Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 1 October, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Searchlight Security Announces New Automated Reporting Function

Searchlight Security, the dark web intelligence company, has announced a new automated reporting function for their dark web monitoring solution DarkIQ. The new reporting function will help security teams and MSSPs communicate pre-attack intelligence to executives, quickly and efficiently. 

by The Gurus
August 2, 2022
in Featured, News, Security News
blue logo that reads 'searchlight'
Share on FacebookShare on Twitter

Searchlight Security, the dark web intelligence company, has announced a new automated reporting function for their dark web monitoring solution DarkIQ. The new reporting function will help security teams and MSSPs communicate pre-attack intelligence to executives, quickly and efficiently.

The DarkIQ platform is a powerful dark web monitoring solution that utilises the most comprehensive dark web dataset on the market. It is the only dark web monitoring tool that keeps track of web traffic to and from an organisation’s network. It also searches the dark web for mentions of a businesses’ important data assets, such as IP addresses, employee credentials, and network components. This information could be used to detect an imminent attack.

The platform’s new reporting function builds on its existing capabilities by helping analysts to communicate more easily about the dark web intelligence they discover. It also helps educate the wider business on dark web threats.

Eric Milam, EVP product at Searchlight Security explained: “Our mission is to make dark web intelligence as relevant and actionable for businesses as possible and our new reporting function is a huge part of that. Threat intelligence is only powerful if it can be understood and acted on – otherwise it is just noise. Communication is everything.”

“In threat intelligence, the job isn’t done until the report is filed. This is a burden on security teams that we wanted to – and have been able to – alleviate, because every minute less they spend reporting is a minute more they can spend stopping the bad guys. At the same time, they have a better solution to deliver pre-attack intelligence with more clarity so the business can be more proactive in stopping imminent threats.”

The many functions of DarkIQ Reporting include giving enterprise security teams and MSSPs the ability to generate reports with one click, the capability to tailor the reports to the right level of detail for the audience it is reaching, as well as the ability to add and remove reporting fields where necessary.

Other features include the ability to customise designs and resource more effectively, so less time is spent on reporting and more time is spent on protecting the business.

Finally, the new reporting feature demonstrates return on investment (ROI) which can be presented to executives by identifying and solving problems before they become costly crisis’s.

FacebookTweetLinkedIn
ShareTweet
Previous Post

Australian Man Charged With Purported Role in Creation and Sale of Spyware Used by Domestic Violence Perpetrators

Next Post

North Korean Hackers Use Malicious Extensions on Chromium-based Web Browsers to Spy on User Accounts

Recent News

Guide to ransomware and how to detect it

Guide to ransomware and how to detect it

September 28, 2023
software security

Research reveals 80% of applications developed in EMEA contain security flaws

September 27, 2023
Cyber insurance

Half of organisations with cyber insurance implemented additional security measures to qualify for the policy or reduce its cost

September 27, 2023
Fraud and online banking

Akamai Research Finds the Number of Cyberattacks on European Financial Services More Than Doubled in 2023

September 27, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information