Platform Capabilities

EVERYTHING YOU NEED TO
ASSESS VENDOR RISK.

From automated scanning and scoring to continuous monitoring and questionnaires — LiveThreat handles the full lifecycle of third-party risk assessment.

// CORE CAPABILITIES

SCAN. SCORE. MONITOR.

🔍

Automated Domain Scanning

Submit any domain and receive a full security posture analysis in under 5 minutes. We scan for compromised systems, DNS configuration, email security, encryption standards, and more.

📊

250–900 Risk Scoring

Our proprietary scoring model evaluates three weighted categories — Compromised Systems (55%), Diligence (35%), and User Behavior (10%) — to produce a single composite score with letter grade.

📡

Continuous Monitoring

Set scan intervals from daily to monthly. Receive real-time alerts when a vendor's score changes, a new vulnerability appears, or a risk threshold is breached.

🌐

Dark Web Intelligence

LiveThreat monitors dark web marketplaces and paste sites for leaked credentials, exposed databases, and compromised assets tied to your vendors' domains.

📋

QFX Questionnaires

Send AI-assisted vendor questionnaires powered by Verisq's patent-pending QFX Assessment Framework. Track completion, auto-score responses, and flag incomplete answers.

📄

PDF Scorecard Reports

Export branded PDF reports with full scoring breakdowns, risk vector details, trend charts, and compliance mapping — ready for board presentations or audit evidence.

// RISK VECTORS

WHAT WE SCAN

Compromised Systems (55%)

  • Botnet activity & C2 connections
  • Malware distribution indicators
  • Spam relay detection
  • Known exploit exposure
  • Dark web credential leaks

Diligence (35%)

  • SSL/TLS certificate validity
  • DNSSEC implementation
  • SPF, DKIM, DMARC records
  • HSTS & security headers
  • Open port exposure

User Behavior (10%)

  • Phishing susceptibility signals
  • Social engineering exposure
  • Credential hygiene indicators
  • Public data exposure patterns
  • Employee security posture
// INTELLIGENCE

BREACH INTELLIGENCE

Continuous threat monitoring from 20+ intelligence sources, correlated against your vendor portfolio.

📡 Breach Feed Harvesting

Automated collection from HIBP, CISA KEV, security RSS feeds, and breach disclosure databases. Updated every 6 hours.

🔔 Vendor-Matched Alerts

When a breach matches one of your monitored vendors, you're notified immediately via email and dashboard — before you read about it in the news.

📧 Daily Intelligence Digest

Curated daily email with severity-ranked breach items, vendor alerts, and emerging threats relevant to your portfolio.

🗺️ Domain Infrastructure Maps

Visual DNS reconnaissance showing host records, subdomains, ASN distribution, and domain ownership via RDAP/WHOIS lookups.

🔓 Credential Exposure

Check vendor domains against breach databases for exposed credentials, PII leaks, and password dumps — aggregate counts, never raw data.

📡 Public RSS Feed

Subscribe to our curated breach intelligence feed via RSS for integration with your existing security tools and SIEM platforms.

View Live Breach Feed →
// ARCHITECTURE

BUILT FOR SCALE

Multi-Tenant Architecture

Full data isolation between organizations. Each tenant operates in a dedicated logical partition with encrypted storage and role-based access controls.

Azure-Native Infrastructure

Hosted on Microsoft Azure with geo-redundant storage, auto-scaling compute, and SOC 2 Type II compliant infrastructure. 99.9% uptime SLA.

REST API & Webhooks

Full programmatic access via RESTful API. Configure webhooks for real-time score change notifications integrated with your SIEM or GRC platform.

SSO & RBAC

Enterprise single sign-on via SAML 2.0 or OIDC. Granular role-based access control with audit logging for every action.

START ASSESSING YOUR VENDORS TODAY.

No credit card. No contract. Free vendor assessments.

Try 5 Vendors for Free →