Security as a Service

Services to protect your digital identity and your emails.

TIKAJ provides an end-to end Anti-Phishing solution, from monitoring & detection of phishing incidents, through to the site take-down incident response and resolution of an incident.

TIKAJ monitors social media spectrum and main stream media for the use of keywords related to your brand for cases of brand abuse and fraudulent sites/pages. This provides an amazing ability to find social media accounts that may be impersonating not only your brand but also senior executives in a fraudulent or abusive manner.

TIKAJ also provides options to monitor other regional social media platforms on specific requirements by clients. All data sources are collectively analysed for the use of a client's brand. Any page detected is notified to the client for further action. The client is in control using the client portal if the detected page should be marked a whitelist, incident or should be ignored. The suspected abuse will immediately be taken to the next process of site down, or seek to have the post removed via the normal Incident Response channel.

An increasing number of companies are providing their customers with ease of use mobile applications (Apps), including financial institutions for users to access their online accounts. Mobile Apps are available from trusted Apps stores (such as Apple iTunes store), not so trusted marketplaces, and from general websites on the internet.

Criminals are turning to the mobile space producing mobile malware and fake or rogue mobile Apps. This can result in hijacked sessions, taking control of the mobile device, or man in the middle attacks.git

All companies should be concerned about the security and brand reputation issues around this type of criminal activity, even if the company does not yet have mobile apps, the criminals could still create and distribute an App claiming to be from the legitimate company.

TIKAJ would validate all mobile apps detected on 3rd party stores with the client before initiating any "cease and desist" and takedown orders. The takedown orders can be sent to us via multiple channels like email, telephone call, or via the client portal.

TIKAJ provides a comprehensive monitoring solution to monitor for rogue, unauthorised Apps, using the client's brand.

With the release of new gTLDs (786 extensions completed as of Nov 2015) there is a major threat to domain name brand abuse. Criminals are registering domains as "your" brand to launch attacks. Tactics include close matches and typo-squatting.

There is an increase in the threats like counterfeiting, phishing and cybersquatting. We monitor across all the gTLDs for unauthorised domain registrations and "cousin" domains which are look-alike domains, for example: www.bank.com = www.bbank.com, using our contextual correlation engine which minimises false positives to provide much effective results and incident response. TIKAJ monitors the root domains, existing gTLDs and any new gTLDs coming up on a daily basis.

Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Hackers install malware on popular web sites by exploiting security weaknesses on their servers and thus gaining full access to the compromised web site. In most cases the malicious code is not visible or easily detected, and it infects computers of web site visitors when they simply browse this web site.

The risk is that once a malware infects certain computer, hackers then can take advantage of those compromised devices in various ways, including: logging users' keystrokes, using the compromised computer to send spam, converting it to become a part of a bot, distribute more malware or simply modify search results provided by search engines like Google, Bing and Yahoo.

TIKAJ investigation technology utilizes non-signature investigation approaches, which are based on content emulation and penetration testing. This technology is capable to recognize encoded JavaScript code and binary shell-code inside legitimate media files and digital documents.

Bots are essential for many functions of the internet, for example the "Good" bots that generate search engine traffic.Majority of the website attacks are being carried out by the "Bad" bots, which attempt to retrieve or post information on your site.Using superior client classification, crowdsourcing and reputation scoring, we distinguish between "good" and "bad" bot traffic.

This allows the blocking of known bad or suspicious bot activity such as comment spam, scraping and vulnerability scanning, while making sure that legitimate bots such as Google, Facebook and website monitoring sites can freely access your website.

With the advent of the dark web scores of threats have surfaced over the digital space.The dark-nets which constitute the Dark Web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks like Freenet, I2P, and Tor, operated by public organizations and individuals.TIKAJ provides monitoring of various forums, use-nets, blogs to customers based on their specific needs, which arms our customers to proactively detect threats.

Login

Get Information

Are You Protected By DMARC?

The first step in how to implement a DMARC policy, is checking to see if you have one!

Social media intelligence

Get a free social media intelligence report for your brand/keyword!