In the event of a security incident, our Rapid Response Force is available 24/7.
The Formind VOC meets your challenges in anticipating cyber threats and preventing attacks. Our “Watch, OSINT & CTI” unit offers an approach that enables you to focus on your most critical risks, by combining an understanding of the cyber context and threat actors with supervision of your attack surface (EASM – External Attack Surface Management) and management of your vulnerabilities.
19754
In 2024, 19,750 vulnerabilities were discovered, 10% of which were identified as critical and 20% as high risk. A thorough understanding of the exposure surface, business requirements and cyber threat landscape facilitates the development of a targeted action plan, enabling the most appropriate measures to be prioritized.
ENISA Threat Landscape 2023
The risk of hacking is very real (data theft, encryption, DDoS, etc.), and falling victim to an attack is a catastrophe no company wants to suffer. Attackers are redoubling their efforts and ingenuity to break into an Information System or Critical Infrastructure. Our VOC offer is based on 3 activities addressing these issues.
Our Intelligence activity alerts you to the latest vulnerabilities and new threats, to help you plan, prioritize and apply patches. Customized bulletins (business sector, geography, policy, etc.) on cyber threats and information manipulation are also distributed to meet all your cyber challenges. This activity is aimed at all publics, from management to operational staff, thanks to a strategic, tactical and technical approach.
Our OSINT (Open Source INTelligence) business analyzes your digital footprint on the Internet, the Deep Web and the Dark Web, as well as interactions with your technology partners, service providers and subcontractors.
By integrating a Third-Party Risk Management (TPRM) approach, we assess your attack surface (EASM) and anticipate threats to your business (exposed databases, identity theft, spear-phishing, website defacement, exposure of sensitive services, etc.). A global view of threats, including those posed by third parties, enables us to better protect your company against cyber-attacks.
Our CTI (Cyber Threat Intelligence) activity provides operational support for your SOC security system, offering access to a threat knowledge base (TIP: Threat Intelligence Platform). This database provides indicators of compromise, as well as detection rules (SIGMA, YARA) to enhance your detection of cyber threats and enrich your security incidents. Our Rapid Intervention Force (FIR) also relies on this database to steer its digital investigation approach and gain in efficiency.
Vigilance
– Stay informed about vulnerabilities that affect you.
– Define an appropriate action plan.
– Plan and prioritize your remediation.
– Correct, remedy, detect and investigate.
– Understand new threats (Hacktivism, state-sponsored, …)
– Understand the new threats.
– Adopt a proactive approach to detection.
– Receive personalized newsletters
– Identify information manipulation and misinformation
OSINT
– Supplement your SOC detection with external detection.
– Discover your Shadow IT exposure.
– Identify direct threats to your information system.
– Consider the risks induced by your third parties.
– Control your brands and your data.
– Anticipate targeted attacks.
– Act before you react
CTI
– Decipher threat actors’ tactics, techniques and procedures (TTPs)
– Build a threat knowledge base (TIP)
– Monitor indicators of compromise (IOCs) and attack indicators (IOAs) within your SOC
– Implement a relevant and effective detection strategy.
– Benefit from SIGMA, YARA and SNORT detection rules
Optimal efficiency in vulnerability management requires mapping and understanding the cyber ecosystem. A successful vulnerability management project means having the right information to give value to vulnerabilities. The implementation of a VOC service depends on good organization in terms of vulnerability management.
Over 70% of companies have been compromised via unknown Internet exposure, not or poorly managed by IT teams.
The VOC Formind is designed to see beyond your perimeter firewalls, whether OnPrem or in the Cloud, to help you control this exposure:
An offer built around 3 activities to ensure a clear vision of the threats linked to your company and your business sector.
Our unified portal gives you a centralized view of the 3 activities (Watch, OSINT, CTI) of our VOC offer and other services.
In addition to our detection (SOC) and security incident response (FIR) offers, raise your level of security by :
Our offer guarantees rigorous compliance with current standards and regulations.
Can I subscribe to only one of the activities in the VOC offer?
It is entirely possible to subscribe to one, some or all of the activities in the VOC offer, giving you a variable level of visibility over your threat.
How can I subscribe to your services?
Our Watch and CTI activities are available on an annual subscription basis. The OSINT activity can be carried out once or via a subscription, allowing additional detection scenarios.
In the OSINT activity, are all detection scenarios included or are they individually available?
OSINT addresses all specified detection scenarios at no extra cost.
What is the notification SLA for bulletins and incidents?
You are informed as soon as we are aware of the threat and have qualified the risk to your infrastructure.
Are there any limitations on the number of assets under supervision?
There are no limits on the number of assets under supervision (IP addresses, domains, URLs, certificates, etc.) or on keywords (brands, projects, VIPs, etc.). The cost is adapted to the perimeter covered.
Where do you get the data for your OSINT activities?
Data is retrieved passively from open sources (forums, black markets, telegram, public databases, passive dns, archives, etc.). With your consent, we can retrieve information on your identified assets.
Can I link your CTI activity to my SOC service?
By default, our CTI service is connected to our SOC offer. If you have your own SOC, we can develop and provide a connector for you.
Does this offer meet current regulatory and standards requirements?
Yes, within the framework of the DORA, ISO27001 and CaRE regulations and standards, our offer meets these requirements.
How much does the ForCERT platform cost?
There is no cost for access to the ForCERT platform (nor any limitation on the number of users). The ForCERT platform is accessible to our customers with a subscription to the Veille, OSINT-EASM or CaRE program.
Our experts can provide you with ongoing support for your cyber issues. Do you have a question? You’ve come to the right place, and we’ll get back to you within 24 hours!