Technical Cyber Risk Score

NormShield calculates your cybersecurity risk score with the most comprehensive and accurate technical intelligence.
Schedule a Demo

Letter Grades and Defensible Data

The NormShield Technical Report provides easy-to-understand letter grades and defensible data details behind 20 risk categories. The non-intrusive report passively evaluates third-party vendors and cyber insurance subscribers, and does not touch an organization’s systems or network assets.

https://normshield.com/wp-content/uploads/2020/08/TECHNICAL-RISK-GRAPHIC@2x.png https://normshield.com/wp-content/uploads/2020/08/technical-graphic-mobile@2x.png

NormShield follows and applies commonly-used frameworks developed by the MITRE Corporation for scoring software weaknesses in a consistent, flexible, and transparent manner, converting highly technical terms into business language for executives.

https://normshield.com/wp-content/uploads/2020/08/Icon-Patch-Management@2x.png

Patch Management

We collect details related to the version number of your systems and software from internet-wide scanners like Censys, Shodan, Zoomeye etc.

These version numbers are converted into the corresponding common platform enumeration number (CPE-ID) and are correlated with NIST NVD and MITRE CVSS databases to detect and approximate any unmitigated known vulnerabilities.

https://normshield.com/wp-content/uploads/2020/08/Icon-Application-Security@2x.png

Application Security

We collect the contents of web applications from various Internet-wide scanners and analyze them for application-level weaknesses, such as Cross Site Request Forgery, Cross Content Mixing, and Plain Text Transmission of Sensitive Information.

The results are correlated with the MITRE CWE database to detect the severity level of each finding.

https://normshield.com/wp-content/uploads/2020/08/Icon-DNS-Health@2x.png

DNS Health

We generate a DNS health report from 40+ control items collected from online services like IntoDNS, Robtex, Netcraft, and HackerTarget.

Since DNS queries are recursive, it is almost impossible to detect hacker footprints from DNS servers.

https://normshield.com/wp-content/uploads/2020/08/Icon-Email-Security@2x.png

Email Security

We collect vulnerabilities related to potential email servers and SMTP misconfigurations like open relay, unauthenticated logins, restricted relay, and SMTP ‘Verify’ vulnerabilities from online services like MxToolbox and eMailSecurityGrader.

https://normshield.com/wp-content/uploads/2020/08/Icon-SSL-TLS-Strength@2x.png

SSL/TLS Strength

SSL/TLS configurations and vulnerabilities are provided by several third-party online services.

NormShield results for this category come from various online SSL grading services, including Qualys SSL Labs scanner, HTBridge, and Mozilla Website Observatory.

https://normshield.com/wp-content/uploads/2020/08/Icon-Leaked-Credentials@2x.png

Leaked Credentials

There are more than five billion hacked emails/passwords available on the Internet and underground forums. NormShield identifies the leaked or hacked emails and passwords.

https://normshield.com/wp-content/uploads/2020/08/Icon-IP-Domain-Reputation@2x.png

IP/Domain Reputation

An Asset reputation score is based on the number of IPs or domains that are blacklisted or used for sophisticated APT attacks. The reputation feeds are collected from VirusTotal, Cymon, Firehol, BlackList DNS servers, and more.

https://normshield.com/wp-content/uploads/2020/08/Icon-Social-Network@2x.png

Social Network

Hackers often publicize their targets or victims on social networking sites to motivate other hackers to attack the same target. The results for this category are filtered from billions of social media posts.

https://normshield.com/wp-content/uploads/2020/08/Hacktivist-Shares@2x.png

Hacktivist Shares

Hackers publicize their targets in underground forums or the dark web. NormShield collects information from hundreds of dark forums, criminal sites and hacktivist sites, and filters the results for the corresponding company.

https://normshield.com/wp-content/uploads/2020/08/Icon-Fraudulent-Domains@2x.png

Fraudulent Domains

Fraudulent domains and subdomains are extracted from the domain registration database, which holds more than 300M records.

https://normshield.com/wp-content/uploads/2020/08/Icon-Fraudulent-Applications@2x.png

Fraudulent Applications

Fraudulent or pirate mobile or desktop applications are used to hack/phish employee or customer data. This category identifies possible fraudulent or pirate mobile/desktop apps on Google Play, App Store, and pirate app stores.

https://normshield.com/wp-content/uploads/2020/08/Icon-Digital-Footprint@2x.png

Digital Footprint

A digital footprint is determined by open ports, services, and application banners. This information is gathered from NormShield crawlers, Censys, VirusTotal, Robtext, Alexa, Shodan, and others.

https://normshield.com/wp-content/uploads/2020/08/Icon-Information-Disclosure@2x.png

Information Disclosure

Company employees often inadvertently disclose local IPs, email addresses, version numbers, and Whois privacy records, and sometimes even misconfigure a service in a way that exposes sensitive information to the internet. NormShield identifies these potential disclosures.

https://normshield.com/wp-content/uploads/2020/08/Icon-Attack-Surface@2x.png

Attack Surface

Attack surface is the technical analysis of open critical ports, out-of-date services, application weaknesses, SSL/TLS strength, and any misconfigurations.

This information is gathered from Censys and Shodan databases and service/application versions are correlated with Passive Vulnerability Scan results.

https://normshield.com/wp-content/uploads/2020/08/Icon-Brand-Monitoring@2x.png

Brand Monitoring

Brand monitoring is a business analytics process that monitors various channels on the web or media to gain insight about the company, brand, and anything explicitly connected to cyberspace.

https://normshield.com/wp-content/uploads/2020/08/Icon-Network-Security@2x.png

Network Security

This section analyzes network-level problems and detects any critical ports, unprotected network devices, misconfigured firewalls, and service endpoints.

https://normshield.com/wp-content/uploads/2020/08/Icon-DDoS-Resiliency@2x.png

DDoS Resiliency

This section shows the result of 15 different potential DDoS checks and detects any potential DDoS amplification endpoints. The data is collected from non-intrusive scanners and internet-wide scanners.

https://normshield.com/wp-content/uploads/2020/08/Icon-Web-Ranking@2x.png

Web Ranking

Cisco, Alexa and Majestic track web sites and rank them according to popularity, backlinks, and references. This subcategory shows Alexa and Majestic trends, Google Page insight speed test results, and Web Content Accessibility Guidelines (WCAG) 2.0 parsing compliance findings.

https://normshield.com/wp-content/uploads/2020/08/Icon-CDN-Security@2x.png

CDN Security

Companies use content delivery networks (CDNs) — large distributed systems of servers deployed in multiple data centers across the Internet — for online libraries like JQuery.

NormShield analyzes the CDN content to detect possible vulnerabilities.

https://normshield.com/wp-content/uploads/2020/08/Icon-Website-Security@2x.png

Website Security

This is a special analysis of a company’s main website. We collect findings related to your SSL/TLS strength, patch management, application security, web ranking and brand monitoring.

Learn more about the 20 risk categories

Vulnerability Prioritization

NormShield® provides a graphical distribution in the form of a heat map to determine the status and severity of each finding. Our platform leverages MITRE and NIST to further confirm the criticality of each threat.

Strategy Report

NormShield’s Strategy Report shares feedback to help executives to understand their cyber risk posture and scale return on cybersecurity investments. The report provides simple steps to help remediate issues and mitigate cyber risks with suppliers and partners.

Ticketing System

NormShield’s ticketing system provides a paper trail for problem areas and the status of their remediation.

With the click of a button, you can share specific findings with any contact. Users can submit tickets through NormShield’s Ticketing System, or through ServiceNow.

trusted by

Get In Touch