top of page
iStock-1307810719_edited_edited.jpg

DigitalStakeout Plans and Pricing
 

Pay-as-you scale pricing enables you to build a highly aligned OSINT capability with unmatched cost-feature benefits that can spot critical information, external threats, and risk events without busting your budget.

About: About Us

Pricing is based on the number of real-time feeds (person, place, brand, products, etc)  you need to create and the data volume of new discoveries the monitors (feeds) generate.

Starter

Starts at $450/month.

Create up to 10 monitors (feeds) with 100+ parameters.

  • Web Monitoring

  • Digital Monitoring

  • Data Aggregation

  • Alerting & Discovery

  • Custom Boolean Alerts

  • Discovery Grid

  • Custom Dashboards

  • Boolean Search

  • Filtered Views

  • Team Workflow

  • Custom Alerts

  • Automated Tagging

  • Scheduled Exports

  • On-Demand Search

  • Archiver Browser Plugin

  • Alert & Incident API

  • Custom Enrichment

  • Customized Feeds
     

  • Users: 3

  • Mentions: 100K/Month

  • Cases: 100

  • Profiles: 100

  • Retention: 90 Days

  • Support: Web, Email & KB

Pro

Starts at $925/month.

Create up to 25 monitors (feeds) with 250+ paramaters.

  • Web Monitoring

  • Digital Monitoring

  • Data Aggregation

  • Alerting & Discovery

  • Custom Boolean Alerts

  • Discovery Grid

  • Custom Dashboards

  • Boolean Search

  • Filtered Views

  • Team Workflow

  • Custom Alerts

  • Automated Tagging

  • Scheduled Exports

  • On-Demand Search

  • Archiver Browser Plugin

  • Alert & Incident API

  • Custom Enrichment

  • Customized Feeds

  • Users: 10

  • Mentions: 250K/Month

  • Cases: 250

  • Profiles: 250

  • Retention: 180 Days

  • Support: Web, Email & KB

Enterprise

Get Quoted

Create 500+ monitors (feeds) with thousands of parameters.

  • Web Monitoring

  • Digital Monitoring

  • Data Aggregation

  • Alerting & Discovery

  • Custom Boolean Alerts

  • Discovery Grid

  • Custom Dashboards

  • Boolean Search

  • Filtered Views

  • Team Workflow

  • Custom Alerts

  • Automated Tagging

  • Scheduled Exports

  • On-Demand Search

  • Archiver Browser Plugin

  • Alert & Incident API

  • Custom Enrichment

  • Customized Feeds

  • Users: 10+

  • Mentions: 250K/Month+

  • Cases: 100+

  • Profiles: 100+

  • Retention: 365 Days+

  • Support: Dedicated, Web, Email & KB

DigitalStakeout Scout Unlimited Features *

Each user in your subscription gets unlimited access and use of open features.

* Fair use policies for feature usage apply.

  • Unlimited Workflow Rules

  • Unlimited Alerts

  • Unlimited Dashboards

  • Unlimited Filtered Views

  • What is a social media threat?
    A social media threat is any type of harmful or malicious content that is posted on a social media platform. Social media threats can take many forms, including threatening or violent language, bullying or harassment, unauthorized access or hacking, and the spread of false or misleading information.
  • What threats can be tracked on social media?
    Threatening or violent language, such as direct threats of harm or violence against an individual or group. Bullying or harassment, such as repeated and unwanted messages or comments that are intended to intimidate or harm. Unauthorized access or hacking, such as attempts to gain access to an individual's or organization's social media accounts without permission. The spread of false or misleading information, such as deliberately inaccurate or deceptive content that is intended to deceive or harm. Reputational damage, such as the posting of negative or false information about an individual or organization that can damage their reputation. Personal information theft, such as the unauthorized collection or sharing of an individual's personal information, such as their name, address, or financial information. Identity theft, such as the creation of fake social media accounts using an individual's personal information, often for the purpose of fraud or impersonation. Extortion or blackmail, such as the use of threatening language or the sharing of sensitive information to force an individual or organization to do something against their will. Reputation-based attacks, such as the use of fake or negative reviews or comments to harm an individual's or organization's reputation. Phishing or scamming, such as the use of fake social media accounts or messages to trick individuals into giving out sensitive information or money.
  • What are social media threat analytics?
    Social media threat analytics uses data analysis and other techniques to identify and assess potential threats on social media. This can include analyzing text, images, and other data from social media platforms to identify patterns or indicators of potential threats, such as threatening language or suspicious activity. Individuals and organizations can use social media threat analytics to monitor their social media presence proactively and identify potential risks, allowing them to take action to prevent harm. It can also be used by security and risk professionals to assess the overall risk landscape on social media and inform their strategies for safeguarding against potential threats.
  • What features does your social media threat monitoring software offer?
    Access 25M+ sources from the surface web, social media, alt-tech, dark web, and the Internet. Automated feeds from Monitor modules to aggregate and unify all the data you need in one place. Natural language processing and proprietary extracts to normalize and link data to searchable fields. Organize your data into logical compartments to enable specific use cases by need. Machine learning, AI, and signature processes automatically tag important risk and security discoveries. Annotate your data with an unlimited real-time risk score, tag, classifier, and word-list rules. Search and investigate your aggregated data using Boolean, faceted results, word lists, and linked entities. Create unlimited user-defined email alert rules with Boolean, entity, tag, or word-list criteria. Share and collaborate on discoveries with an integrated workflow, collaboration, and case management tools. Leverage a large library of canned analytics on-demand without building charts and visualizations. Maintain situational awareness by creating multiple dashboards from a library of 50+ canned widgets. Integrate your DigitalStakeout alerts and incidents into your existing tool(s) with a simple REST API. Subject matter expert support only from practitioners with decades of experience in security and risk mitigation.
  • What is the impact of a social media threat?
    Social media threats can have serious consequences for individuals and organizations, including damage to reputation, loss of sensitive information, and legal or financial liabilities. It is important for individuals and organizations to be aware of potential social media threats and take steps to protect themselves from harm.

TRUSTED BY LEADING BRANDS & ORGANIZATIONS

High performance organizations recognize the need mitigate cyber risk and defend against cyber adversaries with sophisticated and effective solutions. DigitalStakeout products are trusted by leading brands and organizations across all markets.

medtronic.png
tiffanyco.png
pearson.png
dss.png
bonsecours.png
lexis.png
About: Clients
bottom of page