Digital Risk Protection

Manage internal risk and external threats with CompassDRP

Your digital attack surface grows every day – as does the number of external threats. CompassDRP gives security teams visibility over both, in a single cloud-based solution. It combines the asset discovery powers of Outpost24’s EASM platform with threat-intelligence powered DRP modules. This means you can monitor your known (and unknown!) public-facing internal assets, as well as threats from external channels across the open, deep, and dark web. Once identified, these threats are prioritized and ready for remediation.  

About CompassDRP

Delivered through our SaaS cloud platform, Outpost24’s CompassDRP pinpoints high-risk attack vectors, exploitable vulnerabilities, and attack surface issues.

Continuous Discovery

Detect known and unknown assets, shadow IT, and external threats across the open, deep, and dark web.

Automation, Scoring & Prioritization

Rates the attack surface across the entire scope, on assets level and exposure to provide real time alerts and a visual overview of risk to prioritize mitigation efforts.

Risk Reduction & Compliance

Facilitate brand protection and data compliance, eliminate un-managed IT assets, weak or deprecated TLS protocols and third party risk for governance.

How CompassDRP works: Cover risk from all angles  

CompassDRP combines the benefits of External Attack Surface Management (EASM), Digital Risk Protection (DRP), and Threat Intelligence. Security teams can automatically monitor risk across their full digital footprint, all from a single tool.  

  • EASM: Gives you a digital blueprint of all your known and unknown internet-facing assets – so you’re alerted to vulnerabilities before attackers. Track the unauthorized use of your brands, logos, and assets. Combat phishing and cybersquatting with automated detection of malicious sites.  
  • DRP: These modules go a step beyond your internal assets, scanning external online channels (like social media and the dark web) for threats to your brand. Detect breached data, documents leaked from employees and third parties, and retrieve compromised credentials in real-time. 
  • Threat intelligence: The CompassDRP solution is backed up by our world-class human-led threat intelligence team, KrakenLabs.  

CompassDRP: Digital Risk Protection made simple 

CompassDRP comes with four key Digital Risk Protection elements: dark web monitoring, social media risk management, data leakage, and stolen/leaked credentials monitoring. 

Credentials

Detect and retrieve your end users’ compromised credentials in real-time. 

Data Leakage

Detect leaked documents and information from employees & third parties. 

Dark Web

Track and monitor your organization’s footprint on the dark web. 

Social Media

Track your organization’s digital footprint, including unauthorized use of brands, logos, and assets. 

Features


  • 24/7 Attack surface visibility and monitoring of all exposed assets, including unknowns and unmanaged assets
  • Accurate asset and attack surface scoring and actionable insights highlighting critical risks for effective prioritization and mitigation
  • Easily facilitate repetitive asset actions by automating them with our automation engine
  • Custom, prioritized and instant alerts
  • Save time and resources with AI-enhanced summaries of the DRP insights
  • 13+ years of historical threat data gathered from open, closed, and private sources
  • Premium attack surface discovery and human-verified delivery that minimizes false positives
  • Big data analytics with context and underlying details
  • Centralized view with detailed information on specific external threats, like stolen credentials, leaked data on underground forums, and cybersquatting domains
  • Improved workflow with a wide range of integrations including Jira, ITSM, SOAR, CAASM to drive effective triage
  • Flexible business model for different partnerships, including MSSP programs
  • Ongoing partnership with Cyber Threat Alliance (CTA)

Threat Intelligence team

Our CompassDRP solution is backed up by our world-class in-house analyst team.

Our dedicated in-house threat intelligence team, KrakenLabs understand the critical importance of staying ahead in today’s ever-evolving cyber threat landscape. We specialize in providing bespoke, in-depth threat analysis and reports tailored specifically to your organization. Our services equip you with actionable insights into the latest activities from Threat Actors including IOCs, vulnerabilities and TTPs targeting your organization in an easy to digest format. We also offer expert guidance and services on proactive measures to protect your organization including threats coming from the Dark Web, breach analysis, and OSINT assessments, to ensure your organization stays one step ahead of cybercriminals.

Frequently asked questions

What is Digital Risk Protection?

Digital Risk Protection refers to the identification, monitoring, and mitigation of digital threats originating outside your network. This includes cyber threats on the open, deep, and dark web, misuse of your brand, leaked credentials, and more.

What type of threats can Digital Risk Protection detect?

Our Digital Risk Protection solution, CompassDRP,  can detect a range of threats including unauthorized use of assets, phishing sites and malicious domains, leaked or stolen credentials, and data leaks from employees or third parties.

What is External Attack Surface Management (EASM), and how is it integrated?

EASM is the continuous discovery, analysis, and monitoring of all your internet-facing assets. Our CompassDRP solution integrates EASM with DRP and Threat Intelligence to give you a comprehensive overview of all your known and unknown assets, their vulnerabilities, and their exposure to threats.

Is CompassDRP a Digital Risk Protection (DRP) solution?

Yes and no! CompassDRP gives you all the great benefits of a DRP product, but customers also get the power of our external attack surface management (EASM) solution included too. So CompassDRP customers get to enjoy the benefits of two powerful cybersecurity tools within a single product.   

“We wanted to go a step further and gain the ability to detect and analyze external cyber threats before they affect clients’ businesses, and we needed a way to turn that ability into a global, scalable service offering.”
Nikolaos Tsouroulas Telefonica
“Since implementation in June 2013, BBVA has detected stolen data cards, identified stolen credentials, reported unique Trojans targeting online banking customers.”
Ignacio Guarrido Gonzalez BBVA

Success stories

Digital Risk Protection, powered by real-time threat intelligence, delivers continuous monitoring and rapid response to threats for business operations. Discover how these organizations among others count on threat intelligence to strengthen their DRP.

Get a free DRP live demo

Please fill in your information to submit a demo request. All fields are mandatory.

We’d be happy to schedule a live demonstration of our Digital Risk Protection solution for you.


Need support?

Downloads & Resources

EASM top features: 7 capabilities your solution needs  
EASM top features: 7 capabilities your solution needs  
EASM
External attack surfaces have never been more sprawling, or more vulnerable. As organizations increasingly rely on dynamic, cloud-based infrastructures, and third-party services, digital footprints are only going to carry on growing. So, it’s no surprise many are turning towards External Attack Surface Management (EASM) tools for more visibility into both known and unknown assets. But […]
How to monitor your organization’s presence on the dark web
How to monitor your organization’s presence on the dark web
Research & Threat Intel
The importance of checking underground dark web forums for mentions of your organization to mitigate breaches or cyber-attacks.
How to tell if your organization’s credentials have been involved in a breach
How to tell if your organization’s credentials have been involved in a breach
EASM
Stolen credentials are the easiest route into your organization for a hacker. Verizon’s 2023 Data Breach Investigation Report found that threat actors used stolen credentials in 49% of attempts to gain unauthorized access to organizations. The problem IT teams face is knowing when credentials have been stolen or leaked in a breach – otherwise you’re […]