+
+

Related Products

  • ThreatLocker
    478 Ratings
    Visit Website
  • Reflectiz
    13 Ratings
    Visit Website
  • Criminal IP
    12 Ratings
    Visit Website
  • Red Points
    54 Ratings
    Visit Website
  • Safetica
    376 Ratings
    Visit Website
  • A10 Defend Threat Control
    32 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    179 Ratings
    Visit Website
  • TrafficGuard
    89 Ratings
    Visit Website
  • Wiz
    1,051 Ratings
    Visit Website
  • Resolver
    257 Ratings
    Visit Website

About

Learn what a digital risk protection solution is and how it can help you be better prepared by understanding who is targeting you, what they’re after, and how they plan to compromise you. Google Digital Risk Protection delivers a broad digital risk protection solution either via stand-alone self-managed SaaS products or a comprehensive service. Both options give security professionals visibility outside their organization, the ability to identify high-risk attack vectors, malicious orchestration from the deep and dark web, and attack campaigns on the open web.  The Google Digital Risk Protection solution also provides contextual information on threat actors and their tactics, techniques, and procedures to provide a more secure cyber threat profile. Gain visibility into risk factors impacting the extended enterprise and supply chain by mapping your attack surface and monitoring deep and dark web activity.

About

MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. With the creation of ATT&CK, MITRE is fulfilling its mission to solve problems for a safer world — by bringing communities together to develop more effective cybersecurity. ATT&CK is open and available to any person or organization for use at no charge. Adversaries may execute active reconnaissance scans to gather information that can be used during targeting. Active scans are those where the adversary probes victim infrastructure via network traffic, as opposed to other forms of reconnaissance that do not involve direct interaction.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises looking for a solution to increase their security and mitigate digital risk

Audience

Threat intelligence solution for organizations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Google
Founded: 1998
United States
cloud.google.com/security/solutions/digital-risk-protection

Company Information

MITRE ATT&CK
United States
attack.mitre.org

Alternatives

Alternatives

SD Elements

SD Elements

Security Compass

Categories

Categories

Integrations

Amazon CloudWatch
Apache Kafka
BlueCat Edge
Cisco Vulnerability Management
Cloudflare Access
Darktrace
Fortinet SD-WAN
GitHub
Graylog
Netskope
Palo Alto Networks Threat Prevention
Polarity
Sophos Cloud Native Security
Sophos Intercept X Endpoint
Sprocket Security
Sumo Logic
Swimlane
Trend Micro Deep Security
VMware Cloud
WhoisXML API

Integrations

Amazon CloudWatch
Apache Kafka
BlueCat Edge
Cisco Vulnerability Management
Cloudflare Access
Darktrace
Fortinet SD-WAN
GitHub
Graylog
Netskope
Palo Alto Networks Threat Prevention
Polarity
Sophos Cloud Native Security
Sophos Intercept X Endpoint
Sprocket Security
Sumo Logic
Swimlane
Trend Micro Deep Security
VMware Cloud
WhoisXML API
Claim Google Digital Risk Protection and update features and information
Claim Google Digital Risk Protection and update features and information
Claim MITRE ATT&CK and update features and information
Claim MITRE ATT&CK and update features and information