Matchlight — dark web data intelligence system

Promote this Nomination

Additional Info

Company (that provides the nominated product / solution / service)Terbium Labs
Websitehttp://www.terbiumlabs.com
Company size (employees)10 to 49
Type of solutionSoftware

In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:

• Terbium’s approach fills a void in marketplace with few immediate peers, enabling companies to better manage risk in a dynamic business environment, combat fraud quickly, and keep assets safe.
• Matchlight can locate stolen data in hours and, in some cases, minutes. The highly automated system doesn't rely on expensive and time-consuming manual intelligence gathering, so costs and times-to-detection are minimized.
• Companies avoid the uncertainty and incident response delays common to data breaches, helping to dramatically reduce the cost of a data breach and to better manage risk and combat fraud.

Brief Overview

All organizations are exposed to risk from the dark web in the form of exposed accounts, stolen credentials, and payment card data. Consumers are also beginning to feel the strain of increased fraud and data breaches. Individuals whose payment card data was exposed in a data breach were three times more likely to become victims of identity fraud. The proportion of breach victims who become fraud victims rose to 31.7% in 2017.

Terbium Labs gives organizations unprecedented visibility into their exposure on the dark web. Its data intelligence system, Matchlight – the world’s most comprehensive, continuous, and privacy-protected dark web monitoring system – is built upon a dark web search engine, scanning the largest marketplaces and forums for stolen data and illicit materials. If any data under monitoring appears where it shouldn’t, clients receive both immediate, automated alerts and follow-up context from a dedicated team of on-demand analysts to assist with incident response and investigation.

Considering organizations report an average 200-day latency period between when an attack has occurred and when the breach is discovered, Terbium offers enterprises a new breach detection, fraud prevention. and risk management solution that proactively and continuously monitors critical data. There are many companies that claim to do dark web monitoring via unsophisticated check-the-box services. Terbium Labs differs in that its patented data fingerprinting technology and sophisticated dark web collection system is both private (monitoring for data without access to that data itself) and automated (built on a state-of-the-art dark web crawler). As a result, Terbium can monitor for very large volumes of exact data across the widest possible range of dark web sites and alert immediately if that data appears, even if it does so without being labeled with certain public “keywords” which typically make up the “data” monitored by other