Our Licenses

Discover all our Kartos and Qondar plans

Licenses and prices


Kartos can be purchased through two general types of license,depending on the ultimate purpose of the monitoring:

Licenses for themonitoring companies


For the protection of the organisation

  • Defensive and control orientation.
  • Threat exposure management.
  • Proactive defence of the organisation.
  • For the remediation of exposed vulnerabilities.
  • 2 sub-types of licenses adapted to the different needs of companies.
  • Annual licenses.
KNOW PRICE

Licenses forthird-party monitoring


Monitoring the organisation’s value chain risk

  • Control and assessment guidance.
  • For real-time monitoring of third party risk.
  • Ensure that the value chain complies with the organisation's cyber security standards.
  • 2 sub-types of licenses according to the level of criticality of the relationship with third parties.
  • Annual licenses.
KNOW PRICE

Licenses for theprotection of persons


  • Protection of personal assets: bank accounts, payment cards, cryptowallets.
  • Protection of personal and professional communications: e-mail, telephones, social networks.
  • Protection of personal reputation: first and last names, nicknames, date of birth.
  • Protection against online activities that deal with personal data and involve potential threats to personal integrity or property: ID card, health card, passport, driving licence.
  • Protection against digital impersonation: first and last names, nicknames, social nicks.
  • Protection of the integrity of personal profiles on social networks: LinkedIn, Facebook, X, Instagram, Telegram.
KNOW PRICE

Do you need help to implement Kartos and Qondar in your company?

Write to us and we will be happy to help you implement the best tool to protect your organisation and monitor the risks that your suppliers may have.

I WANT TO CONTACT ENTHEC

FAQ's


Do you want to know how kartos or qondar works?

Check our FAQ’s

Kartos FAQ

How does Kartos find information?

Kartos bots automatically and continuously crawl the web, dark web, deep web, and social networks in search of information related to the client, in the same way that cybercriminals do to design, prepare, and execute their attacks. The information Kartos detects is then analyzed and filtered through AI of its development and delivered to the client in real-time.

How long does it take for Kartos to detect a threat after it is published or filtered?

By working continuously 24x7, Kartos can detect a breach or vulnerability in the monitored organization within a few seconds of it being opened or exposed. At that point, the alarm is issued to the receivers specified by the client.

Where do the sources used by Kartos come from?

They are open sources and repositories that cybercriminals usually access before preparing an attack. They are found on the Internet, the deep web, and the dark web, and our analysis of the latter goes beyond the Tor network.

Kartos analyzes Git sites where programmers share code, such as GitHub and the like; paste sites where you share snippets of text that can be code or unstructured information, such as Pastebin and the like; forums where users share information of various kinds, such as Reddit, Breached, or similar; and Information sites, like generic repositories of shared information, such as Discord or IRC.

What do first, second, and third levels mean in Kartos?

The levels refer to the information provided by Kartos to the customer.

Kartos provides three different levels of information: the first level includes general information on each of the nine categories of vulnerabilities monitored; the second level provides information on the vulnerabilities found in each category and their level of criticality; and the third level includes specific details on each of these vulnerabilities so that the organization can proceed with immediate remediation.

Depending on the type of license purchased, the customer will have access to all or only certain levels.

Are the monitoring and collection of information carried out by Kartos legal activities?

Absolutely. The Kartos platform only collects publicly exposed data on the web, dark web, and deep web, which is within the reach of anyone who knows how to find it or is interested in doing so. The Kartos platform is non-intrusive and always works outside organizations' internal and private perimeters.

If not by arithmetic average, what criteria is Kartos based on to score?

Both the Security and Reputation scores are based on the average score obtained in each of the nine categories of vulnerabilities analyzed by Kartos that affect them.

In turn, this scoring of each of the nine categories of vulnerabilities is done by prorating the score given to each vulnerability by the standard. If there is no standard for a given category, scoring is done through an algorithm based on the incident criticality measures provided by the standards.

What specific vulnerabilities does Kartos detect in social networks?

Kartos provides organizations with a unique approach to social media from a Cybersecurity and Risk perspective beyond the traditional marketing/reputation point of view. Kartos warns about phishing campaigns, fraud, and scams with corporate identity theft on social networks, web cloning, and fraudulent use of the domain or related domains. It provides the necessary information for identification and reporting, provides a Takedown service, and follows up until the domain is totally deactivated.

Does Enthec have any Takedown Service, or does it perform any service to solve the threats found by the Kartos XTI Watchbots platform?

Yes. Enthec provides a Takedown Service on Kartos's findings regarding the malicious cloning of websites and domains and the usurpation of corporate identity on social networks.

In the Kartos reports, is there any reference related to each sector?

Unlike other tools specialized exclusively in scoring, Kartos focuses on Cybersecurity and the protection of each company. Therefore, specific data are offered for remediation, and the detection time is practically immediate to facilitate remediation and mitigation. In this scenario aimed at the particular protection of companies, the sectoral comparison makes little sense since it is irrelevant to solving an open vulnerability that puts the company's security at risk.

Can the vulnerability reports found by Kartos be obtained without purchasing any of the monitoring licenses?

Vulnerability and Scoring reports are a small part of the Kartos service and are not intended to be obtained on a one-off basis. Kartos is a tool for real-time threat monitoring in the external perimeter, allowing service providers or organizations to immediately detect threats for action (remediation, mitigation) in the shortest possible time. Obtaining timely reports without them being accompanied by the rest of the capabilities goes against Kartos' ultimate goal of immediate incident response and continuous real-time protection of organizations.

Ultimately, however, Kartos' partners are responsible for designing their service to their customers.

Qondar FAQ

How do Qondar bots find my personal information?

Qondar bots automatically and continuously crawl the web, dark web, deep web, and social networks in search of information related to our customers, the same way cybercriminals do to design, prepare, and execute their attacks. The data detected by Qondar is then analyzed and cleaned through self-developed AI and delivered to the customer in real-time.

What personal information can Qondar locate at risk?

Qondar locates information and exposed data related to the protected person and their digital assets, such as their name, address, nicknames, ID, Social Security number, driver's license, telephones, emails, bank accounts, credit cards, crypto wallets, and social networks. It also analyzes conversations in forums and social networks where any data or asset of the protected person appears to detect any activity that may threaten the person, their reputation, or their assets.

Is it legal to do this type of search for personal information on the web?

Yes, of course. Qondar searches in public places, such as the Internet, the Deep Web, and the Dark Web, and only on the person who has issued the protection authorization, so its operation and the information obtained strictly comply with the privacy limits imposed by law.

How do I know that my information and data will be safe?

The development, operation, and maintenance of all the technology Qondar uses are exclusive to Enthec Solutions and do not depend at any time on applications or interventions from third parties. Therefore, the personal information obtained never leaves the platform or is diverted to any third party. In addition, Qondar's operation is 100% automated, with no human intervention required anywhere in the process.In this way, as soon as Qondar's bots detect relevant information, the information is delivered directly to the customer from the platform without human intervention or data transfer outside the platform.At Enthec Solutions, our customers' data privacy is our priority. In addition to our strict internal controls, we have external certifications, such as the ENS High Level, that guarantee the safety of our products.

How does Qondar deliver the information it has found to me?

Qondar works 24/7, so its detections occur in real-time. In addition to displaying the information on the platform, Qondar issues customizable alerts for interested parties, which arrive directly in their email.

How does Qondar help protect my integrity?

Through artificial intelligence developed in-house, Qondar analyzes conversations and activities in places that are difficult to access for the general public, such as the Deep Web, the Dark Web, and hidden forums, in which any asset related to the protected person is involved, such as their name and address, ID card, etc., to determine if they pose a potential threat and alert if they are.

How does Qondar help protect my wealth?

Qondar also analyzes conversations and activities involving the protected person's financial assets to prevent them from being used maliciously and causing economic damage.

Will I need to hire a technical professional to operate the platform?

Qondar is designed so anyone without technical or technological knowledge can use it. After you enter the name, data, and personal assets to be monitored, it starts operating autonomously.This does not prevent Qondar from being managed by the trusted professional or company the protected person prefers if the protected person so wishes.

Clients