Introduction¶
SATAYO correlates information from multiple sources and provides an overview of your company from an outside perspective, highlighting vulnerabilities and potential attack vectors exploitable by cybercriminals. The data is collected through OSINT sources and is thus publicly available on the Internet.
Starting from the organization’s domains, SATAYO performs daily scans of the Surface, Deep and Dark Web to collect items such as host names, IPs, e-mails, data breaches and much more. The elements into which the information is classified are explained in detail in the section SATAYO Items.
SATAYO service¶
The SATAYO service is available in three different modalities:
One Time
SaaS (Software as a Service)
SaaS & Managed
All offer full access to the data collected by the platform, and the main difference lies in the way evidence is evaluated.
With the One Time service, a SATAYO scan will be available for a couple of weeks and you can access the platform independently to check the collected evidence.
With the SaaS service, you can access SATAYO at any time and independently check the collected evidence. New scans will be launched periodically, as described in the section How does SATAYO work.
With the SaaS & Managed service, you have all the benefits offered by the SaaS version, and SATAYO is connected with Atlassian Jira. Our team manages the analysis of suspicious results, and tickets with mitigation instructions are opened in Jira for you. You are automatically notified when a new ticket is available. You also have the option to open tickets on your own and request analysis of a specific piece of evidence that you feel is important. More information can be found in the section Managed Service.
For all the modalities of SATAYO we provide this user guide, where you will find a variety of information, from the registration process to interaction with all sections of the platform.
Start from here: Getting Started.