Digital Shadows

Materials Hack
Playground for innovative materials powered by Borealis.
8th-10th July – Vienna, Austria
2.5
days Hackathon
3
weeks Incubation
2
winning teams
24K
cash prizes
Digital Shadows

Claim instruction: 

  1. Send us an email to claim@startus.cc from an official Digital Shadows​ email account. The content must be:

    StartUs buddies, 

    Please, allow me to claim rights over Digital Shadows​

    Best regards,
    [your name]

  2. Once sent the email click the Claim Startup button.
  3. Our team will verify the origin account and will grant claim rights over the startup to the user if everything is ok.
Level 39
One Canada Square
London
E14 5AB
United Kingdom
General information: 

Digital Shadows is the cyber threat intelligence company that delivers “beyond the boundary” security for safer digital business.

By applying our award-winning blend of expertise and technology we enable organizations to embrace digital business while protecting themselves from data loss and targeted cyber attack.

We serve clients across the globe and in a range of sectors, including: 

  • pharmaceuticals and biotechnology
  • oil, gas and mining
  • engineering
  • local and central government
  • healthcare
  • national security, intelligence and law enforcement
  • defense and defense industrial base

 

Since our launch in 2011 we have quickly caught the attention of the industry, media and analysts. After receiving innovation awards from SWIFT, Cisco and the Technology Strategy Board we were named a Gartner Cool Vendor for 2013.  We went on to win a place in the FinTech Innovation Lab and were named in The FinTech 50 “most innovative and disruptive brands in financial technology” in Europe for 2014.

 

Backed by venture capital, and with a flair for innovation, unique technology and a talented team, we’re a growing company offering cyber threat intelligence services and are committed to helping our clients exploit social, cloud and mobile technologies whilst keeping their security and reputations intact.

Company information: 
Company type: 
Company
Industry: 
IT - Security
Products and Services: 
Digital Shadows SearchLight™
Product category: 
Cyber Security

Digital Shadows SearchLight™ protects your organization from data loss through the supply chain and targeted cyber attack by hostile groups.  With our award-winning blend of specialist expertise and innovative technology we deliver an up-to-the-minute “beyond the boundary” view of your organization.
Our managed service gives you the awareness and understanding you need to gauge your online exposure and defend against targeted cyber attack.  And with your organization’s reputation and critical assets safeguarded, you can be more confident of implementing a successful digital business strategy. - See more at: http://www.digitalshadows.com/services/digital-shadows-searchlight-/#sth...

VIP Protect
Product category: 
Cyber Security

The widespread take-up of social media means individuals now cast an even greater digital shadow across the Internet.  On-line postings can be aggregated together to reveal a great deal of sensitive personal information, resulting in impersonation, identity theft or even physical harm.  Furthermore, through data breaches and targeted hacking, someone’s non-public information can suddenly become public.  Senior employees are particularly at risk, not just from accidental disclosures by them or people close to them, but also from hostile groups making malicious on-line postings. 

Because of the potential for abuse and harm, potential threats to VIPs must be detected and dealt with as soon as possible through employee data protection and security measures.  However, most suppliers offer a one-off report, restricted to a particular geography and a minimal set of data sources, that provides a snapshot of a person’s online exposure rather than continuous monitoring to detect potentially harmful behavior.

Digital Shadows VIP Protect focuses our monitoring service on the digital shadows cast by high value, or high risk, individuals within your organization.  This includes identifying personal threats, revealing false identities and preventing the exposure of sensitive personal information that could lead to coercion, crime or physical harm.  Through our employee data security and protection services, we monitor over 80 million information sources in 26 languages across the globe including criminal websites and forums where personal information is bought and sold.

With VIP Protect you can better measure and understand how the safety and security of your key employees are compromised by online material and, by taking the right corrective actions, protect them from potentially harmful consequences.

- See more at: http://www.digitalshadows.com/services/vip-protect/#sthash.rmjiNMhG.dpuf

CBEST/STAR Threat Intelligence
Product category: 
Cyber Security

The CBEST and STAR testing regimes, launched by the Bank of England and the Certified Register of Ethical Security Testers (CREST) respectively, aim to help systemically-important financial institutions remain resilient to cyber attack.  They both mimic the actions of cyber attackers intent on stealing, compromising or destroying organizational assets that have financial, operational, intellectual, confidential or reputational value.
Organizations undertaking a CBEST or STAR test must work with a threat intelligence provider who can provide realistic, threat-informed attack scenarios that underpin simulated cyber attacks.  However, many threat intelligence providers deliver little more than elementary facts about commodity threats, with an emphasis on lower-level technical forensics rather than higher-level insights into the attacker, their motivation and their modus operandi. Marketing hype and jargon only serve to complicate matters.
As a leading specialist provider of cyber intelligence services, Digital Shadows has been working with the Bank of England, CREST and a community of security vendors to define a framework for developing the CBEST tests.  We therefore have the capability and experience to provide clients with intelligence of the standard required for CBEST or STAR test purposes.
Our Digital Shadows SearchLight™ facility enables us to identify the technical characteristics of potential attacks, the techniques employed, the attacker’s capabilities and their motivation.  Using these threat profiles we can create threat scenarios that narrate the flow of interaction between the attacker and their target.  We will then undertake a footprinting exercise in which we emulate the attacker and identify the attack surface of people, processes and systems within the target.
Equipped with our intelligence, the client’s security test provider will have the evidential basis for designing and justifying a realistic and successful targeting campaign.  This may be a provider selected by the client or with one of a number of leading security test providers with whom we have established close and efficient working relationships.
As well as laying the foundations for an effective CBEST or STAR test, the intelligence we provide our clients will enable them to more proactively manage an array of new and evolving cyber threats and provide valuable input into risk management and business strategies. - See more at: http://www.digitalshadows.com/services/cbeststar/#sthash.O1qYnMPk.dpuf

Contact:

Login or register to see the contact information!

Address information

Level 39
One Canada Square
London
E14 5AB
United Kingdom
Similar companies
IT - Software Development
Real Estate
Healthcare / Medical Services