SOCRadar Extended Threat Intelligence
SOCRadar provides a unified, cloud-hosted platform designed to enrich your cyber threat intelligence by contextualizing it with data from your attack surface, digital footprint, dark web exposure, and supply chain.
We help security teams see what attackers see by combining External Attack Surface Management, Cyber Threat Intelligence, and Digital Risk Protection into a single, easy-to-use solution. This enables your organization to discover hidden vulnerabilities, detect data leaks, and shut down threats like phishing and brand impersonation before they can harm your business.
By combining these critical security functions, SOCRadar replaces the need for separate, disconnected tools. Our holistic approach offers a streamlined, modular experience, providing a complete, real-time view of your threat landscape to help you stay ahead of attackers.
Learn more
Proton Pass
Proton Pass for Business is a secure, end-to-end encrypted password manager built for teams that prioritize privacy, compliance, and control.
Safely store and share passwords, passkeys, secure notes, aliases, and credit card details with zero-knowledge encryption, ensuring only your organization can access sensitive data. Manage user access with advanced admin controls, activity logs, and enforced password policies, and simplify onboarding and offboarding with secure vault sharing.
Created by the team behind Proton Mail, Proton Pass integrates seamlessly across browsers and devices, offering autofill, password generation, email alias management, and dark web monitoring. With Swiss-based privacy, open-source transparency, and strong end-to-end encryption, Proton Pass for Business helps organizations reduce risk, prevent data breaches, ensure compliance, and boost team productivity without compromising security or user experience.
Learn more
DarkIQ
DarkIQ continuously monitors for pre-attack indicators such as leaked credentials, phishing infrastructure, and dark web chatter, with proprietary dark web traffic monitoring. All alerts are mapped to MITRE ATT&CK, giving teams the context to respond faster and earlier in the kill chain.
The DarkIQ solution includes
‣ Continuous closed-source monitoring for mentions of your organisation, brand, and personnel ‣ Infostealer and credential detection – automatically identifies infostealer-infected devices and exposed credentials
‣ Dark web traffic monitoring of all incoming and outgoing Tor traffic to any IP address, CIDR, or domain on your network
‣ Phishing detection and takedown service – automatically identify fraudulent infrastructure and take action with embedded takedowns
‣ MITRE ATT&CK mapping – all alerts are automatically mapped to relevant MITRE ATTACK techniques and recommended mitigations
‣ Company health dashboard and reporting to demonstrate your team's impact
Learn more