Self Assessment

Raptech logo iWOW logo IP-TRIBE logo Kingsmen logo Merdeka logo
Who

Designed for you

DeTCT is designed to help leaders mitigate the rising digital risk so they can focus on building a thriving business

Executives

How do I quantify the risks and gaps to my senior stakeholder to get support for cyber initiatives? Is my business facing any threats? What do I need to focus and priortise on?​

Marketing

Is my brand under any risk of attack or being attacked? Any infringement or impersonation that could impact stakeholder’ trust and erode my customers’ loyalty?

IT Team

Do I have full view of my attack surface? What are my most critical vulnerabilities? Are my processes around patch and vulnerability management, and policy compliance effective? What do I need to do to enhance my security controls?​

DeTCT gives you full visibility to your digital footprint like no other.

DeTCT is the only fully automated, proactive monitoring service what works 24x7 to help you stay on top of rising cyber threats.

  • Attack surface Monitoring​
  • Impersonation and Infringement​
  • Data Breach Monitoring​
  • Social and Public Exposure Monitoring
  • Third-Party Cyber Risk Monitoring​
Contact Sales Get Started

DeTCT gives you actionable insights so you can prioritize remedial actions.

  • Every threat indicator comes with a risk score so you can assess its impact to your business
  • Recommended remedial actions are provided to help you stem data leaks and breaches​
  • Dashboards with Risk and Hackability scores allow you to monitor progress over time
Contact Sales Get Started

Attack Surface Monitoring

DeTCT monitors your attack surface so you would never be blindsided.

  • Domain/IP Vulnerability
  • Certificate Weaknesses
  • Configuration: DNS/SMTP/HTTP
  • IP/Domain Reputation
  • Open Ports
  • Cloud Weakness
Contact Sales Get Started

Impersonation and Infringement

DeTCT scans deep/dark/surface web and social media to look to signs of impersonation and infringement

  • Domain/IP Assets
  • Executive/People
  • Product/Solution
  • Social Handlers
Contact Sales Get Started

Data Breach Monitoring

DeTCT brings to your attention data which has been stolen and available for sale in underground marketplaces. This includes data which has been exfiltrated by ransomware groups.

  • Emails/Identities/Credentials
  • Leaks
  • Dark Web
  • Phishing
  • Ransomware
Contact Sales Get Started

Social and Public Exposures

With DeTCT, you would always know if your IP and confidential data has been exposed, including lookalike or malicious apps. You will also receive alerts on social sentiments that could present a threat to you or your business

  • Source Code
  • Confidential Files
  • PII/CII Dumps
  • Malicious Mobile Apps
  • Social Threat
Contact Sales Get Started

DeTCT secures your digital ecosystem and gives you visibility to third-party cyber risk

  • Discover weaknesses of your suppliers’ digital assets
  • Be alerted to their data leaks and exposures which could impact you
  • Receive recommended remedial actions to help strengthen your suppliers’ cyber posture
  • Keeps your company and people safe from cyberattacks
Contact Sales Get Started

"DeTCT saves us from becoming a victim of malicious cyberattacks and risk eroding the trust our customers have placed on us by keeping a constant watch on our digital footprint and alerting us to any exposures the moment these occur.

This has given us precious lead time to quickly kick in remedial actions before a full-blown attack is upon us. DeTCT has unlocked visibility which we never thought possible."

Raptech logo

Managing Director
CEO, Raptech

What you will get with DeTCT

Attack Surface Discovery

Real-time continuous monitoring to identify shadow IT that could be compromised by cybercriminals. Gain awareness so you can decide how to shrink your attack surface.
  • Domain Vulnerabilities
  • Certificate Weaknesses
  • Configuration Weaknesses (DNS/SMTP/HTTP)
  • Open Ports
  • IP/Domain Reputation
  • Cloud Weaknesses

Vulnerability Intelligence

Vulnerabilities are uncovered and mapped to assets and associated exploits and ranked based on criticality. Businesses can optimize resources to focus on the most important and urgent gaps.
  • Vulnerability in External Assets
  • Visibility on vulnerabilities currently being exploited
  • Weak/Vulnerable Certificates

Digital Risk Protection

Unveil digital footprints and cases of impersonation and data leaks. With real-time alerts on your data leaked in the wild, you can plug the gap and avert any further reputation and financial damage.
  • Domain, IT Assets Impersonation
  • Executive/People Impersonation
  • Lookalike Social Handlers

Social and Public Exposure

Foil phishing campaigns masquerading as your company executives and profile. Sensitive data that has been leaked can be used by threat actors to launch an attack. Detect these leaks, take corrective actions and prevent a major attack.
  • Confidential Files
  • Source Codes
  • Dumps of PII/CII
  • Malicious Mobile Apps
  • Negative Social Sentiments

Real-Time Data Breach Monitoring

Be the first to know when your data has been leaked. Ensure IP and trade secrets are not exposed. Avoid having to manage negative media in the event of a breach. Be in compliance with regulatory policies.
  • Email, identities, credential leaks
  • Intellectual Property
  • Personal Data
  • Dark web exposure
  • Database exposure
  • Financial Leaks and Carding

Third-Party Risk Monitoring

Gain insights to your third-party's digital risk profile. Ensure employees, business partners and third-party contractors have not inadvertently shared sensitive information which could subject the company to cyberattacks and risks.
  • Uncover your third-party's attack surfaces, data leaks/breaches, executive impersonation, and more
  • Gain visibility of the vulnerabilities in their external-facing assets and see how they connect back to your ecosystem

Plans for all sizes

Simple, transparent pricing that grows with you. Try free for 14 days.

Trial Plan

Free /for 14 days


  • Attack Surface Discovery
  • Impersonation and Infringement
  • Data Breach and Web Monitoring
  • Social and Public Exposures
  • Hackability and Risk Scores
  • Top 1 item in each category
  • 1 third-party domain
  • Full Access to DeTCT Platform
  • Free Access for 14 days
  • Downloadable Reports
Try Free
Contact Sales

 

Silver Plan


  • Attack Surface Discovery
  • Impersonation and Infringement
  • Data Breach and Web Monitoring
  • Social and Public Exposures
  • Hackability and Risk Scores
  • Top 5 items in each category
  • 3 third-party domain
  • Receive Email Alerts
  • Full Access to DeTCT Platform
  • Downloadable Reports
Contact Sales

 

Gold Plan


  • Attack Surface Discovery
  • Impersonation and Infringement
  • Data Breach and Web Monitoring
  • Social and Public Exposures
  • Hackability and Risk Scores
  • Top 15 items in each category
  • 5 third-party domain
  • Receive Email Alerts
  • Full Access to DeTCT Platform
  • Downloadable Reports
Contact Sales

 

Platinum Plan


  • Attack Surface Discovery
  • Impersonation and Infringement
  • Data Breach and Web Monitoring
  • Social and Public Exposures
  • Hackability and Risk Scores
  • All data in each categories
  • 10 third-party domain
  • Receive Email Alerts
  • Full Access to DeTCT Platform
  • Downloadable Reports
Contact Sales

FAQs

Everything you need to know about the product and billing. Can’t find the answer
you’re looking for? Please chat with our friendly team.

Is there a free trial available?

Yes, you can try us for free for 14 days. If you want, we’ll provide you with a free, personalized 30-minute onboarding call to get you up and running as soon as possible.

Can I change my plan later?

Of course, chat with our friendly team to find a solution that works for you.

What is your cancellation policy?

We understand that things change. You can cancel your plan at any time and we’ll refund you the difference already paid.

During the free trial, can I switch the domain to another after I've onboarded?

For the free trial, you can only onboard one domain and we will monitor that domain for you for 14 days.

How does billing work?

Plans are per workspace, not per account. You can upgrade one workspace, and still have any number of free workspaces.

How do I change my account email?

Reach out to our support team at [email protected] to request these changes.

Have a question?

Can’t find the answer you’re looking for?

Start your free trial

Join the many businesses who are already using DeTCT to secure their digital assets

Get Started
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.