[{"data":1,"prerenderedAt":320},["ShallowReactive",2],{"oJT9fPgKXh":3,"MiujgLReJv":29,"BinbPNEbSU":43,"LmgZkrurE9":59,"qWTQ1xZxoc":76,"1YMP5Pgpt2":93,"udrO6mol8o":110,"18NDElDXAi":121,"Jh31xijZcC":135,"lTgq3aH0WL":149,"47DEQpj8HB":166,"34s1B0eyp3":172,"7qYelOVghZ":204,"Ly41mC5sl8":221,"s0oKBEoAIy":239,"7PAkSM60mu":263,"yuMcwN5zyE":279,"6vjpvTaVJC":296},{"data":4,"body":7,"excerpt":-1,"toc":26},{"title":5,"description":6},"","Omniac: Cyber Intelligence for Your Company",{"type":8,"children":9},"root",[10],{"type":11,"tag":12,"props":13,"children":14},"element","p",{},[15,18,24],{"type":16,"value":17},"text","Omniac: ",{"type":11,"tag":19,"props":20,"children":21},"strong",{},[22],{"type":16,"value":23},"Cyber Intelligence",{"type":16,"value":25}," for Your Company",{"title":5,"searchDepth":27,"depth":27,"links":28},2,[],{"data":30,"body":32,"excerpt":-1,"toc":41},{"title":5,"description":31},"Detect identity and data theft at an early stage. Uncover global areas of attack before cybercriminals can strike.",{"type":8,"children":33},[34],{"type":11,"tag":12,"props":35,"children":36},{},[37],{"type":11,"tag":19,"props":38,"children":39},{},[40],{"type":16,"value":31},{"title":5,"searchDepth":27,"depth":27,"links":42},[],{"data":44,"body":46,"excerpt":-1,"toc":57},{"title":5,"description":45},"Omniac monitors Internet and Dark Web access data around the clock, with non-invasive analysis of external areas of attack. We inform you instantly about stolen identities, shadow IT and vulnerabilities.",{"type":8,"children":47},[48,52],{"type":11,"tag":12,"props":49,"children":50},{},[51],{"type":16,"value":45},{"type":11,"tag":12,"props":53,"children":54},{},[55],{"type":16,"value":56},"This enables you to prevent account takeovers and improve your defensive capabilities.",{"title":5,"searchDepth":27,"depth":27,"links":58},[],{"data":60,"body":62,"excerpt":-1,"toc":74},{"title":5,"description":61},"All Industries. Worldwide.",{"type":8,"children":63},[64],{"type":11,"tag":12,"props":65,"children":66},{},[67,69],{"type":16,"value":68},"All Industries. ",{"type":11,"tag":19,"props":70,"children":71},{},[72],{"type":16,"value":73},"Worldwide.",{"title":5,"searchDepth":27,"depth":27,"links":75},[],{"data":77,"body":79,"excerpt":-1,"toc":91},{"title":5,"description":78},"Your Benefits",{"type":8,"children":80},[81],{"type":11,"tag":12,"props":82,"children":83},{},[84,86],{"type":16,"value":85},"Your ",{"type":11,"tag":19,"props":87,"children":88},{},[89],{"type":16,"value":90},"Benefits",{"title":5,"searchDepth":27,"depth":27,"links":92},[],{"data":94,"body":96,"excerpt":-1,"toc":108},{"title":5,"description":95},"360° Cyber Threat Intelligence & Identity Protection",{"type":8,"children":97},[98],{"type":11,"tag":12,"props":99,"children":100},{},[101,106],{"type":11,"tag":19,"props":102,"children":103},{},[104],{"type":16,"value":105},"360° Cyber Threat Intelligence",{"type":16,"value":107}," & Identity Protection",{"title":5,"searchDepth":27,"depth":27,"links":109},[],{"data":111,"body":113,"excerpt":-1,"toc":119},{"title":5,"description":112},"External Attack Surface Management (EASM)",{"type":8,"children":114},[115],{"type":11,"tag":12,"props":116,"children":117},{},[118],{"type":16,"value":112},{"title":5,"searchDepth":27,"depth":27,"links":120},[],{"data":122,"body":124,"excerpt":-1,"toc":133},{"title":5,"description":123},"Credential Intelligence & Account Takeover (ATO) Prevention",{"type":8,"children":125},[126],{"type":11,"tag":12,"props":127,"children":128},{},[129],{"type":11,"tag":19,"props":130,"children":131},{},[132],{"type":16,"value":123},{"title":5,"searchDepth":27,"depth":27,"links":134},[],{"data":136,"body":138,"excerpt":-1,"toc":147},{"title":5,"description":137},"Digital Risk Protection",{"type":8,"children":139},[140],{"type":11,"tag":12,"props":141,"children":142},{},[143],{"type":11,"tag":19,"props":144,"children":145},{},[146],{"type":16,"value":137},{"title":5,"searchDepth":27,"depth":27,"links":148},[],{"data":150,"body":152,"excerpt":-1,"toc":164},{"title":5,"description":151},"Data Monitoring with Web Dashboard & API",{"type":8,"children":153},[154],{"type":11,"tag":12,"props":155,"children":156},{},[157,159],{"type":16,"value":158},"Data Monitoring with ",{"type":11,"tag":19,"props":160,"children":161},{},[162],{"type":16,"value":163},"Web Dashboard & API",{"title":5,"searchDepth":27,"depth":27,"links":165},[],{"data":167,"body":168,"excerpt":-1,"toc":170},{"title":5,"description":5},{"type":8,"children":169},[],{"title":5,"searchDepth":27,"depth":27,"links":171},[],{"data":173,"body":175,"excerpt":-1,"toc":202},{"title":5,"description":174},"Web Dashboard",{"type":8,"children":176},[177,184,189,197],{"type":11,"tag":12,"props":178,"children":179},{},[180],{"type":11,"tag":19,"props":181,"children":182},{},[183],{"type":16,"value":174},{"type":11,"tag":12,"props":185,"children":186},{},[187],{"type":16,"value":188},"You can use our dashboard to define what data and areas you want to monitor. Non-invasive scans take place several times each day, with results displayed in clear dashboards; you can also configure automatic warning messages and analyse the raw data. You always have an overview of your threat status, with no integration required.",{"type":11,"tag":12,"props":190,"children":191},{},[192],{"type":11,"tag":19,"props":193,"children":194},{},[195],{"type":16,"value":196},"Individual Connection (API)",{"type":11,"tag":12,"props":198,"children":199},{},[200],{"type":16,"value":201},"Use our API to automate the continuous monitoring of personal data for your employees and customers in the Darknet, Deep Web and Internet. We provide an API with detailed documentation for individual integration into your existing system landscape and offer implementation support.",{"title":5,"searchDepth":27,"depth":27,"links":203},[],{"data":205,"body":207,"excerpt":-1,"toc":219},{"title":5,"description":206},"Omniac monitors all of your corporate and partner domains.",{"type":8,"children":208},[209],{"type":11,"tag":12,"props":210,"children":211},{},[212,214],{"type":16,"value":213},"Omniac monitors ",{"type":11,"tag":19,"props":215,"children":216},{},[217],{"type":16,"value":218},"all of your corporate and partner domains.",{"title":5,"searchDepth":27,"depth":27,"links":220},[],{"data":222,"body":224,"excerpt":-1,"toc":237},{"title":5,"description":223},"The Web Dashboard provides you with a threat status overview.",{"type":8,"children":225},[226],{"type":11,"tag":12,"props":227,"children":228},{},[229,231,235],{"type":16,"value":230},"The ",{"type":11,"tag":19,"props":232,"children":233},{},[234],{"type":16,"value":174},{"type":16,"value":236}," provides you with a threat status overview.",{"title":5,"searchDepth":27,"depth":27,"links":238},[],{"data":240,"body":242,"excerpt":-1,"toc":261},{"title":5,"description":241},"Your data. Our responsibility.",{"type":8,"children":243},[244],{"type":11,"tag":12,"props":245,"children":246},{},[247,252,254,259],{"type":11,"tag":19,"props":248,"children":249},{},[250],{"type":16,"value":251},"Your",{"type":16,"value":253}," data. ",{"type":11,"tag":19,"props":255,"children":256},{},[257],{"type":16,"value":258},"Our",{"type":16,"value":260}," responsibility.",{"title":5,"searchDepth":27,"depth":27,"links":262},[],{"data":264,"body":266,"excerpt":-1,"toc":277},{"title":5,"description":265},"We fully comply with the requirements of the European General Data Protection Regulation (GDPR) and cannot access any data that your enter or transmit.",{"type":8,"children":267},[268,272],{"type":11,"tag":12,"props":269,"children":270},{},[271],{"type":16,"value":265},{"type":11,"tag":12,"props":273,"children":274},{},[275],{"type":16,"value":276},"We hash, mask and encrypt your data in the omniac app during transfer and storage. We develop and host on the secure STACKIT Cloud in Germany.",{"title":5,"searchDepth":27,"depth":27,"links":278},[],{"data":280,"body":282,"excerpt":-1,"toc":294},{"title":5,"description":281},"Ready for omniac Cyber Intelligence?",{"type":8,"children":283},[284],{"type":11,"tag":12,"props":285,"children":286},{},[287,289],{"type":16,"value":288},"Ready for ",{"type":11,"tag":19,"props":290,"children":291},{},[292],{"type":16,"value":293},"omniac Cyber Intelligence?",{"title":5,"searchDepth":27,"depth":27,"links":295},[],{"data":297,"body":299,"excerpt":-1,"toc":318},{"title":5,"description":298},"Uncover data theft. Prevent fraud. Strengthen trust.",{"type":8,"children":300},[301,308,313],{"type":11,"tag":12,"props":302,"children":303},{},[304],{"type":11,"tag":19,"props":305,"children":306},{},[307],{"type":16,"value":298},{"type":11,"tag":12,"props":309,"children":310},{},[311],{"type":16,"value":312},"Contact us for detailed information about the scope of services, integration options and prices. We are looking forward to chatting with you.",{"type":11,"tag":12,"props":314,"children":315},{},[316],{"type":16,"value":317},"Send us an e-mail:",{"title":5,"searchDepth":27,"depth":27,"links":319},[],1773847202701]