In this article we will discuss:
- Use cases currently leveraging Brights’ data collection networks
- How Bright Data implements industry-leading security standards
Use cases currently leveraging Bright’s data collection networks
Companies integrate their systems with Bright’s data collection capabilities in order to enhance their ability:
- To carry out security research
- To prepare for future cyber threats
- To protect their business entities/customers/products on a day-to-day operational level
The synergy that is created with these security organizations is a huge force multiplier in our joint effort in making the web a safer, more transparent environment for everyone.
Some interesting business/NGO use cases in this context include:
One: The non-profit malware, and botnet project
An NGO that chose Bright’s data collection platform to track bad actors’ sites and keep the community informed. Using Bright Data’s infrastructure, the project can overcome potential malicious actors’ methods of disguise, as well as identifying, and differentiating the ‘bad sites’ from the ‘good ones’.
Two: A threat intelligence and mitigation agency
Collects data from various sources on potential threats (hacker forums, blogs, social, app forums, etc). This dataset is the foundation of their intelligence insights, which are then shared with their wide network of customers.
Three: The security department of a leading bank in the US
Relies on Bright data’s platform to mitigate security risks targeted at the bank:
- They conduct threat actor research, inspect phishing links, and analyze malware in a safe environment (sandbox)
- They scan the web for phishing sites related to bank assets i.e scamming websites/assets that are aimed at fraudulent attempts to obtain sensitive information such as usernames, passwords, and credit card info.
Four: Cyber Security firm
They focus on preventing socially engineered attacks carried out against enterprise accounts. Analyzing data aggregators, and brokers’ sites to discover what public information is being displayed about them on the web. They view these sites as US-based residential IPs, which enables them to share a wider scope of view with their customers.
Five: A leading privacy, and web security company
They collect data from over 150 websites for their customers, validating that no personal information is being stored helping protect them from privacy breaches/data leaks.
They also perform email and web security, collecting data on phishing websites, by checking target URLs before clients reach out.
How Bright Data implements industry-leading security standards
Bright Data’s network-based products are certified and whitelisted by leading security organizations, such as Clean Software Alliance, AppEsteem, Mcafee, Avast, AVG, and others. Learn more on how our products comply with leading security standards.
Here are the top-four reasons why Bright Data’s Know Your Customer (KYC)-first approach has helped pioneer one of the safest, legally compliant, and ethical data collection networks:
- Bright Data runs a security vulnerabilities program, inviting anyone who has found a security or privacy issue in any of its products, to share this with the Bright Data team. This ‘bounty program’ that is open to the general public speaks to Bright’s commitment to transparency, as well as to maintaining the highest security standards in the industry.
- Bright Data performs real-time compliance which includes a dedicated Compliance Officer, and a team who performs regular log checks to ensure that all network use cases are legal and compliant. Bright Data has a zero-tolerance policy for network abuse, including:
- Click fraud
- Copyright infringement
- Fake traffic generation
- Dishonest social engagement
- Sports betting
- Bright Data is a big believer in third-party validation. That is why independent security firms regularly perform audits, such as ‘Herzog Strategic’ which thoroughly reviewed Bright Data’s network policies, and activities.
- Code-based prevention and technological response mechanisms, mean that potential user network abuse is stopped dead in its tracks(including attempts at reselling, ad fraud, Denial-of-Service Attacks (DDoS), and other malicious activities). Bright Data developers are responsible for their own full-cycle testing of new features, as well as releasing an average of 60 daily BAT (Build-and-Test)system upgrades.
The bottom line
Data is a key component of running digital-first business interactions. This is especially true in the cybersecurity field in which solid/reliable data points are the first walls of defense against potentially malicious actors.
Interested in exploring security partnership opportunities?
Ofir Meir | Director of Security Partnerships, Bright Data |