Search
Close this search box.

SpyCloud FAQs

PRODUCT

We use our proprietary Cybercrime Analytics Engine to recapture and enrich stolen credential and PII data from the dark web and other sources in the criminal underground. SpyCloud continuously ingests and intelligently analyzes more than 25 billion assets every month from data breaches and malware-infected devices. When compromised data is found, SpyCloud alerts affected organizations so they can take action to secure the exposed digital identities of their employees and customers to prevent account takeover, ransomware, session hijacking, and online fraud.

SpyCloud's products are beneficial for a wide range of organizations, including software/technology firms, financial institutions, government agencies, healthcare providers, ecommerce companies, educational institutions, and even cybersecurity companies, among others – effectively any organization with employees, suppliers, and customers.

Account takeover (ATO) occurs when unauthorized individuals gain access to user accounts using stolen credentials or authentication information. ATO attacks can lead to follow-on attacks, identity theft, financial loss, and reputational damage for individuals and organizations.

SpyCloud's unique approach combines automated remediation with next-generation threat intelligence to provide comprehensive protection from the effects of identity exposures in the dark web. SpyCloud identifies compromised credentials and other identity information faster and more accurately than traditional threat intelligence methods, enabling automated protection from follow-on attacks that rely on the use of stolen data.

SpyCloud continuously monitors the dark web and updates its database in real-time every day with third-party data breach and malware-exfiltrated information. Our process gives our customers access to the most current exposure information to protect their accounts quickly and effectively.

Yes, SpyCloud offers dark web monitoring for various industries and sectors, including finance, healthcare, retail, technology, and more. That said, SpyCloud goes well beyond typical dark web monitoring to actually remediate exposed authentication data on a continuous basis, enabling your team to scale its impact without adding additional headcount or tools.

SpyCloud monitors a wide range of data on the dark web, including stolen usernames, passwords, email addresses, credit card numbers, social security numbers, and other personally identifiable information (PII) that could be used for identity theft or fraud. We also recapture newer data types like stolen session cookies, API keys and webhooks, and crypto wallet addresses.

If SpyCloud alerts you to a compromised account, it's important to take immediate action to secure the account. This may involve resetting passwords, reviewing account activity for any signs of unauthorized access, notifying the user, and taking appropriate Post-Infection Remediation steps if the user has been infected with malware.

Yes, our Responsible Disclosure team regularly engages with organizations identified in breaches to ensure they have access to the raw data and can remediate any potential user or employee exposure due to the release of the information.

SpyCloud invests heavily in research to stay ahead of emerging cybersecurity threats. Our team continually monitors and analyzes evolving tactics and techniques used by cybercriminals and adapts our technology and processes accordingly to provide the most effective protection for our customers.

Yes, SpyCloud's products are scalable and can be tailored to meet the needs of small businesses and startups. From Fortune 100 businesses to SMBs – no matter the size of your employee or customer base, SpyCloud can help you protect your accounts and sensitive data from cyber threats.

PRICING

SpyCloud pricing is determined by the solution you purchase: Enterprise Protection, Consumer Risk Protection, or Investigations. We also offer special pricing packages for data partners.

SpyCloud Enterprise Protection helps organizations protect, prevent, and remediate compromised employee identity data. Pricing is tiered by the number of employee accounts protected. Contact us for a quote.

SpyCloud Consumer Risk Protection helps organizations preserve consumer account integrity and minimize risks from account takeover and unauthorized access. Pricing is tiered by the number of customer accounts protected. Contact us for a quote.

SpyCloud Investigations is available to purchase as an API or portal. Pricing for the API is tiered by number of queries. Pricing for the portal is tiered by seat count with unlimited in-portal queries, and up to 200 API queries included per seat at no additional cost. Contact us for a custom quote.

Yes. Please contact our sales team for details and support.

We offer data partnerships to leading global technology, financial services, and security organizations who want to enhance their security, fintech, and fraud detection products with our insights. You can learn more about our data partnerships here.

Yes, we partner with MSSPs and MDR providers! Learn more here.

INTEGRATIONS

Yes, SpyCloud offers integrations with a variety of popular cybersecurity tools and platforms, including security orchestration, automation and response (SOAR) providers, security information and event management (SIEM) solutions, extended detection and response (XDR) software, and traditional threat intelligence platforms (TIPs). These integrations help organizations streamline their security operations workflows and enhance their overall cybersecurity posture.

Examples of integrations include:
  • Microsoft Sentinel
  • Splunk
  • Palo Alto Cortex XSOAR
  • Maltego
  • Jupyter Notebook

RISK AND COMPLIANCE

Yes, SpyCloud is committed to compliance with data protection regulations such as GDPR, CCPA, and HIPAA. We prioritize the privacy and security of our customers' data and adhere to industry best practices. Visit our Trust Center to learn more.

SpyCloud follows strict security measures to protect sensitive information while monitoring the dark web, including encryption, access controls, and data anonymization techniques. We prioritize the privacy and security of our customers' data at all times.

Yes, SpyCloud's services can help organizations meet compliance requirements such as PCI DSS (Payment Card Industry Data Security Standard) and SOC 2 (System and Organization Controls 2) by providing proactive monitoring and protection against data breaches and account takeover attacks.

Yes, SpyCloud provides continuous identity monitoring to inform your policy engine and your Zero Trust initiatives – powered by darknet telemetry with automated remediation for always-on Zero Trust authentication.

Yes, SpyCloud’s identity protection solutions help affected organizations in the EU meet the requirements of Paragraph 2, Article 21 of the NIS2 Directive.

SpyCloud's products, powered by recaptured data, bolster any organization’s ability to manage cyber risks proactively across all five functions of the NIST CSF. SpyCloud identifies the exposed assets most likely to be exploited by adversaries; protects the business from stolen credentials and malware-exfiltrated data with integrations into directory services and IdPs; detects identities exposed by infostealer malware infections, with alerts integrated into SOC analysts' workflows; improves response with evidence of compromised cloud applications exposed by malware infections, including those on unmanaged and undermanaged devices; and enhances recovery with darknet data investigations to ensure all impacted systems have been addressed.

SpyCloud recaptures stolen data from the criminal underground and surfaces insights to customers so they can remediate exposures before criminals can leverage the data in cyberattacks. Whatever phase of the MITRE ATT&CK framework – be it pre-attack or latter attack stages – understanding the information that is already in the hands of criminals and mitigating those compromises can help your organization greatly reduce risk. Learn more about how stolen data fits into your MITRE mapping

Act on what criminals know about your business

Check Your Exposure has been expanded with more recaptured data. See Your Results Now

X
Search
Close this search box.