Traxion ProTech gathers threat intelligence data from multiple sources, including APT and botnet infrastructure, the dark web, social media and instant messaging, and open-source and proprietary data collection methods. The collected information is considered reliable and accurate.
The threat intelligence is updated on a daily basis.
Yes, Traxion ProTech uses AI and machine learning to provide additional insights and predictions.
Traxion ProTech's technology stack performs scans to identify security vulnerabilities and does not collect client information.
Traxion ProTech's technology stack stores information such as subdomains, IPs, WAF-related information, site technologies, screenshots of web applications, cloud instance information, website sitemaps, information regarding hijackable subdomains, identified vulnerabilities per asset, emails of employees for a domain name, and leaked credentials of employees.
Yes, Traxion ProTech's technology stack ensures compliance with NIST, ISO27991, SOC2, GDPR, and CCPA.
Traxion ProTech's technology stack encrypts all information at rest and in-transit and ensures data privacy through multi-tenancy, where each user has their own DB schema and storage. Sensitive data is not collected.
Traxion ProTech uses a combination of passive and active scanning techniques to conduct agent-less discovery, such as querying multiple DNS providers, scanning actual hosts and services, and using various crawling techniques to gather information. The collected information is then normalized and fed to their AI for additional insights and predictions. Traxion ProTech also has automated scanning modules for infrastructure assets, cloud asset instances and buckets, web applications, employee leaks, and sensitive data leaks in paste sites and Github.
Traxion ProTech does not scan Kubernetes pods or instances, APIs, or single page applications.
Copyright © 2023 Traxion Tech - All Rights Reserved.
If you have any question or concern, feel free to email us at firstname.lastname@example.org