"CounterCraft was the best way to quickly and efficiently evaluate the level of external reconnaissance focused on us"
91% of cyber-attacks begin with a spear phishing attack. (****)
Spear phishing is a targeted type of attack that, unlike general phishing attacks, does not rely on a spam campaign. Instead, the victims are carefully selected.
See how our clients obtains a wealth of information about the attacker to mitigate their success.
LEARN MORE1hr and 58 min is the average time it takes for an intruder to begin to move laterally. (**)
Malicious lateral movement can be very difficult to detect because it appears as normal network traffic.
See how our clients identify lateral movement of attackers in real time.
LEARN MOREData breaches can cost up to $1.14 billion for large enterprises. (***)
Threat Intel allows you to prepare for cyber attacks and mitigate this threat. But, traditional threat intel is too generic and not actionable enough to be useful.
See how our clients get real time actionable threat intelligence before the breach occurs, and configure defensive systems to resist the attack, in seconds.
LEARN MOREA third of data breaches in the 2020 Verizon Data Breach Investigations Report involved internal actors.
Only 30% of insider threat data breaches are discovered within months, whilst 40% of them aren’t detected in years. (*)
See how our clients use deception to reduce Insider threat detection time to minutes.
LEARN MOREReferences:
(*) EY. Managing Insider Threat. A Holistic Approach to dealing with risks from within
(**) Crowdstrike. What is Network Lateral Movement?. September, 2019.
(***) Housingwire. Article by Ben Lane. February, 2020.
(****) Cofense. Phishing Response Trends. 2017.