Announcing a Novel Tool to Protect Your Assets: the Exposed Data Detector
Every day, companies wind up with bad press and irate consumers after researchers discover that the firm has been leaking data. But searching all your systems and all your vendors’ systems for exposed data has been a daunting and costly task.
Our new scanning and detection system is now open for limited free trials. Take it for a test-drive for 7 days, and then if you’re ready to become a subscriber, we will be happy to outline different plan options for you or your firm. For now, we will just briefly address some common questions about this system’s unique features.
Can’t I Just Search Shodan.io?
Sure you can, and Shodan is a great resource if all you want or need is the top layer of analysis. Our EDD system is a deep metacrawler: it digs deeper into what is on a server. The system does not download any data and it does not modify any data, making it safe for researchers who wish to avoid accusations of “hacking” as they research exposed data. And it manages to do all that while being able to tell you what columns are on a MongoDB or what keynames are used on Elastic indices. And there’s much more our system reveals.
How Else Can the EDD System Help Me?
Many large firms want and need their systems monitored or their vendors’ systems monitored to ensure that intellectual property or customer data is not being exposed. Monitoring third-party vendors can be time-consuming and near-impossible, but with EDD, your firm can monitor your systems and your vendors’ systems to determine if data is being leaked or unintentionally exposed on any publicly accessible service that we monitor.
Full REST API
The system has a clean and easy to use GUI that enables you to save hosts to favorites and to add filters for some triggered alerts. The real magic, however, is the REST API, which allows you to build around and on and access the data from your own service or application.
We’re Ready to Start. Are You?
If you’re ready to start your free trial, contact Lee Johnstone on Twitter @83leej or via email to lee [at] ctrlbox.com.