Cipher uses a combination of market leading technologies and proprietary tools to discover and gather all relevant information. We embrace a significant diversity of sources, from the three corners of the web (surface web, deep web, dark web), Open-Source Intelligence (OSINT) and social networks, to some Cipher internally built sources based on various systems such as honeypots or sinkholes.
Cipher undertakes continuous monitoring based on topics, subjects or keywords you have selected. The service continually scans to detect data breaches that are directly or indirectly related to your scope of operation. A proper identification of such breaches will help you act earlier and faster. It will also allow you to learn valuable lessons to improve your security posture and also – most importantly – contain and react to any negative data breach impacts.