensing by domain that includes all subdomains and IP addresses allows flexibility and scalability when monitoring the risk exposure of organizations and their 3rd-party suppliers and partners.

    A TakeDown service is also available that will remove content from the internet that could pose damage or risk to organizations, based on the discoveries detected by Kartos. It helps find fake websites operating fraudulently, which use brand impersonation to carry out scam, fraud or phishing actions, and remove content from impersonation profiles on social networks using fake profiles of brands or people.

    Highlights

    • EASM (External Attack Surface Management): Detection of corporate assets and vulnerabilities about systems, cloud services, and applications that are available and visible in the public domain to any cybercriminal. - Threat hunting - Net - CVEs - Locating filtered and exposed databases - Locating leaked and exposed corporate information - Patch management - IP reputation - Web security
    • DRPS (Digital Risk Protection Services): Detection of contextual information about attack agents, tactics and processes to carry out malicious activities and removal of malicious activities. - Social Media Intelligence: Telegram, Facebook, X, LinkedIn, Instagram - Tracking of social networks for accounts containing cloned or similar corporate identity elements - Analysis of detected profiles - Issuance of real-time alerts - Continuous monitoring - Takedown service
    • TPRA/TPRM (Third-Party Risk Assessment/Management): Help secure organizations against threats related to 3rd-parties by providing real-time security status updates for their suppliers and partners, continuously and in real-time. - Real-time monitoring of value chain risk - Non-intrusive, no permission needed - Objective data - Complement traditional valuation tests such as pen testing or due diligence for M&As - 3rd-party security scoring - 3rd-party compliance

    Details

    Sold by

    Delivery method

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Kartos Corporate Threat Watchbots

     Info
    Pricing is based on contract duration. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    Kartos Full Annual License - 10 Users
    AI-based, fully automated Threat Intelligence Platform that offers continuous and real-time information. You can use this information to stay one step ahead of cybercriminals before they launch attacks. The platform combines several services into one solution, including External Attack Surface Management, Data Risk Protection Services, Brand Protection, and VIP Protection Services.
    $95,000.00
    Kartos TPRM Scoring Annual License - 10 Users - Pack 50 Licenses
    AI-based and fully automated threat intelligence solution offering continuous, real-time risk assessment information monitoring. You can use this information to guarantee that your third parties comply with the company's cybersecurity requirements. This license integrates multiple features into one platform, including External Attack Surface Management, Data Risk Assessment, and Leaked Data Monitoring. Pricing is available for a pack of 50 domains.
    $45,000.00

    Vendor refund policy

    No Refund Policy

    Thank you for choosing Kartos. All purchases of Kartos on AWS Marketplace are final. We do not offer refunds, credits, or prorated billing for cancellations or unused services. Please evaluate the product using a free trial version to ensure it meets your needs before purchasing. In rare cases of technical issues caused by Kartos, we may, at our sole discretion, issue a refund. For assistance, contact us at support@enthec.com .

    By purchasing, you agree to this policy.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    To contact our support team, please send an email to: support@enthec.com .

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    No customer reviews yet
    Be the first to write a review for this product.