FAQ¶
What is SATAYO and how does it help with cyber exposure assessment?¶
SATAYO is a Cyber Threat Intelligence (CTI) platform that uses OSINT (Open Source Intelligence) to collect and correlate publicly available data about your organization’s digital footprint. It visualizes potential attack vectors such as phishing domains, exposed credentials, stolen accounts, vulnerabilities, and other indicators from the surface, deep, and dark web.
How does SATAYO collect and update threat data?¶
SATAYO performs regular scans of publicly visible sources. It runs daily or weekly routines to update the collected evidence and also executes comprehensive scans every two months to compare new findings against past results. Users can receive notifications (e.g., email or Telegram) for new discoveries.
What types of evidence and threat items can users explore in SATAYO?¶
Within the SATAYO platform, evidence is categorized into multiple item types, including hostnames, domains (suspicious, correlated, phishing, etc.), exposed credentials, potentially confidential data (e.g., files, buckets, GitHub data), mail servers, personal information (phone numbers, emails), breached account data, and more. This allows analysts to pivot through diverse data relevant to exposure
What is the Exposure Assessment Index Value (EAIV)?¶
EAIV (Exposure Assessment Index Value) is an indicator continuously calculated by SATAYO that indicates the potential impact caused by a cybercriminal’s exploitation of information collected by the platform. EAIV is calculated for the three macro-sections considered by SATAYO:
Infrastructure
Data, Files & People
Deep & Dark Web
In the section Report, the metrics used to calculate EAIV are shown for each macro-section. EAIV is assigned a value from 0 to 100. The higher the value, the greater the potential impact. The goal, using the evidence collected by SATAYO and the related remediation suggestions made available during evidence analysis, is to lower the EAIV value, thereby reducing the potential impact caused by information exploitation.
What security features and user settings are available in SATAYO?¶
Users can configure multi-factor authentication (e.g., 2FA via Google Authenticator), set up alerts for new findings, and manage notification preferences. In the settings section, users can also access ransomware monitoring, security news feeds, and track managed service tickets.
How can I contact the SATAYO Cyber Threat Intelligence (CTI) team for support or inquiries?¶
To contact the CTI team or get support related to SATAYO:
You can use the Support section within the SATAYO platform settings, in this case you’ll be able to proceed with standard request related to SATAYO service or the platform.
You can also reach out via RFI (Request for Information) and open a ticket as described in the Managed Service section of this guide.