Navigation

Set your main menu in Appearance > Menus

Software Asia Limited
MENUMENU
  • ABOUT US
    • COMPANY OVERVIEW
    • OUR PARTNERS
    • JOIN US TODAY
      • AS OUR SOFTWARE PUBLISHERS
      • AS OUR PROCUREMENT MANAGERS
      • AS OUR RESELLERS
    • CAREER WITH LOGON
    • CONTACT US
  • INFORMATION SECURITY
    • Vulnerability Management
    • Multifactor Authentication
    • Threat Intelligence
    • Network Management Solutions
    • Security Information and Event Management
    • Remote Access Software
    • Systems Administration Tools
    • Robotic Process Automation
    • Data Loss Prevention
    • Data / Password Recovery
    • Asset Management Solutions
    • Identity and Access Management
    • Antivirus
    • Activity Monitoring and Surveillance
    • Forensic Solutions
    • Content Disarm and Reconstruction
  • SOFTWARE DEVELOPMENT
    • Integrated Development Environments
    • Development Components
      • UI Components
      • Networking Components
      • Office Components
      • Barcode Components
      • Communication
    • Imaging Solutions
    • Software Localization
    • Release Automation & Management
    • eLearning Authoring Solutions
    • Charting Solutions
    • PDF Solutions
    • Reporting Solutions
    • Testing & QA
    • Text Retrieval/Enterprise Search
    • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • WHAT'S NEW
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • SEARCH

Set your main menu in Appearance > Menus

Email Us Service Hotline: +852 25128491
Software Asia Limited
MENUMENU
  • ABOUT US
    • COMPANY OVERVIEW
    • OUR PARTNERS
    • JOIN US TODAY
      • AS OUR SOFTWARE PUBLISHERS
      • AS OUR PROCUREMENT MANAGERS
      • AS OUR RESELLERS
    • CAREER WITH LOGON
    • CONTACT US
  • INFORMATION SECURITY
    • Vulnerability Management
    • Multifactor Authentication
    • Threat Intelligence
    • Network Management Solutions
    • Security Information and Event Management
    • Remote Access Software
    • Systems Administration Tools
    • Robotic Process Automation
    • Data Loss Prevention
    • Data / Password Recovery
    • Asset Management Solutions
    • Identity and Access Management
    • Antivirus
    • Activity Monitoring and Surveillance
    • Forensic Solutions
    • Content Disarm and Reconstruction
  • SOFTWARE DEVELOPMENT
    • Integrated Development Environments
    • Development Components
      • UI Components
      • Networking Components
      • Office Components
      • Barcode Components
      • Communication
    • Imaging Solutions
    • Software Localization
    • Release Automation & Management
    • eLearning Authoring Solutions
    • Charting Solutions
    • PDF Solutions
    • Reporting Solutions
    • Testing & QA
    • Text Retrieval/Enterprise Search
    • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • WHAT'S NEW
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • SEARCH

icon-iris-01 Iris Investigation Platform

Map connected infrastructure to get ahead of threats

icon-iris-01

Iris Investigation Platform

Map connected infrastructure to get ahead of threats

Request Quote
Evaluation
Request Quote
Evaluation

Detect. Investigate. Prevent.

Iris is a proprietary threat intelligence and investigation platform that combines enterprise-grade domain intelligence and risk scoring with industry-leading passive DNS data from Farsight Security and other top-tier providers. An intuitive web interface and API atop these data sources help security teams quickly and efficiently investigate potential cybercrime and cyberespionage.

Features

  • Domain Risk Score
  • DNS History
  • TabSSL Profiles

Domain Risk Score

Domain Risk Score

Identify dangerous infrastructure with Domain Risk Score

  • Quickly assess whether to allow, conditionally allow, or deny various types of connections.
  • Know whether a domain is going to cause harm the moment it’s registered.
  • Gain visibility into what type of risk the domain represents.

DNS History

DNS History

Look back in time for more information about domains, registrants, and infrastructure

  • Mine 10+ years of Whois records to find connections that may not be apparent in current records.
  • See historical as well as current infrastructure associated with a domain, with access to extensive passive DNS records.
  • Track the evolution of threat actor campaigns via the domains and IP addresses they have used.

TabSSL Profiles

SSL Profiles

SSL and TLS certificates are one of the most useful datasets for profiling and connecting domains

  • Analyze the contents of the certificate to assess trustworthiness or risk level of the domain hosting the certificate.
  • Find other domains that share the same certificate.
  • Pivot to other domains shown in the Subject Alternative Name section.

Iris API Integration

Investigate API

The Iris Investigate API is ideally suited for investigate and orchestrate uses cases at human scale. These are typically triggered on-demand by an analyst seeking additional context on a single indicator, with the best results available for investigations that begin with one or more domain names.

Enrich API

The Iris Enrich API is designed to support use cases that require high query volumes with generous rate limiting and fast response times. This may include enrichment of every domain name observed on a company’s network, typically sourced from web proxy or DNS logs and surfaced in a SIEM or custom-built analytics platform.

RESOURCES

DomainTools White Papers
DomainTools User Guides
DomainTools Reports
DomainTools Survey Reports
DomainTools Case Studies
DomainTools API Documentation
DomainTools Podcasts
Request Quote
Evaluation

LOGON is a pan-asian company operating in China, Hong Kong (HK), India, Singapore, Malaysia, Indonesia, Vietnam, Philippines and Thailand. LOGON has local dedicated trained product specialists in Hong Kong, Guangzhou, Kuala Lumpur, Mumbai and Bangalore. LOGON acts both as value added reseller and sole distributor for award winning software solutions. Customers can buy new licenses, purchase upgrades and renewals from any of our local offices. Contact us for first line support during evaluations, PoCs. We offer best practices consulting services and classroom & online training. Check our site for latest offers, special discounts, bundle deals, etc..

was last modified: February 23rd, 2021 by logon

COMPANY

Company Overview
Career with LOGON
Contact Us

JOIN US TODAY

Resellers
Software Publishers
Procurement Managers

WE ARE AVAILABLE ON

SAP Ariba   coupa

gem

SERVICES

Training Services
Implemetation Services
After-sales Services
Best Practices Consulting

WHAT'S NEW

Events
Latest Updates
Special Offers

FOLLOW US ON

GET IN TOUCH

Phone:+852 25128491
Email: sales@logon-int.com

Legal   |   Privacy Policy

Important Links

  • Call me
  • Legal
  • Privacy Policy

Search engine

Use this form to find things you need on this site
Search

Results for {phrase} ({results_count} of {results_count_total})

Displaying {results_count} results of {results_count_total}

Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt
Newsletter
  • QUOTE

  • EVALUATION

  • CONTACT US

Chat with us on Line

Follow us on WeChat

Follow us on Weibo

Get In Touch
Contact Us Today
Book a Demo with us


Book a Demo with us


Free Website Risk Detection Request

    Request Quote

      * License text

      Evaluation Request

        Request a Demo !

          Search

          Results for {phrase} ({results_count} of {results_count_total})

          Displaying {results_count} results of {results_count_total}

          Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

          Generic filters
          Exact matches only
          Search in title
          Search in content
          Search in excerpt
          UserLock Video

            Get Your Document