We hope we’ve made our service straightforward and easy to use, but in the event you have any questions or need a little help and you can’t find an answer in the FAQ below or our support articles, you can raise a specific question using the chat in the bottom right or email us directly on email@example.com
Our initial use case is that of customer records, and the seeds we are offering are email type seeds. In the near future, we will extend the range of seed types to suit a much wider array of use cases, including intellectual property, workforce identities, financial information, 3rd party suppliers and contracts.
We are working on our first integration, to support the customer records use case, with the help of a major global CRM provider (guess who?). As we extend our seed types, we will also extend our integrations catalogue, with future partnerships including Office365, GSuite, AWS, Azure, Google Cloud Platform, and many other commonplace SaaS partners.
Until our integrations come on-line, seeds will be added manually. We find an ideal route to do this is via newsletter subscription pages on your website, or other opt-in moments in the customer journey. You can also add seeds directly into your databases, if you have access
We are continuously and proactively searching the internet and deep/dark web for sign of activity against our seeds. If we send you an alert, it means we have sight of a seed. It could legitimate, in that you intend to share data with a third party and they have emailed us, or it could be the more negative scenario, in that your security controls have failed to protect our seed, either through a theft incident or maybe a misconfiguration. The additional analysis we do and reports we provide will help determine which of these scenarios is true
This is an entire cybersecurity discipline in its own right. There are many response options, and selecting the right one will depend on many factors, such as the nature of the incident, your business and risk appetite, your own capabilities and any partnerships in place. Summary advice is that following a mature framework such as NIST will help; prepare in advance, detect and analyse alerts, contain and recover from incidents, review incidents for lessons, repeat.
We will publish longer-form articles on how to response to specific incidents in our support posts, below
As veterans of the cybersecurity industry, be assured that we take the security of our platform very seriously. We have incorporated 'secure-by-design' principles in our thinking from day 1, ensuring the confidentiality, integrity and availability of our service throughout plan, design, build, test and operations activities.
We provide full details of our measures and processes on our Security page.