Industry Exposure Report

When it comes to exposure of your networks, computers and devices on the Internet, ignorance is not bliss. If it can be seen, you can be attacked. We can help you to see and neutralize your vulnerabilities.
We need the Internet. But the Internet and telecommunications networks are insecure and NOT PRIVATE. Because of this:
While attackers used to spend most of their energy on big Enterprise and government targets, that has all changed. Powered by ever more sophisticated tools and automation, criminals gangs, hostile state actors and other adversaries are coming after small-to-midsized businesses with the same ruthless efficiency.
And its no longer just data they are after - Ransomware is even more lucrative when the threat is to shut down the production line of manufacturers, critical ehealthcare devices, charging stations and so on. If it is connected and can be seen, it can and will be attacked.
Faction Communications Corp. has partnered with the Mobile Intelligence Alliance, a US 501(c)(3) non-profit organization focused on reducing cyber threats to Internet users, to provide independent services on different levels of visibility into internet-exposed devices, including network details and metadata about the connected assets of an organization such as the OS and network services that are exposed and potentially vulnerable to attackers.
Various types of sophisticated, industry leading scanning and analysis tools are used to obtain the information needed to assess the risks of exposed assets to external attacks. Deeper inspection can then reveal active communications and potential attempts of potentially malicious nodes targeting your network, who is attacking, and a profile of the attacking network.
As the remote workforce grows and the number of connected devices increases, organizations become more distributed, expanding their attack surface, and exposing them to elevated levels of risk.
Connected assets that comprise an attack surface include everything from servers and computers to printers and smartphones. Assets with internet exposure become targets for adversaries that attempt to exploit applications that actively listen for connections to provide services to your organization.
The role of Attack Surface Management (ASM) is important but can be expensive and time consuming. Organizations that rely on mission-critical services often do not have the resources to monitor their attack surface, but need help to identify their exposure, prioritize risks, and find ways to mitigate it. For these organizations, Attack Surface Assessment & Threat Analysis can help.
SERVICE | OUTPUTS PROVIDED | SERVICE DESCRIPTION | |
---|---|---|---|
INDUSTRY EXPOSURE REPORT | A report showing the quantity of publicly exposed services used in different industry verticals, including industrial manufacturing, healthcare, and green energy. | The Exposure Assessment provides intelligence into internet-connected services and devices used in different industries. It looks at service protocols and host information to show the attack surface routinely exploited by criminal hacker organizations and state-affiliated threat groups. | Download Now |
THREAT AND VULNERABILITY ASSESSMENT | A report showing exposed hosts and vulnerabilities of an organization's network, with an overview of threat risk. The assessment requires network details from the organization. | The Vulnerability Assessment conducts a multi-faceted analysis of an organization's attack surface. It scans a range of IP networks and hosts provided by the organization and searches for known vulnerabilities. The scan results are provided in a report showing exposed and highly vulnerable assets. | Apply Now |
THREAT ANALYSIS & RECONNAISSANCE | A detailed report showing exposed hosts, with a detailed view of the external attack surface, including malicious breach attempts from known adversarial networks. | The Threat Assessment conducts a deep investigation of an organization's attack surface to find exposed surface weaknesses and potential compromise. It uncovers malicious external networks which actively and periodically attempt to breach the organization's network defences, and the techniques and tactics used. | Get a Quote |
The assessment locates connected devices that host network services and run various applications accessible from the internet, such as:
You can specify individual IP addresses, network ranges, and include your domains for the assessment. However, for large and highly distributed deployments such as remote sensor or industrial processing networks, you should contact us to discuss customized options.
Organizations of all sizes in many industries are concerned with understanding and mitigating vulnerabilities to internet-based attacks. Not all organizations face the same threats, and the nature and targets of threats are constantly changing. Our services are designed to address the needs of many industry verticals.
Our Industry Exposure Reports are for organizations that want to get a current picture of the exposed hosts using applications and services in their industry vertical, and where they should focus their attention to formulate defences. This report is available to any organization worldwide.
Our Threat and Vulnerability Assessment services are popular with anyone who wants to understand the exposure and vulnerabilities in the security postureof their specific organization with regard to internet exposed networks, devices and data. Currently, these services are restricted to organizations in North America[GM1] , which can vary from small business to large enterprises.
Our Threat Analysis and Reconnaissance services are for organizations that have reason to believe that they may be under current or imminent attack. Typically, this is due to a specific cause for concern, such as:
[GM1]Why is this restricted to organizations in North America?
Of course! Agencies and consultants can use this service to perform security reviews of sites they are handing over or working on. A value added service for your web projects or managed services.
We use various security tools to provide actionable information to our clients. Due to the highly sensitive nature of the reporting outputs, we use payment as part of the identification, verification, and screening process to prevent abuse. You must be the owner or operator of the system or have explicit authorization for us to conduct a vulnerability security assessment on behalf of your organization.
Conducting a vulnerability assessment takes time and resources to address in a professional and thorough manner while providing rapid response. Please fill out our registration form to schedule a consultation to determine if your organization qualifies for any special programs.
Yes, if you have systems installed or integrated with 3rd party vendors, let us know and we can include them in our scans and analysis.
The Mobile Intelligence Alliance, a non-profit 503(c)3 corporation, provides all of the professional services and analysis and keeps 75% of the fees. Faction Communication Corp. keeps 25% of the fees to cover the following:
Our partnership with Mobile Intelligence Alliance is based on our shared goal to help average users and small to mid-sized businesses to increase their understanding and awareness of the many threats to their security and privacy, and enable them to do something about it.
Faction Communications is open to and engaged in discussion with other partners in this area. Professional services is not a long term component of our business model, which is focused on our SaaS platform, applications and solutions.
Certainly! However, this area has many different tools, consultants and contractors, which makes it very challenging and complex for the average small to mid-sized business user to sort out the wheat from the chaff.
Or in some cases, it can be far worse. When it comes to VPNs – and cybersecurity tools – there are actually very large numbers of apps which are malware created by both criminal gangs and hostile state actors.
Therefore, Faction will go through a careful vetting process of any organizations that we recommend and/or partner with, and certainly expects the same in return! There is nothing more important to us then the security and privacy of our customers and users.