PROACTIVE SECURITY SOLUTIONS

Shift your cybersecurity to predictive prevention by supercharging your reactive controls with Picnic human risk intelligence.

HUMAN RISK API

Enrich your existing user metadata with individual user risk intelligence and exposure information without ingesting exposed PII.

While you can access user risk metadata and exposure information by logging into the Picnic dashboard and via reports, a REST API enables the seamless operationalization of that human risk intelligence without ingesting exposed PII. Injecting Picnic intelligence into your IdP, IAM, EDR, SIEM, SOAR, Email Security, and Cyber Awareness Training platforms via API supercharges your security controls and enables a human-centric cybersecurity strategy.

For API documentation, visit the Picnic Developer Portal

Picnic Human Risk API enables you to:

Human Risk API Sample Data

/individuals/UUID
Description
Sample Content
attributes
Identifiers like name and work email, general indicators of coverage like the number and type of monitored email addresses, physical addresses and phone numbers.
John Doe, [email protected], 3 Work Emails, 2 Personal Emails, 4 Addresses, 2 Cell Phone Numbers
risk_scores
Overall social engineering risk scores by quintile and benchmark scores relative to peers.
Overall Risk High, Accessibility Risk Moderate, Value Risk Critical, Peer Benchmark Higher, Peer Benchmark 67%
threat_scores
Individual risk by social engineering threat, including Corporate Email Spear Phishing, Password Cracking, Credential Stuffing, etc.
Identity Theft Critical, Password Cracking High, Credential Stuffing Moderate
flags
Lower-level metrics created by picnic that inform risk calculations like “exposed personal cell phone”, “has privileged technical access” and “has additional employment”.
Exposed cell phone number TRUE, exposed home address TRUE, privileged technical access TRUE, LinkedIn Account TRUE, Insider Threat Risk TRUE
breaches
Aggregate exposed beach content and exposure within individual breaches, such as the total count of breaches, the most recent breach date, count of exposed cleartext passwords, the number of accounts tracked, type of accounts tracked and the exposed content type(s) per individual breach.
Total Breaches 31, Last breach 5/21/21, Exposed Cleartext Passwords 12, Breach 1 Name, Breach 1 Description, Breach 1 Exposed Data Categories, Breach 1 Date…
passwords
Password metadata including the number of unique passwords, the number of ciphertext passwords and the aggregate password strength/sophistication. Exposed passwords are available via Picnic’s compromised credential API.
Unique Cleartext Passwords 7, Unique Ciphertext Passwords 11, Last Unique Password Exposure 11/12/20, Password Strength 58

COMPROMISED CREDENTIAL API

Automatically and continuously protect your organization against compromised credential reuse.

Most employees reuse passwords from past jobs and personal accounts within their current work environment. Most do not know if their credentials were exposed in a breach, and threat actors can exploit this blind spot in your organization to conduct credential-stuffing attacks.

Picnic provides visibility and continuous monitoring of breach data to identify exposed corporate, personal, and third-party credentials and automatically prevents their reuse within the organization. A native integration with Microsoft Active Directory that bypasses the 1000 password limit is also available.

Picnic Compromised Credential API enables you to:

How it works

DM DEFENDER MOBILE APP (beta)

Anti-smishing protection & intelligence

Security teams have been forced to cede control to users when it comes to smishing attacks that bypass existing controls. Besides the potential for real damage, there is a lack of visibility in detecting attack patterns and identifying coordinated attacks.

Picnic has developed the first-ever comprehensive anti-smishing and threat intelligence collection solution that enables Security teams to gain smishing visibility and control and prevent users from making bad security decisions. DM Defender is a component of the Picnic platform and integrates with your existing security stack to deliver intelligent protection.

DM Defender enables you to:

How it works

Picnic Outcomes and Benefits

  • Protect high-value targets and their families

    Personalize protection against social engineering and harassment, prevent impersonation, and deliver customized reports.

  • Reduce your human attack suface

    Emulate attacker reconnaissance of your entire organization's human attack surface, analyze social engineering threat exposure, and automate continuous external data broker takedowns.

  • Harden your human attack suface

    Integrate with business messaging apps such as Microsoft Teams and Slack to automate private critical risk alerts to your at-risk users and prioritize cyber awareness coaching.

  • Shift to predictive prevention

    Take proactive security beyond external remediations and dynamically supercharge your internal security controls with Picnic human risk intelligence.

Compare Services

Visit the Pricing page to view the differences in coverage between services and assess how you would combine them for optimal coverage of the human element in your organization.

See Picnic in Action

Choose an available date and time that works best for you for an introduction to Picnic.

Scroll to Top