Allure Security Navigation Logo

Gartner has identified Allure Security as one of 26 ‘Example DRPS Providers’ in its recently published “Emerging Tech: Adoption Growth Insights in Digital Risk Protection Services.” Gartner delivers actionable, objective insight to executives and their teams. Its expert guidance and tools enable faster, smarter decisions and stronger performance on an organization’s mission-critical priorities. 

The report defines Digital Risk Protection Services (DRPS) as a “combination of technology and services to protect critical digital assets and data from external threats.”

Such threats include:

  • Brand impersonations (e.g., fake domains, fake/rogue apps, fake social media accounts)
  • Leaked or stolen data (e.g, credentials, credit card information, sensitive information and PII of employees, intellectual property, and code)
  • Account takeover attempts

“Gartner recognizing Allure Security means a lot to us, and we take that recognition as validation that we’re focusing on the right things in helping our customers find and eradicate online brand impersonations more quickly to reduce fraud.”

Josh Shaul
CEO | Allure Security

What does the Emerging Tech: Adoption Growth Insights in Digital Risk Protection Services research cover?

The report itself discusses DRPS growth trends based on interest among enterprises (referred to as “mind share” and based on Gartner client inquiry data) and adoption interest (based primarily on Gartner Peer Insights™ review data). Gartner Peer Insights is a public platform that offers verified, first-hand reviews of enterprise software and services from experienced IT professionals.

Evaluating a Crowded Digital Risk Protection Services Market

If more than 25 vendors offering DRPS wasn’t enough, consider that there is also overlap between DRPS, threat intelligence, external attack surface management, security rating services and other solutions. It’s easy to get overwhelmed.

In the end, what’s most important for you in evaluating DRPS is clearly defining the problem you’re trying to solve and the outcomes you hope to achieve with such a solution. Different vendors excel in different use cases.

More quickly finding and taking down more online brand impersonations before a single person falls victim

At Allure Security, two main things set us apart when it comes to digital risk protection services:

  1. Our significantly faster time-to-detection of online brand impersonations across web, social media, and mobile app marketplaces
  2. Our diligent, three-pronged approach to response – our security operations team does not give up until the content is removed from the internet 

Our AI-powered engine employs computer vision and natural language processing to find more fake websites, deceptive social media accounts, and rogue mobile apps more quickly and with greater accuracy than legacy approaches. In addition, because we monitor hundreds of millions of URLs each day and as soon as they’re visible on the internet, we can immediately jump into action – shutting down spoofs before a single person falls victim.

Allure Security’s unique, multi-pronged approach to response – blocklisting, decoy data, and takedown – also significantly reduces the lifespan of a scam and the damage it can do:

  • Blocklisting – We immediately send offending content to our growing list of partners including web browsers, internet service providers, e-mail gateways, and more to immediately erect an obstacle to spoofs for the majority of internet users. 
  • Decoy data – With our unique unique decoy data capability, we enter realistic, but ultimately useless, data into form fields on phishing sites impersonating the platform’s brand to devalue any stolen data, prompt the attacker to shut down the scam or expose themselves if they test the credentials or offer them for sale  
  • Takedowns – We take down offending content faster than our customers have experienced in the past whether they were doing it themselves, through legal counsel, or via other vendors. In addition, we believe there’s no such thing as an automated takedown. Blocklisting content is not a takedown. Submitting a takedown alone is not a takedown. We don’t consider content taken down until it’s completely removed from the internet.

Citation & Gartner Disclaimer

Gartner, Emerging Tech: Adoption Growth Insights in Digital Risk Protection Services, Elizabeth Kim, Ruggero Contum 11 November 2022

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.


What You Should Do Next

  • Learn more about online brand protection and your options for protecting your organization’s brand online with our free Busy Person’s Guide to Online Brand Protection
  • Arm yourself with the right questions to ask when evaluating vendor claims about “automated takedown” of fake websites, social media accounts and mobile apps: “Automated Website Takedowns: Not so Fast!” 
  • If you’re ready to talk about your online brand impersonation detection and response program and how Allure Security can improve your effectiveness and reduce costs, contact us.
Post Date
Author