Skip to content

Brand Protection Overview

The Brand Protection module is your centralized command center for monitoring threats that target your organization's brand identity. It aggregates findings from five sub-modules -- phishing sites, domain squatting, fake applications, executive monitoring, and social media impersonation -- into a single dashboard that gives security teams immediate visibility into brand abuse activity.

Overview

Brand Protection Overview

Hero Metrics

At the top of the dashboard, four hero metric cards provide an at-a-glance summary:

MetricWhat It Shows
Total IssuesCombined count of all brand protection findings across every sub-module (sum of Critical + High + Medium + Low severity)
Domain IssuesNumber of domain-related issues including phishing URLs and domain squatting findings
Fake AppsCount of counterfeit mobile applications detected on Google Play Store and Apple App Store
Social ImpersonationsNumber of social media accounts impersonating your brand or executives

These metrics update dynamically based on the selected time filter. Use the dropdown in the header to switch between Today, Last 7 days, Last 30 days, or This Year.

Severity Breakdown

Below the hero strip, the Total Brand Protection By Severity card displays counts broken down by risk level:

  • C (Critical) -- Active brand abuse with confirmed credential harvesting or malware distribution
  • H (High) -- Live impersonation sites or apps with significant reach
  • M (Medium) -- Registered lookalike domains or low-traffic impersonation pages
  • L (Low) -- Inactive or parked domains, minor brand mentions

Dashboard Panels

A donut chart visualizing the composition of domain-related issues (phishing URLs, typosquatted domains, etc.) with a total count in the center. If no domain issues exist, a green checkmark confirmation is displayed.

Latest Takedowns

A table showing recent takedown requests with three columns:

ColumnDescription
Takedown InfoTitle or URL of the entity being taken down
ModuleWhich sub-module originated the request (Phishing, Domain Squatting, Social Media, etc.)
StatusCurrent takedown status (Requested, In Progress, Completed)

Fake Applications

A summary table listing detected counterfeit applications with their name and the store where they were found (Play Store or App Store).

Social Media Impersonations

A table displaying impersonation accounts with columns for Account name, Platform (shown as the platform icon), Followers count, and Risk level (shown as a color-coded badge).

Activity Feed

The right sidebar displays a chronological feed of recent activity across all brand protection sub-modules. Use the filter dropdown to narrow the feed to a specific module (Fake Applications, Domain Squatting, Phishing & Impersonations, or Social Media).

Typical Workflow

  1. Review hero metrics to identify which category has the most active threats
  2. Check the severity breakdown to prioritize Critical and High issues
  3. Examine the donut chart to understand the composition of domain-related threats
  4. Review latest takedowns to track progress on remediation
  5. Navigate to sub-modules for detailed investigation and action (takedown requests, status changes, tagging)

When to Use This Page

  • During daily security stand-ups to get a quick brand threat summary
  • When preparing executive reports on brand protection posture
  • To identify which sub-module requires the most attention this week
  • After a brand abuse campaign to track remediation progress across all channels

Modules

ModuleDescription
Phishing & ImpersonationsWebsites impersonating your organization to steal credentials
Domain SquattingDomains registered using variations of your brand name
Fake ApplicationsMobile apps impersonating your brand on app stores
Executive MonitoringMonitoring executives for breaches, dark web mentions, and impersonation
Social MediaUnauthorized use of your brand on social platforms

ShadowMap by Security Brigade