Fortinet white logo
Fortinet white logo

User Guide

Brand Protection

Brand Protection

The Brand Protection (BP) module uses proprietary algorithms to detect common techniques used by cyber threat actors, such as web-based phishing attacks, typo-squatting, defacements, rogue apps, credential leaks, and brand impersonation in social media. You can use the Brand Protection module to detect activity early and take action, such as web site or application takedown, to protect your brand value, trust, integrity, and reputation.

The Brand Protection module contains the following pages:

Dashboard

Displays a summary of typo-squatting domains, flash alerts and reports, rogue apps, phishing campaigns, and takedown requests. See Dashboard.

Domain Threats

Displays a list of typo-squatted domains and phishing URLs. You can initiate domain takedown or the suspension of monitoring. See Domain Threats.

Social Media Threats

Displays all discovered profiles that may be impersonating your organization's social media pages. You can filter profiles, initiate profile takedown, and export a Microsoft Excel file containing profile details. See Social Media Threats.

Rogue Mobile Apps

Displays all discovered apps that may be impersonating your organization's assets. You can filter apps, assign status, initiate app takedown, and export a Microsoft Excel file with app details. See Rogue Mobile Apps.

VIP Monitoring

Displays threats targeted at high-profile individuals of your organization. You can filter threats and add VIP profiles for monitoring. See VIP Monitoring.

Code Repo Exposure

Displays a list of attributes exposed in code repositories. See Code Repo Exposure.

Open Bucket Exposure

Displays a list of files exposed in open buckets. See Open Bucket Exposure.

Take Down

Displays a list of takedown request tickets and their current status. See Take Down.

Brand Protection

Brand Protection

The Brand Protection (BP) module uses proprietary algorithms to detect common techniques used by cyber threat actors, such as web-based phishing attacks, typo-squatting, defacements, rogue apps, credential leaks, and brand impersonation in social media. You can use the Brand Protection module to detect activity early and take action, such as web site or application takedown, to protect your brand value, trust, integrity, and reputation.

The Brand Protection module contains the following pages:

Dashboard

Displays a summary of typo-squatting domains, flash alerts and reports, rogue apps, phishing campaigns, and takedown requests. See Dashboard.

Domain Threats

Displays a list of typo-squatted domains and phishing URLs. You can initiate domain takedown or the suspension of monitoring. See Domain Threats.

Social Media Threats

Displays all discovered profiles that may be impersonating your organization's social media pages. You can filter profiles, initiate profile takedown, and export a Microsoft Excel file containing profile details. See Social Media Threats.

Rogue Mobile Apps

Displays all discovered apps that may be impersonating your organization's assets. You can filter apps, assign status, initiate app takedown, and export a Microsoft Excel file with app details. See Rogue Mobile Apps.

VIP Monitoring

Displays threats targeted at high-profile individuals of your organization. You can filter threats and add VIP profiles for monitoring. See VIP Monitoring.

Code Repo Exposure

Displays a list of attributes exposed in code repositories. See Code Repo Exposure.

Open Bucket Exposure

Displays a list of files exposed in open buckets. See Open Bucket Exposure.

Take Down

Displays a list of takedown request tickets and their current status. See Take Down.