Professional Documents
Culture Documents
www.intsights.com
Confidential, IntSights Cyber Intelligence, Ltd.
Demo Flow
Introduction
This document describes a 30-minute demo flow of the IntSights platform and its key features. This
document is not a demo script; its goal is to outline the items that should be covered during a demo
and provide guidelines for conducting a successful platform demo.
IMPORTANT! Make sure to utilize the complete screen of your browser while presenting the demo (press F11
in Chrome and adjust to 100% zoom).
Demo Flow
Item Action\comments Time (in Screenshot/Example
Seconds)
General platform Before diving into each module, 180 sec
overview show the 5 modules within the
platform:
• Automation: operationalize
threat intel by creating playbooks
and integrating to the existing
security stack.
*For Healthcare:
• Leaked patient data
• Compromised medical records
‘Phishing’ Explain the type of threats under 30 sec Use Cases:
this category. • Permutations of your Domains based on
your assets
‘our algorithms go over • Ongoing analysis of suspicious domains
thousands of permutations of (MX records creation, websites)
your domains, with Punycode.’ • Phishing websites
• Takedown option is available
‘Brand Security’ Explain the type of threats under 30 sec Use Cases:
this category • Social media scams
• Company’s mobile apps embedded with
malware (typically residing on an
unofficial app store)
‘Exploitable Data’ Explain the type of threats under 30 sec We use a large number of passive scanning tools
this category and find things that hackers often try to exploit
Examples:
• Unencrypted login pages
• Issues with SSL certificates
• Vulnerabilities in company websites
‘VIP’ – Executive Explain the type of threats under 30 sec Examples:
protection this category • identity theft alerts (SSNs, PII) suspicious
social media accounts for impersonation
‘Phishing’ Click on the ‘phishing’ category 60 sec
from the clear web portion – use
the Intsiights.com alert (the first
one in the list of alerts) as an
example, ‘This is a Typo-
squatting example for IntSights,
With a double ‘I’…:
then go over the UI features
• Go over the alert details:
severity, user assignment,
flagging, tags, source URL,
dates etc.
• Go over the description and
mention that if a threat
actor is involved or specific
TTP we will provide context
• Review Recommendations
Highlight the evidence
(screenshots) - provides context
on an alert without risking your
computer
UI capabilities Click on ‘Share’ – explain the 30 sec
(within the Phishing functionality and give an
alert) – Email alerts example