Brand Protection
The Brand Protection (BP) module uses proprietary algorithms to detect common techniques used by cyber threat actors, such as web-based phishing attacks, typo-squatting, defacements, rogue apps, credential leaks, and brand impersonation in social media. You can use the Brand Protection module to detect activity early and take action, such as web site or application takedown, to protect your brand value, trust, integrity, and reputation.
The Brand Protection module contains the following pages:
|
Dashboard |
Displays a summary of typo-squatting domains, flash alerts and reports, rogue apps, phishing campaigns, and takedown requests. See Dashboard. |
|
Domain Threats
|
Displays a list of typo-squatted domains and phishing URLs. You can initiate domain takedown or the suspension of monitoring. See Domain Threats. |
|
Social Media Threats |
Displays all discovered profiles that may be impersonating your organization's social media pages. You can filter profiles, initiate profile takedown, and export a Microsoft Excel file containing profile details. See Social Media Threats. |
|
Rogue Mobile Apps |
Displays all discovered apps that may be impersonating your organization's assets. You can filter apps, assign status, initiate app takedown, and export a Microsoft Excel file with app details. See Rogue Mobile Apps. |
|
Executive Monitoring |
Displays threats targeted at high-profile individuals of your organization. You can filter threats and add executive profiles for monitoring. See Executive Monitoring. |
|
Code Repo Exposure |
Displays a list of attributes exposed in code repositories. See Code Repo Exposure. |
|
Open Bucket Exposure |
Displays a list of files exposed in open buckets. See Open Bucket Exposure. |
|
Take Down |
Displays a list of takedown request tickets and their current status. See Take Down. |
|
|
Brand Protection also includes Logo Monitoring feature which provides an additional method for identifying your brand on known phishing or malicious pages. This feature enhances the accuracy of identifying cases involving brand impersonation. FortiRecon logo monitoring feature performs the following tasks:
|