Osprey
Keep your Secret Secret
Keep your Secret Secret
Our scanning technology is built with efficiency in mind. It's simply too much work to scan your corporate domain otherwise.
We don't store your organization passwords*. We rely on a cryptography to identify your exposures, without making ourselves a liability.
*excluding Osprey login credentials
Out finger-printing technology allows us to not only identify an exposure, but to also notify your security team as to which Service and which Service Account is represented in an exposure.
Osprey's password generation technology is fully decoupled from your existing technology infrastructure. Simply sign up for the SaaS, create a "service object", and create a child "service account". Once this is done, you can generate your own traceable credentials belonging to this service account.
Osprey does require the implementation of workers to monitor your infrastructure and give information back to the SaaS. We have a team of experts ready to guide your implementation, or to roll up our sleeves and contribute to your security.
Osprey can be implemented such that communication between workers and the SaaS is "one-way", specifically "Worker to SaaS". You don't have to open network access to support our product.
Yes. We want to scan your data, to ensure your credentials are not compromised or exposed. We don't send any information out of your domain except fingerprint details and the information necessary to help your security team identify the source of any exposures. That said, it is understandable that you might think twice.
For customers who prefer, we do offer options to implement our SaaS within your VPC or on-prem. Please contact us for details!
Please note that while we offer this option for your confidence, it is not recommended for general use. You will not receive updates and new features until after our SaaS customers.
Osprey monitors Emails, IMs, Logs, and File Systems such as S3 and SharePoint. Osprey will also work with our customers to ensure that any special monitoring scenarios are covered.
Our delivery teams are happy to discuss how we can help you keep your secrets secret!
We consider security of our data as well as yours as of utmost importance. We apply modern industry standards to guarantee a safe place for your information.
In the unlikely event that Osprey is compromised, we do not actually store your credentials - anywhere!* This means that the compromising actor is unable to use our information to access your systems.
* - Future product lines may require storage of some credentials. Our current product offering does not and will not require password storage. In the event that password storage is required for any reason, we will make sure communication as such is clear.