We're using the solution primarily for threat intelligence. We have many assets in the environment that we are checking and we are trying to find weaknesses and vulnerability and things that are going over the darknet.
Sometimes it's really, really interesting. You get a good picture as you don't always know what other people are doing. Sometimes users are registering to a lot of places over the internet. There is cases when we want to know if the password and the username are leaked and so on , You need to get a full picture of what's going on with your assets. This is the general scope of the product.