Use this guide to get set up in BreachSight and get the most out of this part of the UpGuard platform. We'll run you through each module and link you to resources to learn more about them.
The Executive Summary section provides an overview of your own cybersecurity posture, and how it is changing over time. It includes your current security score and a graph of its 12-month history, how your score compares to your competitors, and the breakdown of your score into various risk categories. Get started with the Executive Summary by adding your competitors.
Your Risk Profile helps you to understand your organization's security posture. Learn more about the Risk Profile module and how to use it.
The Remediation module allows you to see and respond to your organization's current remediation requests, and create new requests based on risks identified by the UpGuard platform. Learn more about Remediation here.
The Risk Waivers module can be used to accept specific web risks that have been automatically detected for your company. Learn more about Risk Waivers and how to use them.
Domains & IPs
The Domains & IPs module shows you all of the domains and IPs that are associated with your company. UpGuard uses a number of techniques to automatically discover your domains and IPs, but sometimes you might want to add to your list. Learn more about the Domains & IPs module, or how to add to your Domains and IPs.
The Vulnerabilities module lists both verified and unverified vulnerabilities identified from information exposed in HTTP headers, website content, and open ports. Learn more about Vulnerabilities, the difference between verified and unverified vulnerabilities, and your options for remediating, waiving, and ignoring them.
If your plan includes Identity Breaches, you can utilise this module to keep track of where your employees' credentials have been exposed. Identity Breaches searches for third-party data breaches on the open, deep, and dark web - learn more about this module here.
If your plan includes the Typosquatting module, you'll be able to choose domains that you'd like to monitor for typosquatting risks. Learn more about typosquatting and how to use this module.
If your plan includes Data Leaks, you'll be able to use this module to monitor where your organization's data is exposed on the Internet. Learn more about how Data Leaks works and how to use it.