Learn how to get started in UpGuard's BreachSight module and begin monitoring cyber-related risks that your company is exposed to.
Use this guide to get set up in BreachSight and get the most out of this part of the UpGuard platform. We'll run you through each module and link you to resources to learn more about them.
The Executive Summary section provides an overview of your own cybersecurity posture, and how it is changing over time. It includes your current security score and a graph of its 12-month history, how your score compares to your competitors, and the breakdown of your score into various risk categories. Get started with the Executive Summary by adding your competitors.
Risk Profile
Your Risk Profile helps you to understand your organization's security posture. Learn more about the Risk Profile module and how to use it.
Remediation
The Remediation module allows you to see and respond to your organization's current remediation requests, and create new requests based on risks identified by the UpGuard platform. Learn more about Remediation here.
Risk Waivers
The Risk Waivers module can be used to accept specific web risks that have been automatically detected for your company. Learn more about Risk Waivers and how to use them.
Domains
The Domains module shows you all of the domains that are associated with your company. UpGuard uses a number of techniques to automatically discover your domains, but sometimes you might want to add to your list. Learn more about the Domains module, or how to add a custom Domain.
IP Addresses
UpGuard will also automatically monitor the IP addresses and ranges associated with the DNS records of your domains, allowing you to stay on top of any assets within these ranges and their associated risks. Learn how to monitor your IP addresses and IP ranges, as well as how to add a custom address or range.
Detected Products
For each of your internet-facing domains and IPs, UpGuard fingerprints the technologies and vendors in use. You can use this information to audit for particular products where vulnerabilities may not be detectable and look for unapproved software. Learn more about Detected Products here.
Vulnerabilities
The Vulnerabilities module lists both verified and unverified vulnerabilities identified from information exposed in HTTP headers, website content, and open ports. Learn more about Vulnerabilities, the difference between verified and unverified vulnerabilities, and your options for remediating, waiving, and ignoring them.
Identity Breaches
If your plan includes Identity Breaches, you can utilise this module to keep track of where your employees' credentials have been exposed. Identity Breaches searches for third-party data breaches on the internet - learn more about this module here.
Typosquatting
If your plan includes the Typosquatting module, you'll be able to choose domains that you'd like to monitor for typosquatting risks. Learn more about typosquatting and how to use this module.