- What Is Social Media Monitoring?
Social media monitoring is the practice of gathering and overseeing public activity on social media. Monitoring tools are designed to aggregate publicly available data from multiple networks, and display it in a format that is digestible by the end user.
Social media monitoring tools pull information from a range of social networks as well as some traditional media outlets. These tools do not have access to private data.
While many companies provide monitoring capabilities that are geared towards marketing and engagement, Echosec focuses on functionality and data sources geared towards security and threat intelligence.
- What Networks Does Echosec Systems Access?
Our platforms gather data from thousands of well known and niche sources including deep and dark web sites, social media, discussion forums, news sites, and databases.
Our sources include but are not exclusive to:
- Deep Paste
Contact us for the complete list of data sources.
- Why Not Facebook And Instagram?
In March 2018, news broke that the political consulting firm, Cambridge Analytica, had collected and used Facebook user data to inform political campaigns. This data was exploited without user consent, violating user data rights and privacy.
Long before the scandal, both Facebook and Instagram had begun tightening their security settings to disallow broad monitoring. That means data aggregation platforms, including Echosec, have not had terms-compliant access to these data providers since 2016. Compliance and ethics are at the forefront of Echosec Systems’ mission and product design—the platform only collects public data in compliance with each data provider’s acceptable use policies, as well as acceptable use policies to comply with regulations such as the GDPR.
- Who Uses Echosec And Beacon?
Echosec and Beacon are built to provide mission-critical information about digital and physical threats for security and public safety teams.
Our corporate security clients are primarily in-house security teams in retail, oil and gas, healthcare, e-commerce, and manufacturing. Our public sector clients are intelligence agencies, fusion centres, regional and national law enforcement and defense.
- How Does The Technology Work?
In less than a second, our service is capable of contacting thousands of data sources, and aggregating and normalizing their response. Our systems scan the web for images and priority keywords around the clock, so our clients are alerted when issues arise.
- Does Echosec Systems have an API?
Yes. The Echosec Systems Platform API provides access to a mixture of social media, deep, and dark web data sources that are otherwise not searchable through most commercial and official APIs.
Searchable content is tagged and classified by Echosec Systems' threat models to aid in business risk intelligence automation.
Contact us to learn more.
- What is Deep and Dark Web Search?
The deep web includes any online content that is not discoverable or indexed in common search engines like Google. The deep web comprises about 90% of all web content. It consists of mostly benign or private information, such as banking pages or internet archives—but it also includes forums, classifieds, and paste sites. These sites are frequently used by hackers.
The dark web is a small corner of the deep web that is only accessible through Tor, which anonymizes users through a process called “onion routing.” The dark web consists mainly of discussion sites and marketplaces. This is where cybercriminals sell and discuss a variety of illegal goods and services.
Beacon is a deep and dark web search platform which allows users to safely explore hidden web content to detect threatening content. A user-friendly interface enables individuals of all technical backgrounds to begin searching immediately. In addition, advanced search filters enable technical users with experience in cybersecurity to define detailed search parameters.
- Is Beacon Safe To Use?
Yes. With Beacon, you get aggregated data from deep and dark web sites without having to access the dark web yourself. This ensures you and your system are protected.
- Do I Need Tor?
Yes and no. Beacon finds the data that pertains to your search parameters, and leads you to the parsed data associated with it, including any URLs accessible with a Tor browser. To follow any .onion links delivered on Beacon, you will need to use a Tor browser, however you will have a direct URL to the page containing the information you are looking for, as opposed to searching in the dark.
- How Much Do The Platforms Cost?
Echosec and Beacon have customized pricing tiers depending on your team size and data requirements. Contact us to book a call with our team.
- Can I See A Demo?
Yes. Book a demo using this form.
- Is Training Included?
Yes! Our goal at Echosec Systems is to set you up for success with our platform. Your license includes thorough onboarding, support, and access to our digital course, “Echosec Essentials”.
Learn more about Customer Success with Echosec Systems.