Getting Started in BreachSight

Learn how to get started in UpGuard's BreachSight module and begin monitoring cyber-related risks that your company is exposed to.

Andie Ryan avatar
Written by Andie Ryan
Updated over a week ago

Use this guide to get set up in BreachSight and get the most out of this part of the UpGuard platform. We'll run you through each module and link you to resources to learn more about them.

Executive Summary

The Executive Summary section provides an overview of your own cybersecurity posture, and how it is changing over time. It includes your current security score and a graph of its 12-month history, how your score compares to your competitors, and the breakdown of your score into various risk categories. Get started with the Executive Summary by adding your competitors.

Risk Profile

Your Risk Profile helps you to understand your organization's security posture. Learn more about the Risk Profile module and how to use it.

Remediation

The Remediation module allows you to see and respond to your organization's current remediation requests, and create new requests based on risks identified by the UpGuard platform. Learn more about Remediation here.

Risk Waivers

The Risk Waivers module can be used to accept specific web risks that have been automatically detected for your company. Learn more about Risk Waivers and how to use them.

Domains

The Domains module shows you all of the domains that are associated with your company. UpGuard uses a number of techniques to automatically discover your domains, but sometimes you might want to add to your list. Learn more about the Domains module, or how to add a custom Domain.

IP Addresses

UpGuard will also automatically monitor the IP addresses and ranges associated with the DNS records of your domains, allowing you to stay on top of any assets within these ranges and their associated risks. Learn how to monitor your IP addresses and IP ranges, as well as how to add a custom address or range.

Vulnerabilities

The Vulnerabilities module lists both verified and unverified vulnerabilities identified from information exposed in HTTP headers, website content, and open ports. Learn more about Vulnerabilities, the difference between verified and unverified vulnerabilities, and your options for remediating, waiving, and ignoring them.

Identity Breaches

If your plan includes Identity Breaches, you can utilise this module to keep track of where your employees' credentials have been exposed. Identity Breaches searches for third-party data breaches on the internet - learn more about this module here.

Typosquatting

If your plan includes the Typosquatting module, you'll be able to choose domains that you'd like to monitor for typosquatting risks. Learn more about typosquatting and how to use this module.

My Shared Profile

Your Shared Profile allows you to proactively publish information about your organization's security posture, to be shared with companies that are assessing you. Using this feature allows you to spend less time manually answering security questionnaires or risk assessments. Learn how to enable your Shared Profile and start adding your preferred documentation to the platform.

What's next?

Did this answer your question?