Technical Information

Axur Platform

On the Axur platform, you not only monitor, but also manage all threats identified by your collectors. To begin with, it is essential to understand that detections are organized, according to the nature of the threat, in various Workspaces, such as Digital Fraud, Online Piracy, Data Leakage, Deep & Dark Web and Executives & VIPs - as the nature of fraud and threats is dynamic, this organization may undergo changes in the future, but you will always be notified if there are changes. In each of these categories, detections related to all contracted solutions are available.

Digital fraud

Also known as Brand Protection, this workspace comprises cases most directly related to the use of a company's brand to commit fraud, obtain financial advantage, or improperly take possession of victims' data. Monitoring and removing digital fraud is essential to preserving the company's good image, in addition to avoiding legal and customer service costs. This workspace covers the following types of threats:

Monitoring Settings

Monitoring Settings are essential for calibrating the protection of your assets through our powerful search bots. You can customize searches according to what is most suitable for your business using keyword libraries, segmenting results, and directing efforts to identify the main threats in each detection source. Asset Management is also performed through Monitoring Settings, allowing the activation of what is most relevant to be monitored at the moment. This is where threats are turned on and off, and official data used in bot collections are inserted.

  • Fake mobile app
  • Malware
  • Similar domain name
  • Fake profile on social network
  • Phishing
  • Branding in paid search
  • Fraudulent use of trademark

To make better use of the platform, it is important to carry out periodic maintenance on the search bots. For example: the keywords used by fraudsters when trying to impersonate your company and carry out scams evolve over time. Periodically calibrating Keyword Libraries greatly improves your discoverability.

Data leak

This workspace detects data of interest to the company that is unduly exposed on the internet. Such information can serve as an initial vector for cyber attacks and, therefore, must be handled internally by the company. It encompasses the following types of threats:

  • Infostealer credentials
  • Database exposure
  • Other sensitive data
  • Corporate credential leak
  • Code secret leak

All exposed data found by Axur are mere copies of information that has already been made public on the superficial internet or the deep and dark web.

Credentials are considered to be pairs of email+password, email+hash or username+password that can be used to access a website, system, platform and similar.

Credentials, especially those coming from Infostealers, may be accompanied by other information, such as username, URL, document number, telephone number, among others. We recommend responsible use of information found in detections.

Axur also monitors credit card exposure on the Surface Web and Deep & Dark Web. These detections are not displayed on the platform. Alerts with credit card exposures are sent by email to the respective issuers. The contracting of credit card protection products and services does not in any way compromise the company's adherence to PCI DSS (Payment Card Industry Data Security Standards).

Online piracy

Workspace where unauthorized, irregular sales or fake products sold on the internet are monitored.

Deep and Dark Web

WoThrough infiltration work in closed groups, the Axur Platform monitors more than three thousand channels, including WhatsApp, Telegram and Discord groups. Forums that have restricted access or that are on the Onion network are also monitored, as well as alerts about which specific companies are victims of Ransomware attacks. Once a threat is detected by the collections (available for complete configuration autonomy), our platform alerts you with a new ticket and via email, if desired. It is also possible to configure anomaly alerts if the volume of detections, per hour, for a given search, reaches a certain peak pre-established by the user.

When contracting Deep & Dark Web monitoring, access to the Explore area is permitted. This feature allows an open search, for any subject, across the entire Deep & Dark Web database we monitor. The Axur Platform also provides a summary, produced by generative AI, of all mentions of your company on the Deep & Dark Web in the last seven days.

Executives and VIPs

Where exposed personal data and fake profiles are monitored. Monitoring data from key people in the organization is essential to prevent fraud such as Business Email Compromise and Doxxing. The following types of threats are covered:

  • Fake profile on social media
  • Leak of personal information
  • Credential leak
  • Credit card leak

Axur has an exclusive technology, Axur SafeShare, so that executives can safely send their personal information to be monitored. Through a form with a unique link, each executive sends their encrypted information directly to a cloud server with additional protections.

Takedown

When the customer contracts the Takedown package, the entire notification process is monitored by the Axur Platform to verify whether the removal request was met. Approximately 80% of tickets are resolved with up to two notifications. If a notified entity begins to show signs of delay in responding, new flows are automatically triggered to speed up the takedown by another route. Additionally, for cases related to fraud (phishing and malware), the platform notifies the global security community (Web Safe Reporting), reporting the URL for placing alerts of browser and antivirus fraud. This reduces fraud exposure time while the Takedown is being completed. Takedown can be used in cases such as:

  • Removal of fake pages that collect data from your customers (phishing and malware);
  • Removal to comply with regulatory policies, based on Intellectual Property, regarding the use of your brand.

Rules for Accounting for Takedowns

Incidents countable for billing purposes:

  • Only resolved Takedowns are deducted from the Takedown package. In other words: you only pay if the content is removed;
  • Each actionable URL will be considered a countable item;
  • Each domain name subject to blocking and/or cancellation of registration will be considered a countable item;

Incident reopening - Re-up
Incidents that return to activity after having their Takedown resolved and confirmed will be re-detected and considered as re-up (and, therefore, are not charged), considering criteria of:

  • 1. Time: return to activity within 15 days from the moment of resolution of the Takedown of the original incident;
  • 2. URL: must be identical to the original incident.

Service Level Agreement for first notification:

Axur Takedown ensures that the first notification reaches platforms, at any time and day of the week, within minutes:

  • Up to 5 minutes for Takedown cases excluding Online Piracy offers, in 50% of threats; and within 30 minutes for 90% of these threats;
  • If all documents comply with the platforms' policies: Within 30 minutes for cases of Online Piracy, in 50% of threats; and within 2 hours for 90% of these threats.

Page Reactivation

Axur may act on the customer's behalf to reactivate pages where removal was erroneously requested. We cannot guarantee the success of this type of operation. Whenever a situation like this occurs, the customer must provide a scanned letter stating that the removal request was a mistake, thereby releasing Axur from liability. In situations where the customer requests support to reactivate pages, Axur will charge the equivalent of ten removals.

Customers whose packages include unlimited removals will be charged the equivalent amount of ten extra removals.Axur will attempt to reactivate the page for 30 days; after this period, the case will be closed. Regardless of whether or not the page is successfully reactivated, the amount due will be charged according to the contracted plan.

Executive Takedown

The Axur Platform is also capable of removing fake executive profiles on social networks and executive data on lead sales websites. For the removal to be successful, it is essential that executives send the Authorized Agent Term and a selfie holding an official identification document. Executives who submit this information are 8 times more successful in removing threats.

Other platform components

The platform also has several other complementary areas:

Stats

In the Stats section, we offer you the possibility to dive into the statistical data of detections. You can explore graphs that show the scope of your collections, the total number of monthly incidents — allowing comparisons with other Axur customers and with each customer's specific market segment. Additionally, we present information on incidents categorized by threat type and the results obtained from removal operations.

Investigations

The Axur Platform provides an investigations panel where it is possible to monitor all investigations requested via the platform, with status, time spent and link to download the finished reports.

My team

When purchasing Axur monitoring services, you automatically gain access to work environments related to the contracted products. The number of users is unlimited, except for the Starter plan. In the My Team section, you can assign different access to each user. There is a hierarchy between managers, experts, analysts and viewers, with customized permissions. Managers have the prerogative to define which assets, threat types and work environments each user registered in the project can access, providing a personalized and autonomous experience. Additionally, our platform supports multitenant access for users coming from Axur partners, i.e., a feature that allows partners to manage all and/or each of their customers through a single account on the Axur Platform.

API

On the Axur platform you have the ability to manage your results efficiently through an API that, in addition to enabling queries, offers several Webhook services that ensure the transmission of signals in real time. Axur customers can access API documentation at any time, directly on the platform.

Safelist

You can add all your official content to a Safelist: websites, social networks, applications, among others. Safelist prevents your search bots from detecting your company's legitimate content as a possible threat and requesting takedowns for it. It is recommended to also add content from partners that use your company's name or brand.

Automations

Implementing automation plays a crucial role! They allow more work to be done in less time, optimizing your team's operations. This way, it is feasible to configure actions to facilitate the management of large volumes of tickets.

User Activities

For total and effective control of actions, it is possible to view information from team logs in User Activities, as well as products contracted per asset in Plans & Consumption.

My preferences

It is the space where you can configure the platform language (Portuguese, English or Spanish), passwords, multiple authentication factors and email preferences. This is also where API keys can be generated.Aiming to increase security for all customers, Multiple Factor Authentication is mandatory for access to the platform.

Monitoring Settings

Monitoring Settings
are essential to calibrate the protection of your assets through Search Bots. You can also customize the most appropriate searches for your business through Keyword Libraries, segmenting the results and directing efforts to identify the main threats in each detection source. And, through the Monitoring Settings, asset management is also carried out, allowing the activation of what is most relevant to be monitored at the moment. This is where threat monitoring will be turned on and off and official data used in Bot collections will be inserted.

Axur Research Team (ART)

In addition to our integrations, automations and algorithms with artificial intelligence technology, there is also a specialized team to support you in high-impact incidents and threats, through the Axur Research Team (ART).ART's services consist of research, investigation and advisory services and are contracted through annual service hours that can be used in different activities such as analyzing malware and malicious applications, engaging with malicious actors, supporting cybersecurity-related crises, consulting on Digital Forensic Incident Response in addition to investigations into TTP's and research into new attacks and threat trends.

SmartHunt Services

The Axur platform optimizes work teams' time, requiring less labor to manage results. Still, if you do not wish to invest your internal team's time in configuring and managing the platform, you can hire our Managed Services for the following activities:

  • Initial platform setup
  • Ticket screening and validation (8 hours a day, 5 days a week) within 48 hours (ticket volume varies according to the contracted plan);
  • Structuring customized automations, reviewed periodically
  • Optimization of results and continuous delivery of value (the frequency of analysis varies according to the contracted plan);
  • Specialized searches in sources not yet covered by the Axur platform
  • Within the same scope of Axur platform offerings
  • Within the ticket limit of the contracted offer

The activities will be carried out as contracted in the Starter, Business, Corporate and Enterprise plans.

Polaris: AI-Powered Threat Intelligence for Proactive Cyber Defense

Polaris is an AI-powered cybersecurity solution that goes beyond traditional threat feeds, delivering proactive, personalized cyber threat intelligence for your organization. It continuously analyzes a wide range of structured and unstructured threat data from diverse sources, including:

  • Specialized news feeds and security bulletins
  • Vulnerability Databases
  • Technical Indicators (IOCs)
  • Vendor Security Advisories
  • MITRE ATT&CK Framework

Polaris uses AI to synthesize and structure data from these diverse sources into concise, actionable reports, providing insights that guide risk-based decision making. Polaris then filters information relevant to your company's perimeter and areas of interest, sending immediate alerts. This way, you stay informed, enabling proactive actions and ensuring the ongoing security of your organization.

Key Features:

  • Real-time Advanced Threat Analysis; Unified Attack Surface View; Actionable and Personalized Reports; Customizable Asset Mapping; MITRE ATT&CK Integration

Onboarding and Education

When becoming an Axur customer, the first step is the onboarding process with us, that is, the moment when you receive a welcome and the main guidelines for using the Axur and/or Polaris Platform. Onboarding is carried out in three suggested meetings:

‍Kick off: when presentations, alignment and knowledge transfer are made.

Axur platform training:
exclusive in the environment configured for customer use, this moment includes the presentation of work areas, detection details, configurations and possible usability.

Completion of onboarding and passing of the baton to CS:
this moment occurs approximately 30 days after the start of onboarding and your journey continues to be monitored at all times by our CS (customer success) team.

About the onboarding process:

  • Meetings may change without prior notice, depending on the needs of each client.
  • Feedback and clarification of doubts will be considered at any point in your journey with us.
  • Sending your necessary information is essential to the success of our work together.

Note: Details about values and duration will appear in the proposal, contract and general terms, according to the contracted plan or package.