This is Strider's Elevator Pitch.
What is "Strider transforms publicly available data into strategic intelligence to secure and advance innovation"?
Shield is an ____ _____ _____ that provides verified email addresses, domain names, and key words directly linked to state-sponsored actors
WHat is an email security tool?
We use a _____ _______ ______ ______ to ensure the validity of all individuals within our platform. The process includes using multiple datapoints, including a phone number, address, university, and even a PhD advisor in certain cases to be confident that we have the correct individual.
What is a robust identity verification process?
__________ and __________ provide curated data and insights that give you visibility into state-sponsored risk targeting the technology and people within your organization
What is Risk Intelligence and Shield?
These are Strider's 5 Unique Selling Propositions
1. Global curated data
2. Proprietary Methodology
3. Patented Data Processing
4. Tailored Platform
5. Zero-touch Architecture
Supply Chain is a ___ ____ ____ _____ tool that provides visibility into state-sponsored security, compliance, and reputational risk.
What is a third-party due diligence tool?
In addition to collecting and processing open-source data globally, we also gather and process other publicly available data, which includes but is not limited to _____ and ________ data, as well as ____ ______ and ______ information.
What is patent, publications, online profiles, and CV?
If a prospect wants to provide continuous protection for their organization’s people, securing both existing and past members, as well as potential collaborators, you should consider discussing these two products.
What is Risk Intelligence and Sentry?
Strider collects publicly available data from this many unique sources around the world.
What is 40,000
Sentry is a ___ ____ _____ designed to empower your organization by promptly searching and identifying potential connections that individuals may have with state-sponsored risk
What is a due diligence tool?
"We were built for this. Strider’s data collection is done in-house by a team of intelligence and engineering experts focused on identifying and developing tools to acquire unique sources. We do not rely on third-party data providers to deliver our products. Currently, our database is continuing to grow at a rate of 12 million new documents per day." This is an appropriate answer to what commonly asked question from prospects?
"Proactively secure your organization against state-sponsored risk by identifying relevant insights concerning third-party organizations and individuals and defending against their email solicitation attempts." This outcome can be accomplished by which products?
WHat is Supply Chain, Sentry, and Shield?
"At Strider, we combine our subject-matter expertise with cutting-edge AI capabilities. Our team of subject-matter experts are uniquely qualified to uncover sources that have been historically challenging to identify and access. The data is then processed by AI capabilities under the supervision of intelligence and engineering experts." This description refers to one of our five unique selling propositions.
What is our proprietary methodology?
This product is a customized, hands-on economic security program development designed to enhance your existing security posture.
What is Services?
A key distinguishing factor between the geopolitical tactics of these two nation-states is that the People’s Republic of China typically adopts ______ approaches, whereas Russia tends to employ more ______ methods.
What is overt and covert?
"Build a holistic, proactive security response to secure your technology and people." This desired outcome can be accomplished using which of Strider's products?
What is Risk Intelligence, Shield, and Sentry?
"This capability enables rapid data capture and categorization that facilitates faster and higher quality intelligence." This process refers to one of Strider's five unique selling propositions.
What is our patented data processing?
Services is divided into these three modules.
What is Environment, Strategy, and Education.
Environment focuses on your security team understanding the external and internal threat landscape of your organization,
Strategy focuses on your security team having defined, proactive security protocol
Education focuses on how to train your employees on security-related issues
Risk Intelligence data has been verified by ____ _____ ______, while Sentry’s data is soley based on _____ ______ ________. As a result, you may find more data on individuals using Sentry than Risk Intelligence.
What is subject-matter experts and machine learning algorithms?
"Build a holistic, proactive security response to secure your technology, people, and third-party partners, including organizations as well as individuals." This desired outcome can be accomplished by which of our products?
What is Risk Intelligence, Shield, Supply Chain, and Sentry?