{"info":{"_postman_id":"eaab4151-9512-4a65-a1b8-567a264e8a73","name":"IT-Harvest Enterprise API","description":"<html><head></head><body><p><strong>ℹ️ Authentication is conducted via API key. Enterprise accounts can have up to one valid API key at a time.</strong></p>\n<p><strong>ℹ️ To provision a new key, a license holder with access to the platform must sign in to</strong> <a href=\"http://dashboard.it-harvest.com\"><b>dashboard.it-harvest.com</b></a> <strong>and do so through their user settings panel.</strong></p>\n<p><strong>ℹ️ Rate limits are set to 10 queries / sec with a total monthly query limit of 1,000,000 calls across all endpoints. These are baseline limits - for users with needs that exceed these limits, please contact IT-Harvest.</strong></p>\n</body></html>","schema":"https://schema.getpostman.com/json/collection/v2.0.0/collection.json","toc":[],"owner":"27044018","collectionId":"eaab4151-9512-4a65-a1b8-567a264e8a73","publishedId":"2sAXqtbMNa","public":true,"customColor":{"top-bar":"FFFFFF","right-sidebar":"303030","highlight":"FF6C37"},"publishDate":"2024-09-24T17:59:38.000Z"},"item":[{"name":"Metadata","id":"05c76217-6c61-4efd-8891-9505c0c5e1ca","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"Content-Type","value":"application/json"}],"body":{"mode":"raw","raw":"{\n    \"token\": \"your_token\",\n    \"type\": \"type\"\n}","options":{"raw":{"language":"json"}}},"url":"https://api.it-harvest.com/api:9CUm3jDG/eapi/metadata","description":"<h3 id=\"metadata-on-productvendor-groupings-and-nistmitre-frameworks\">Metadata on product/vendor groupings and NIST/MITRE frameworks:</h3>\n<ul>\n<li><p><strong><code>\"type\"</code></strong> (String, required): Specifies the type of grouping to retrieve. Can be one of the following:</p>\n<ul>\n<li><p><strong><code>\"categories\"</code></strong>: Returns all vendor categories.<br />  <strong>Returned as</strong>: A flat list of strings (categories).<br />  Example: <code>[\"IAM\",\"GRC\"]</code></p>\n</li>\n<li><p><strong><code>\"intermediate_subcategories\"</code></strong>: Returns all vendor intermediate (cross-category) subcategories.<br />  <strong>Returned as</strong>: A flat list of strings (categories).<br />  Example: <code>[\"Monitoring\",\"Cloud Asset Management\"]</code></p>\n</li>\n<li><p><strong><code>\"subcategories\"</code></strong>: Returns all vendor subcategories.<br />  <strong>Returned as</strong>: A flat list of strings (categories).<br />  Example: <code>[\"Mobile Device Management\",\"Post-Quantum\"]</code></p>\n</li>\n<li><p><strong><code>\"product_tags\"</code></strong>: Returns all product tags.<br />  <strong>Returned as</strong>: A flat list of strings (categories).<br />  Example: <code>[\"Mobile Device Management\",\"Post-Quantum\"]</code></p>\n</li>\n<li><p><strong><code>\"mitre_tactics\"</code></strong>: Returns all MITRE ATT&amp;CK tactics (current version is Enterprise Matrix v15.1).<br />  <strong>Returned as</strong>: A JSON array with the following schema:</p>\n<ul>\n<li><code>[ { \"id\": int, \"mitre_tactic_id\": string, \"name\": string } ]</code></li>\n</ul>\n</li>\n<li><p><strong><code>\"mitre_techniques\"</code></strong>: Returns all MITRE ATT&amp;CK techniques.<br />  <strong>Returned as</strong>: A JSON array with the following schema:</p>\n<ul>\n<li><code>[ { \"id\": int, \"mitre_technique_id\": string, \"name\": string, \"tactic_id\": int } ]</code></li>\n</ul>\n</li>\n<li><p><strong><code>\"mitre_subtechniques\"</code></strong>: Returns all MITRE ATT&amp;CK subtechniques.<br />  <strong>Returned as</strong>: A JSON array with the following schema:</p>\n<ul>\n<li><code>[ { \"id\": int, \"technique_id\": int, \"mitre_subtechnique_id\": string, \"name\": string } ]</code></li>\n</ul>\n</li>\n<li><p><strong><code>\"nist_functions\"</code></strong>: Returns all NIST functions (current version is CSF 2.0).<br />  <strong>Returned as</strong>: A JSON array with the following schema:</p>\n<ul>\n<li><code>[ { \"id\": int, \"name\": string } ]</code></li>\n</ul>\n</li>\n<li><p><strong><code>\"nist_categories\"</code></strong>: Returns all NIST categories (current version is CSF 2.0).<br />  <strong>Returned as</strong>: A JSON array with the following schema:</p>\n<ul>\n<li><code>[ { \"id\": int, \"function_id\": int, \"name\": string, \"nist_category_id\": string } ]</code></li>\n</ul>\n</li>\n<li><p><strong><code>\"nist_subcategories\"</code></strong>: Returns all NIST subcategories (current version is CSF 2.0).<br />  <strong>Returned as</strong>: A JSON array with the following schema:</p>\n<ul>\n<li><code>[ { \"id\": int, \"nist_subcategory_id\": string, \"category_id\": int, \"description\": string } ]</code></li>\n</ul>\n</li>\n</ul>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api:9CUm3jDG","eapi","metadata"],"host":["api","it-harvest","com"],"query":[],"variable":[]}},"response":[],"_postman_id":"05c76217-6c61-4efd-8891-9505c0c5e1ca"},{"name":"Search Vendors","id":"7ede2acb-96de-4046-919f-163cd4c0ba1c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"Content-type","value":"application/json"}],"body":{"mode":"raw","raw":"{\n\t\"page\": 1,\n\t\"per_page\": 50,\n\t\"categories\": [],\n\t\"subcategories\": [],\n\t\"token\": \"your_token\"\n}","options":{"raw":{"language":"json"}}},"url":"https://api.it-harvest.com/api:9CUm3jDG/eapi/vendors","description":"<p>Here’s the updated version for the Vendors API documentation:</p>\n<hr />\n<h3 id=\"retrieves-a-list-of-vendors-in-the-dashboard-based-on-specified-filters\"><strong>Retrieves a list of vendors in the Dashboard based on specified filters.</strong></h3>\n<ul>\n<li><p><strong><code>\"token\"</code></strong> (String, required): Your authentication token.</p>\n</li>\n<li><p><strong><code>\"categories\"</code></strong> (Array of Strings, optional): Filter vendors by specific categories.</p>\n</li>\n<li><p><strong><code>\"subcategories\"</code></strong> (Array of Strings, optional): Filter vendors by specific subcategories.</p>\n</li>\n<li><p><strong><code>\"page\"</code></strong> (Integer, optional, default: <code>1</code>): The page number to retrieve.</p>\n</li>\n<li><p><strong><code>\"per_page\"</code></strong> (Integer, optional, default: <code>50</code>, max: <code>250</code>): The number of vendors to return per page.</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api:9CUm3jDG","eapi","vendors"],"host":["api","it-harvest","com"],"query":[],"variable":[]}},"response":[{"id":"bc379d8d-fe93-4890-aea4-769d78586f4b","name":"Search Email Security Vendors","originalRequest":{"method":"POST","header":[{"key":"Content-type","value":"application/json"}],"body":{"mode":"raw","raw":"{\n    \"page\": 1,\n    \"per_page\": 50,\n    \"categories\": [\n        \"Email Security\"\n    ],\n    \"subcategories\": [],\n    \"token\": \"foo\"\n}","options":{"raw":{"language":"json"}}},"url":"https://api.it-harvest.com/api:9CUm3jDG/eapi/vendors"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Tue, 17 Sep 2024 20:37:36 GMT"},{"key":"Content-Type","value":"application/json; charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"Set-Cookie","value":"XNS=bee433dd8f34057f083275042b082959|574d02c9abcc5e83d44caa3c8a37144d; Path=/socket/; Secure; HttpOnly; SameSite=Strict"},{"key":"X-App","value":"hit"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"private, no-cache, no-store, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"Sat, 20 Sep 2014 20:37:36 GMT"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Frame-Options","value":"deny"},{"key":"Access-Control-Allow-Origin","value":"*"},{"key":"Access-Control-Allow-Methods","value":"GET, POST, DELETE, PUT, PATCH, OPTIONS, HEAD"},{"key":"Access-Control-Allow-Headers","value":"*"},{"key":"Access-Control-Allow-Credentials","value":"true"},{"key":"Access-Control-Max-Age","value":"86400"},{"key":"Content-Encoding","value":"gzip"},{"key":"Strict-Transport-Security","value":"max-age=31536000; includeSubDomains;"}],"cookie":[],"responseTime":null,"body":"{\n    \"result\": {\n        \"itemsReceived\": 3,\n        \"curPage\": 1,\n        \"nextPage\": null,\n        \"prevPage\": null,\n        \"offset\": 0,\n        \"itemsTotal\": 3,\n        \"pageTotal\": 1,\n        \"items\": [\n            {\n                \"id\": 24217,\n                \"Name\": \"Abnormal Security\"\n            },\n            {\n                \"id\": 24746,\n                \"Name\": \"Agari\"\n            },\n            {\n                \"id\": 25338,\n                \"Name\": \"AnubisNetworks (BitSight)\"\n            }\n        ]\n    }\n}"}],"_postman_id":"7ede2acb-96de-4046-919f-163cd4c0ba1c"},{"name":"Get Vendor","id":"71373d87-75a0-40a7-850a-dba54ac0bba2","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"Content-Type","value":"application/json"}],"body":{"mode":"raw","raw":"{\n    \"vendor\": 123,\n    \"token\": \"your_token\"\n}","options":{"raw":{"language":"json"}}},"url":"https://api.it-harvest.com/api:9CUm3jDG/eapi/vendors/get","description":"<h3 id=\"retrieves-details-for-a-specific-vendor-in-the-dashboard\"><strong>Retrieves details for a specific vendor in the Dashboard.</strong></h3>\n<ul>\n<li><p><strong><code>\"token\"</code></strong> (String, required): Your authentication token.</p>\n</li>\n<li><p><strong><code>\"vendor\"</code></strong> (Integer, required): The ID of the vendor to retrieve.</p>\n</li>\n</ul>\n<p>Vendors are organized in the following hierarchy: Category, Intermediate Subcategory, Subcategory, Group, and Subgroup. Not all vendors have subcategories, groups, or subgroups.</p>\n","urlObject":{"protocol":"https","path":["api:9CUm3jDG","eapi","vendors","get"],"host":["api","it-harvest","com"],"query":[],"variable":[]}},"response":[{"id":"cdae739b-022e-4f40-861d-2628b3d85efd","name":"Get a Vendor","originalRequest":{"method":"POST","header":[{"key":"Content-Type","value":"application/json"}],"body":{"mode":"raw","raw":"{\n    \"vendor\": 24451,\n    \"token\": \"foo\"\n}","options":{"raw":{"language":"json"}}},"url":"https://api.it-harvest.com/api:9CUm3jDG/eapi/vendors/get"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Tue, 17 Sep 2024 20:58:17 GMT"},{"key":"Content-Type","value":"application/json; charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"Set-Cookie","value":"XNS=9b0e8e5a38023975f82d83089cb111ae|574d02c9abcc5e83d44caa3c8a37144d; Path=/socket/; Secure; HttpOnly; SameSite=Strict"},{"key":"X-App","value":"miss"},{"key":"X-Workspace","value":"hit"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"private, no-cache, no-store, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"Sat, 20 Sep 2014 20:58:17 GMT"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Frame-Options","value":"deny"},{"key":"Access-Control-Allow-Origin","value":"*"},{"key":"Access-Control-Allow-Methods","value":"GET, POST, DELETE, PUT, PATCH, OPTIONS, HEAD"},{"key":"Access-Control-Allow-Headers","value":"*"},{"key":"Access-Control-Allow-Credentials","value":"true"},{"key":"Access-Control-Max-Age","value":"86400"},{"key":"Content-Encoding","value":"gzip"},{"key":"Strict-Transport-Security","value":"max-age=31536000; includeSubDomains;"}],"cookie":[],"responseTime":null,"body":"{\n    \"result\": {\n        \"id\": 24451,\n        \"Name\": \"HYPR\",\n        \"Country\": \"United States of America\",\n        \"Category\": \"IAM\",\n        \"Intermediate_Subcategory_1\": \"Authentication\",\n        \"Intermediate_Subcategory_2\": \"\",\n        \"Intermediate_Subcategory_3\": \"\",\n        \"Subcategory_1\": \"IAM - Authentication\",\n        \"S1_G1\": [\n            \"Biometric authentication\"\n        ],\n        \"S1_Group1_Subgroup1\": [],\n        \"Subcategory_2\": \"\",\n        \"S2_G1\": [],\n        \"S2_Group1_Subgroup1\": [],\n        \"Subcategory_3\": \"\",\n        \"S3_G1\": [],\n        \"Founding_year\": 2014,\n        \"Website\": \"http://www.hypr.com/\",\n        \"YR_HC_Growth\": -6.82,\n        \"LQ_Growth\": 2.5,\n        \"Current_HC\": 123,\n        \"Total_Funding\": 122.1,\n        \"State\": \"NY\",\n        \"Public\": false,\n        \"Description\": \"HYPR is a company that is revolutionizing the way the world logs in by offering modern authentication solutions. The company's main product is HYPR True Passwordless Security®, a cybersecurity technology that focuses on eliminating the use of passwords for both workforce and customers. This product is designed to significantly reduce exposure to phishing attacks and improve overall enterprise security. It operates using the latest FIDO standards, ensuring a high level of assurance.\\n\\nIn addition to its primary product, HYPR also offers HYPR ADAPT, an innovative authentication solution that provides real-time risk assessment and adaptive authentication. This technology is designed to enhance user experience while simultaneously protecting users, systems, and businesses. Furthermore, HYPR provides an authentication SDK that offers a strong alternative to phishable and inconvenient passwords, and it is compatible across devices that customers use in their daily lives.\",\n        \"Revenue\": 38,\n        \"Health\": 30,\n        \"Logo_url\": \"https://api.it-harvest.com/vault/8pBmkccv/R8SU5_F4C5uf5blMsoLY2GWNGF4/K-NGpw../logo.png\",\n        \"products\": [\n            {\n                \"id\": 23804,\n                \"Name\": \"HYPR Adapt\",\n                \"Description\": \"HYPR Adapt by HYPR is a continuous, risk-based, adaptive authentication solution designed to enhance Zero Trust authentication and detect and mitigate identity-related risks while minimizing user disruption. It provides real-time risk assessment and dynamically adjusts security controls for individual users in changing security environments. HYPR Adapt continuously assesses risk from diverse sources, including device posture, mobile, web and browser signals, real-time events, and user behavior, generating granular user risk profiles. Its risk engine collects and analyzes extensive data to intelligently adjust IAM security processes in real time, aiming to manage identity-related risks while reducing friction in authentication processes. The solution is integrated into the HYPR Zero Trust authentication framework, complementing the company's passkey-based authentication solutions.\",\n                \"Features\": [\n                    {\n                        \"name\": \"Comprehensive Identity Risk Engine\",\n                        \"description\": \"Leverages intelligence from various sources including device posture, mobile, web and browser signals, real-time events, and user behavior. Generates granular user risk profiles for individualized adaptive authentication.\"\n                    },\n                    {\n                        \"name\": \"Automated Risk Response\",\n                        \"description\": \"Automatically responds to potential risks with adaptive measures. Customizable control policies through Open Policy to suit specific business needs.\"\n                    },\n                    {\n                        \"name\": \"Personalized Authentication Flow\",\n                        \"description\": \"Delivers a dynamic adaptive authentication flow for each user based on individual risk profiles. Automatically adjusts authentication processes and optimizes user experience by providing appropriate level of authentication security.\"\n                    },\n                    {\n                        \"name\": \"Regulatory Compliance Acceleration\",\n                        \"description\": \"Integrates with existing systems to help meet requirements of NIST, ISO, HIPAA, GDPR, PCI, FISMA, FRCP, and HITECH regulations. Supports implementation of NIST AAL3-compliant authentication and aligns with Zero Trust security framework.\"\n                    },\n                    {\n                        \"name\": \"Security Ecosystem Integration\",\n                        \"description\": \"Integrates with external systems through an extensible framework. Enables seamless exchange of authentication risk information with existing security systems.\"\n                    },\n                    {\n                        \"name\": \"Soc Empowerment\",\n                        \"description\": \"Provides high-fidelity identity risk scores and user information to Security Operations Center (SOC). Helps reduce investigation times by prioritizing users with the highest risk/impact ratio.\"\n                    },\n                    {\n                        \"name\": \"Continuous Risk Assessment\",\n                        \"description\": \"HYPR Adapt continuously assesses user behavior and environmental signals from diverse sources to detect potential identity-related risks and maintain an up-to-date risk profile for each user.\"\n                    },\n                    {\n                        \"name\": \"Dynamic Security Control Adjustment\",\n                        \"description\": \"Based on the risk assessment, HYPR Adapt dynamically adjusts security controls for individual employees to mitigate identified risks in changing security environments.\"\n                    },\n                    {\n                        \"name\": \"Real-Time Response\",\n                        \"description\": \"The system drives real-time responses to detected risks, including implementing step-up authentication and initiating re-verification processes when necessary.\"\n                    },\n                    {\n                        \"name\": \"Risk-Based Authentication\",\n                        \"description\": \"HYPR Adapt enables organizations to enforce step-up authentication and block fraudulent logins based on real-time risk intelligence.\"\n                    },\n                    {\n                        \"name\": \"User Friction Reduction\",\n                        \"description\": \"The solution aims to minimize user friction during authentication by adapting the process based on the assessed risk level.\"\n                    },\n                    {\n                        \"name\": \"Zero Trust Authentication Integration\",\n                        \"description\": \"HYPR Adapt is integrated into the HYPR Zero Trust authentication framework, complementing the company's passkey-based authentication solutions.\"\n                    }\n                ],\n                \"tags\": []\n            },\n            {\n                \"id\": 23805,\n                \"Name\": \"HYPR Affirm\",\n                \"Description\": \"HYPR Affirm is an automated identity verification solution provided by HYPR, designed specifically for workforce and customer use cases. It offers continuous identity proofing and verification throughout the user lifecycle, automating processes and integrating into existing security ecosystems and help desk workflows. The product leverages multiple identity verification and proofing technologies, including advanced biometrics, liveness detection, AI-powered chat, document verification, video, and face recognition. HYPR Affirm ensures only authorized individuals gain access to corporate systems and data, meeting enterprise Know Your Employee (KYE) needs and ensuring trust in workforce identities across the entire employee lifecycle.\",\n                \"Features\": [\n                    {\n                        \"name\": \"Document Verification\",\n                        \"description\": \"Verifies passports, driver's licenses, and other official documents. Uses advanced verification technology to detect forgeries or alterations.\"\n                    },\n                    {\n                        \"name\": \"Location Detection\",\n                        \"description\": \"Detects geolocation and compares it against expected location.\"\n                    },\n                    {\n                        \"name\": \"Facial Recognition\",\n                        \"description\": \"Utilizes cutting-edge technology to detect spoofing tactics like photos or masks.\"\n                    },\n                    {\n                        \"name\": \"Chat Verification\",\n                        \"description\": \"Implements a secure chat system combining AI and human interaction for identity verification.\"\n                    },\n                    {\n                        \"name\": \"Video Verification\",\n                        \"description\": \"Confirms employee identity through live video feed.\"\n                    },\n                    {\n                        \"name\": \"Manager Attestation\",\n                        \"description\": \"Allows supervisor attestation of employee identity to strengthen security. Results are retained but sensitive data is not stored.\"\n                    },\n                    {\n                        \"name\": \"Risk-Based Re-Verification\",\n                        \"description\": \"Provides risk-based re-verification at critical moments defined by high-impact events, such as an employee logging in on a new device or during a high-value transaction.\"\n                    },\n                    {\n                        \"name\": \"Lifecycle Identity Verification\",\n                        \"description\": \"Verifies and enforces identity at critical moments in the identity lifecycle based on activity and risk, including employee onboarding, offboarding, or role changes.\"\n                    },\n                    {\n                        \"name\": \"Adaptive Identity Verification\",\n                        \"description\": \"Implements proactive, adaptive identity verification that prompts reverification of users at risk from new threat vectors or suspect behavior.\"\n                    },\n                    {\n                        \"name\": \"Regulatory Compliance\",\n                        \"description\": \"Meets NIST IAL2 identity proofing guidelines and supports FIDO 2 Certified biometric authentication credentials.\"\n                    },\n                    {\n                        \"name\": \"Legacy System Integration\",\n                        \"description\": \"Integrates with legacy systems and various credential systems, eliminating vendor lock-in.\"\n                    },\n                    {\n                        \"name\": \"Ai-Powered Chat Verification\",\n                        \"description\": \"HYPR Affirm incorporates AI-powered chat technology for identity verification processes.\"\n                    },\n                    {\n                        \"name\": \"Automated Verification Workflows\",\n                        \"description\": \"HYPR Affirm automates identity verification processes throughout the employee identity lifecycle.\"\n                    },\n                    {\n                        \"name\": \"Integration With Existing Systems\",\n                        \"description\": \"The product integrates into existing security ecosystems and help desk workflows.\"\n                    },\n                    {\n                        \"name\": \"Know Your Employee (Kye) Controls\",\n                        \"description\": \"The solution is designed to meet enterprise KYE needs and ensure trust in workforce identities across the entire employee lifecycle.\"\n                    }\n                ],\n                \"tags\": [\n                    {\n                        \"tag_id\": 117,\n                        \"Name\": \"Incident Response\"\n                    }\n                ]\n            }\n        ]\n    }\n}"}],"_postman_id":"71373d87-75a0-40a7-850a-dba54ac0bba2"},{"name":"Get all products","id":"9426214f-ed1d-49fa-a130-b6d0a27cca9c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"Content-Type","value":"application/json"}],"body":{"mode":"formdata","formdata":[]},"url":"https://api.it-harvest.com/api:9CUm3jDG/eapi/products/all?token=your_token","description":"<h3 id=\"gets-all-products\"><strong>Gets all products.</strong></h3>\n<ul>\n<li><strong><code>\"token\"</code></strong> (String, required): Your authentication token.</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api:9CUm3jDG","eapi","products","all"],"host":["api","it-harvest","com"],"query":[{"key":"token","value":"your_token"}],"variable":[]}},"response":[{"id":"62ce0748-be2f-4011-b9e0-3c6d9873dacd","name":"Get all products","originalRequest":{"method":"GET","header":[{"key":"Content-Type","value":"application/json"}],"url":{"raw":"https://api.it-harvest.com/api:9CUm3jDG/eapi/products/all?token=foo","protocol":"https","host":["api","it-harvest","com"],"path":["api:9CUm3jDG","eapi","products","all"],"query":[{"key":"token","value":"foo"}]}},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Thu, 26 Sep 2024 18:45:21 GMT"},{"key":"Content-Type","value":"application/json; charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"Set-Cookie","value":"XNS=b0dd33fc8ef2cca2571da7bf81d26ca5|574d02c9abcc5e83d44caa3c8a37144d; Path=/socket/; Secure; HttpOnly; SameSite=Strict"},{"key":"X-App","value":"miss"},{"key":"X-Workspace","value":"hit"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"private, no-cache, no-store, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"Mon, 29 Sep 2014 18:45:18 GMT"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Frame-Options","value":"deny"},{"key":"Access-Control-Allow-Origin","value":"*"},{"key":"Access-Control-Allow-Methods","value":"GET, POST, DELETE, PUT, PATCH, OPTIONS, HEAD"},{"key":"Access-Control-Allow-Headers","value":"*"},{"key":"Access-Control-Allow-Credentials","value":"true"},{"key":"Access-Control-Max-Age","value":"86400"},{"key":"Content-Encoding","value":"gzip"},{"key":"Strict-Transport-Security","value":"max-age=31536000; includeSubDomains;"}],"cookie":[],"responseTime":null,"body":"{\n    \"result\": [\n        {\n            \"id\": 13363,\n            \"Name\": \"#CyberFit Score Tool\"\n        },\n        {\n            \"id\": 12943,\n            \"Name\": \"0SNet\"\n        }\n    ]\n}"}],"_postman_id":"9426214f-ed1d-49fa-a130-b6d0a27cca9c"},{"name":"Search Products","id":"ef257013-239e-4375-9acc-3c644100caad","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"Content-Type","value":"application/json"}],"body":{"mode":"raw","raw":"{\n    \"token\": \"your_token\",\n    \"search_query\": \"your_query\",\n    \"page\": 1,\n    \"per_page\": 50,\n    \"tag_ids\": [],\n    \"nist_function_ids\": [],\n    \"nist_category_ids\": [],\n    \"nist_subcategory_ids\": [],\n    \"mitre_tactic_ids\": [],\n    \"mitre_technique_ids\": [],\n    \"search_query_targets\": []\n}","options":{"raw":{"language":"json"}}},"url":"https://api.it-harvest.com/api:9CUm3jDG/eapi/products","description":"<h3 id=\"gets-all-products-based-on-the-search-query-in-the-dashboard\">Gets all products based on the search query in the Dashboard.</h3>\n<ul>\n<li><p><strong>\"token\"</strong> (<code>String</code>, required): Your authentication token.</p>\n</li>\n<li><p><strong>\"search_query\"</strong> (<code>String</code>, optional, nullable): The search string that follows specific syntax rules (detailed below) to filter products.</p>\n</li>\n<li><p><strong>\"smart_search_query\"</strong> (<code>String</code>, optional, nullable): The target string search used for fuzzy matching and cybersecurity term recognition (similar functionality to <strong>/se</strong> endpoint).</p>\n<ul>\n<li><p><strong>Providing a valid string to smart_search_query automatically overrides the following inputs:</strong></p>\n<ul>\n<li><p>\"search_query\" - is not taken into consideration. Only the string provided to the \"smart_search_query\" is used.</p>\n</li>\n<li><p>\"search_query_targets\" - is not taken into consdieration. This input only applies to the \"search_query\" input and only works when a smart search query value is null/not passed and there is a valid \"search_query\" input.</p>\n</li>\n</ul>\n</li>\n<li><p><strong>What does this mean?</strong></p>\n<ul>\n<li><p>You can either use the \"search_query\" + \"search_query_targets\" input combination to search through specific fields <b>OR</b> you can pass a single string to \"smart_search_query\".</p>\n</li>\n<li><p>Only \"smart_search_query\" leverages IT-Harvests internal cybersecurity dictionary and advanced search engine.</p>\n</li>\n<li><p>\"smart_search_query\" does <strong>not</strong> support IT-Harvest's search syntax specified below. Syntax only applies to \"search_query\" input.</p>\n</li>\n<li><p>MITRE, NIST, Tag, etc. filters are <strong>still applied for every query,</strong> regardless of whether you use search_query or smart_search_query.</p>\n</li>\n</ul>\n</li>\n</ul>\n</li>\n<li><p><strong>\"search_query_targets\"</strong> (<code>Array</code> of <code>Strings</code>, optional, minimum 1 value): Specifies which fields and datapoints will be searched using the <code>search_query</code>. The search will match if the <code>search_query</code> matches any of the specified fields (OR logic). Allowed values are:</p>\n<ul>\n<li><p><code>\"product_name\"</code></p>\n</li>\n<li><p><code>\"product_description\"</code></p>\n</li>\n<li><p><code>\"vendor_category\"</code></p>\n</li>\n<li><p><code>\"vendor_subcategory\"</code></p>\n</li>\n<li><p><code>\"vendor_description\"</code></p>\n</li>\n<li><p><code>\"vendor_name\"</code></p>\n</li>\n<li><p><code>\"feature_name\"</code></p>\n</li>\n<li><p><code>\"feature_description\"</code></p>\n</li>\n<li><p><code>\"tag_name\"</code></p>\n</li>\n<li><p><code>\"mitre_tactic_name\"</code></p>\n</li>\n<li><p><code>\"mitre_technique_name\"</code></p>\n</li>\n<li><p><code>\"mitre_subtechnique_name\"</code></p>\n</li>\n<li><p><code>\"nist_category_name\"</code></p>\n</li>\n<li><p><code>\"nist_subcategory_description\"</code></p>\n</li>\n<li><p><em>* If a search_query value is passed but no query targets are specified, no results will be returned. When the search_query input is used, targets must be specified for results.</em></p>\n</li>\n</ul>\n</li>\n<li><p><strong>\"page\"</strong> (<code>Integer</code>, optional, default: <code>1</code>): The page number to retrieve.</p>\n</li>\n<li><p><strong>\"per_page\"</strong> (<code>Integer</code>, optional, default: <code>50</code>, max: <code>250</code>): The number of results per page.</p>\n</li>\n<li><p><strong>\"tag_ids\"</strong> (<code>Array</code> of <code>Integers</code>, optional): An array of tag IDs to filter by. <strong>OR</strong> logic is applied within this filter.</p>\n</li>\n<li><p><strong>\"nist_function_ids\"</strong> (<code>Array</code> of <code>Integers</code>, optional): An array of NIST function IDs to filter by. <strong>OR</strong> logic is applied within this filter.</p>\n</li>\n<li><p><strong>\"nist_category_ids\"</strong> (<code>Array</code> of <code>Integers</code>, optional): An array of NIST category IDs to filter by. <strong>OR</strong> logic is applied within this filter.</p>\n</li>\n<li><p><strong>\"nist_subcategory_ids\"</strong> (<code>Array</code> of <code>Integers</code>, optional): An array of NIST subcategory IDs to filter by. <strong>OR</strong> logic is applied within this filter.</p>\n</li>\n<li><p><strong>\"mitre_tactic_ids\"</strong> (<code>Array</code> of <code>Integers</code>, optional): An array of MITRE ATT&amp;CK tactic IDs to filter by. <strong>OR</strong> logic is applied within this filter.</p>\n</li>\n<li><p><strong>\"mitre_technique_ids\"</strong> (<code>Array</code> of <code>Integers</code>, optional): An array of MITRE ATT&amp;CK technique IDs to filter by. <strong>OR</strong> logic is applied within this filter.</p>\n</li>\n</ul>\n<h4 id=\"filtering-logic\">Filtering Logic:</h4>\n<ul>\n<li><p><strong>OR within filters</strong>: For any array input (e.g., <code>tag_ids</code>, <code>nist_function_ids</code>), the query will match results that satisfy any of the values in the array. For example, <code>[1, 2]</code> will match results containing tag ID <code>1</code> <strong>OR</strong> <code>2</code>.</p>\n</li>\n<li><p><strong>AND across filters</strong>: When multiple filters are used together (e.g., <code>search_query</code> and <code>tag_ids</code>), the query will match results that satisfy the conditions of <strong>all</strong> filters. For example, <code>(apple OR orange) AND (tag ID 1 OR 2)</code>.</p>\n</li>\n<li><p><strong>Search Query Application</strong>: The <code>search_query</code> will be applied to <strong>any</strong> of the fields specified in <code>search_query_targets</code> using <strong>OR</strong> logic. For example, if <code>search_query_targets</code> is <code>[\"product_name\", \"vendor_category\"]</code>, the query will match products where the <code>search_query</code> matches either the <code>product_name</code> <strong>OR</strong> the <code>vendor_category</code>.</p>\n</li>\n</ul>\n<hr />\n<h3 id=\"search-query-syntax-and-methods\">Search Query Syntax and Methods</h3>\n<p>The <code>search_query</code> string input allows you to search for products based on specific criteria. It follows the rules and syntax detailed below:</p>\n<h4 id=\"1-and-logic\">1. <strong>AND Logic</strong></h4>\n<ul>\n<li><p><strong>Default Behavior</strong>: Words separated by a space imply an <strong>AND</strong> condition.</p>\n</li>\n<li><p><strong>Example</strong>: <code>apple orange</code> will search for results containing both \"apple\" <strong>AND</strong> \"orange\".</p>\n</li>\n</ul>\n<h4 id=\"2-exact-phrase-matching\">2. <strong>Exact Phrase Matching</strong></h4>\n<ul>\n<li><p><strong>Use double quotes</strong> to search for an exact phrase.</p>\n</li>\n<li><p><strong>Example</strong>: <code>\"Apple Platform\"</code> will search for results that match the exact phrase \"Apple Platform\".</p>\n</li>\n<li><p><strong>JSON Escape Note</strong>: If entering this directly into a JSON payload, escape the quotes with a backslash.</p>\n</li>\n<li><p><strong>Example</strong>: <code>{\"search_query\": \"\\\"Apple Platform\\\"\"}</code>.</p>\n</li>\n</ul>\n<h4 id=\"3-partial-phrase-matching\">3. <strong>Partial Phrase Matching</strong></h4>\n<ul>\n<li><p>Use asterisks * to allow partial phrase matching.</p>\n</li>\n<li><p><strong>Example</strong>: Apple * Platform will return results where there is one word between \"Apple\" and \"Platform\".</p>\n</li>\n<li><p>Apple  <i>*</i> Platform allows for three words in between.</p>\n</li>\n</ul>\n<h4 id=\"4-wildcard-matching\">4. <strong>Wildcard Matching</strong></h4>\n<ul>\n<li><p>Wildcards <strong>:</strong>* can be used within or at the end of a word to match multiple possibilities.</p>\n</li>\n<li><p><strong>Example</strong>: Pen:* will return results for \"Pentest\", \"Penetration Testing\", etc.</p>\n</li>\n</ul>\n<h4 id=\"5-expression-groups\">5. <strong>Expression Groups</strong></h4>\n<ul>\n<li><p>Use parentheses <code>()</code> to group multiple expressions.</p>\n</li>\n<li><p><strong>Example</strong>: <code>(apple OR orange) AND (network OR endpoint)</code> will return results that contain either \"apple\" <strong>OR</strong> \"orange\" <strong>AND</strong> either \"network\" <strong>OR</strong> \"endpoint\".</p>\n</li>\n<li><p><strong>Example:</strong> <code>(quantum OR segmentation) platform</code> will return muliple matches for \"platform\" that also contain either quantum or segmentation.</p>\n</li>\n</ul>\n<h4 id=\"6-negation\">6. <strong>Negation</strong></h4>\n<ul>\n<li><p>You can exclude words using a minus <code>-</code> character.</p>\n</li>\n<li><p><strong>Example</strong>: <code>apple -platform</code> will search for results containing \"apple\" but exclude those that contain \"platform\".</p>\n</li>\n</ul>\n<h4 id=\"7-combination-of-methods\">7. <strong>Combination of Methods</strong></h4>\n<ul>\n<li><p>You can combine different methods for advanced searches.</p>\n</li>\n<li><p><strong>Example</strong>: <code>\"apple platform\" network -security</code> will search for the exact phrase \"apple platform\" <strong>AND</strong> the word \"network\" while excluding results with \"security\".</p>\n</li>\n</ul>\n<h4 id=\"8-single-vs-plural-support\">8. <strong>Single vs Plural Support</strong></h4>\n<ul>\n<li><p>The search supports automatic detection of singular and plural forms of words.</p>\n</li>\n<li><p><strong>Example</strong>: Searching for <code>platform</code> will also return results for <code>platforms</code>.</p>\n</li>\n</ul>\n<h4 id=\"9-stop-words\">9. <strong>Stop Words</strong></h4>\n<ul>\n<li>Commonly used words such as articles, pronouns, and prepositions (e.g., \"is\", \"and\", \"the\") are ignored in the search.</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api:9CUm3jDG","eapi","products"],"host":["api","it-harvest","com"],"query":[],"variable":[]}},"response":[{"id":"11239d70-7a8b-4882-88b8-1caef9050b1d","name":"Search Products Example","originalRequest":{"method":"POST","header":[{"key":"Content-Type","value":"application/json"}],"body":{"mode":"raw","raw":"{\n    \"token\": \"foo\",\n    \"smart_search_query\": null,\n    \"search_query\": \"(segmentation) AND (network -endpoint)\",\n    \"page\": 1,\n    \"per_page\": 5,\n    \"tag_ids\": [],\n    \"nist_function_ids\": [],\n    \"nist_category_ids\": [],\n    \"nist_subcategory_ids\": [],\n    \"mitre_tactic_ids\": [],\n    \"mitre_technique_ids\": [],\n    \"search_query_targets\": [\n        \"product_name\",\n        \"product_description\"\n    ]\n}","options":{"raw":{"language":"json"}}},"url":"https://api.it-harvest.com/api:9CUm3jDG/eapi/products"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Sun, 29 Sep 2024 17:58:05 GMT"},{"key":"Content-Type","value":"application/json; charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"Set-Cookie","value":"XNS=11aa91effb5a399d99785104f8a7c3d2|574d02c9abcc5e83d44caa3c8a37144d; Path=/socket/; Secure; HttpOnly; SameSite=Strict"},{"key":"X-App","value":"hit"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"private, no-cache, no-store, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"Thu, 02 Oct 2014 17:58:05 GMT"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Frame-Options","value":"deny"},{"key":"Access-Control-Allow-Origin","value":"*"},{"key":"Access-Control-Allow-Methods","value":"GET, POST, DELETE, PUT, PATCH, OPTIONS, HEAD"},{"key":"Access-Control-Allow-Headers","value":"*"},{"key":"Access-Control-Allow-Credentials","value":"true"},{"key":"Access-Control-Max-Age","value":"86400"},{"key":"Content-Encoding","value":"gzip"},{"key":"Strict-Transport-Security","value":"max-age=31536000; includeSubDomains;"}],"cookie":[],"responseTime":null,"body":"{\n    \"result\": {\n        \"itemsReceived\": 1,\n        \"curPage\": 1,\n        \"nextPage\": null,\n        \"prevPage\": null,\n        \"offset\": 0,\n        \"itemsTotal\": 1,\n        \"pageTotal\": 1,\n        \"items\": [\n            {\n                \"id\": 21343,\n                \"Name\": \"Zero Networks Segment™\",\n                \"vendor\": {\n                    \"id\": 25322,\n                    \"Name\": \"Zero Networks\",\n                    \"Category\": \"Network Security\"\n                },\n                \"tags\": [\n                    {\n                        \"tag_id\": 126,\n                        \"Name\": \"Zero Trust Architecture\"\n                    },\n                    {\n                        \"tag_id\": 644,\n                        \"Name\": \"Agentless\"\n                    },\n                    {\n                        \"tag_id\": 488,\n                        \"Name\": \"Firewalls\"\n                    },\n                    {\n                        \"tag_id\": 509,\n                        \"Name\": \"Host Environments\"\n                    }\n                ]\n            }\n        ]\n    }\n}"},{"id":"b6922292-9cb0-4e04-97a9-c67783f80e6e","name":"Search Products Example (Smart Query)","originalRequest":{"method":"POST","header":[{"key":"Content-Type","value":"application/json"}],"body":{"mode":"raw","raw":"{\n    \"token\": \"foo\",\n    \"smart_search_query\": \"iam\",\n    \"search_query\": null,\n    \"page\": 1,\n    \"per_page\": 5,\n    \"tag_ids\": [],\n    \"nist_function_ids\": [],\n    \"nist_category_ids\": [],\n    \"nist_subcategory_ids\": [],\n    \"mitre_tactic_ids\": [],\n    \"mitre_technique_ids\": [],\n    \"search_query_targets\": []\n}","options":{"raw":{"language":"json"}}},"url":"https://api.it-harvest.com/api:9CUm3jDG/eapi/products"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Sun, 29 Sep 2024 17:58:05 GMT"},{"key":"Content-Type","value":"application/json; charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"Set-Cookie","value":"XNS=11aa91effb5a399d99785104f8a7c3d2|574d02c9abcc5e83d44caa3c8a37144d; Path=/socket/; Secure; HttpOnly; SameSite=Strict"},{"key":"X-App","value":"hit"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"private, no-cache, no-store, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"Thu, 02 Oct 2014 17:58:05 GMT"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Frame-Options","value":"deny"},{"key":"Access-Control-Allow-Origin","value":"*"},{"key":"Access-Control-Allow-Methods","value":"GET, POST, DELETE, PUT, PATCH, OPTIONS, HEAD"},{"key":"Access-Control-Allow-Headers","value":"*"},{"key":"Access-Control-Allow-Credentials","value":"true"},{"key":"Access-Control-Max-Age","value":"86400"},{"key":"Content-Encoding","value":"gzip"},{"key":"Strict-Transport-Security","value":"max-age=31536000; includeSubDomains;"}],"cookie":[],"responseTime":null,"body":"{\n    \"result\": {\n        \"itemsReceived\": 5,\n        \"curPage\": 1,\n        \"nextPage\": 2,\n        \"prevPage\": null,\n        \"offset\": 0,\n        \"itemsTotal\": 220,\n        \"pageTotal\": 44,\n        \"items\": [\n            {\n                \"id\": 20960,\n                \"Name\": \"Haden Grey Identity Access Management\",\n                \"vendor\": {\n                    \"id\": 27792,\n                    \"Name\": \"Haden Grey\",\n                    \"Category\": \"MSSP\"\n                },\n                \"tags\": [\n                    {\n                        \"tag_id\": 462,\n                        \"Name\": \"Identity and Access Management\"\n                    }\n                ]\n            },\n            {\n                \"id\": 20710,\n                \"Name\": \"Identity Access Management - Fischer Identity\",\n                \"vendor\": {\n                    \"id\": 24768,\n                    \"Name\": \"Fischer International Identity\",\n                    \"Category\": \"IAM\"\n                },\n                \"tags\": [\n                    {\n                        \"tag_id\": 403,\n                        \"Name\": \"Single sign on\"\n                    },\n                    {\n                        \"tag_id\": 462,\n                        \"Name\": \"Identity and Access Management\"\n                    }\n                ]\n            },\n            {\n                \"id\": 15944,\n                \"Name\": \"Blink Ops Identity & Access Management (IAM)\",\n                \"vendor\": {\n                    \"id\": 27511,\n                    \"Name\": \"Blink Ops\",\n                    \"Category\": \"Operations\"\n                },\n                \"tags\": [\n                    {\n                        \"tag_id\": 439,\n                        \"Name\": \"Asset Management\"\n                    },\n                    {\n                        \"tag_id\": 462,\n                        \"Name\": \"Identity and Access Management\"\n                    }\n                ]\n            },\n            {\n                \"id\": 10281,\n                \"Name\": \"Nixu Identity & Access Management\",\n                \"vendor\": {\n                    \"id\": 24207,\n                    \"Name\": \"Nixu Corporation\",\n                    \"Category\": \"MSSP\"\n                },\n                \"tags\": [\n                    {\n                        \"tag_id\": 524,\n                        \"Name\": \"Rights Management\"\n                    }\n                ]\n            },\n            {\n                \"id\": 24150,\n                \"Name\": \"Identity and Access Management (IAM)\",\n                \"vendor\": {\n                    \"id\": 25598,\n                    \"Name\": \"My1login\",\n                    \"Category\": \"IAM\"\n                },\n                \"tags\": [\n                    {\n                        \"tag_id\": 462,\n                        \"Name\": \"Identity and Access Management\"\n                    }\n                ]\n            }\n        ]\n    }\n}"}],"_postman_id":"ef257013-239e-4375-9acc-3c644100caad"},{"name":"Search Products (Smart)","id":"c91b2834-7fc4-4ff7-ae0c-815f34518fb9","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"Content-Type","value":"application/json"}],"body":{"mode":"raw","raw":"{\n    \"token\": \"your_token\",\n    \"query\": \"your_query\",\n    \"page\": 1,\n    \"per_page\": 50\n}","options":{"raw":{"language":"json"}}},"url":"https://api.it-harvest.com/api:9CUm3jDG/eapi/products/se","description":"<h3 id=\"smart-and-simple-product-search\">Smart and simple product search</h3>\n<ul>\n<li><p><strong>\"token\"</strong> (<code>String</code>, required): Your authentication token.</p>\n</li>\n<li><p><strong>\"query\"</strong> (<code>String</code>, required, min of 3 characters): The search string.</p>\n</li>\n<li><p><strong>\"page\"</strong> (<code>Integer</code>, optional, default: <code>1</code>): The page number to retrieve.</p>\n</li>\n<li><p><strong>\"per_page\"</strong> (<code>Integer</code>, optional, default: <code>50</code>, max: <code>250</code>): The number of results per page.</p>\n</li>\n</ul>\n<h3 id=\"info\">Info:</h3>\n<ul>\n<li><p>This endpoint is designed for straightforward single-input based product name/description matching.</p>\n</li>\n<li><p>Comes with more sophisticated handling of user inputs than other product search endpoints including.</p>\n<ul>\n<li><p>Typo correction</p>\n</li>\n<li><p>Acronym handling</p>\n</li>\n<li><p>Fuzzy matching</p>\n</li>\n<li><p>Cybersecurity terminology recognition</p>\n</li>\n</ul>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api:9CUm3jDG","eapi","products","se"],"host":["api","it-harvest","com"],"query":[],"variable":[]}},"response":[{"id":"faba6d93-5d90-41f8-a6e6-30934fe93dc5","name":"Search Segmentation Solutions","originalRequest":{"method":"POST","header":[{"key":"Content-Type","value":"application/json"}],"body":{"mode":"raw","raw":"{\n    \"token\": \"foo\",\n    \"query\": \"network segmentattaion\",\n    \"page\": 1,\n    \"per_page\": 50\n}","options":{"raw":{"language":"json"}}},"url":"https://api.it-harvest.com/api:9CUm3jDG/eapi/products/se"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Wed, 23 Oct 2024 03:45:06 GMT"},{"key":"Content-Type","value":"application/json; charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"Set-Cookie","value":"XNS=8015b726cc4cedec931a71b884e06c67|574d02c9abcc5e83d44caa3c8a37144d; Path=/socket/; Secure; HttpOnly; SameSite=Strict"},{"key":"X-App","value":"hit"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"private, no-cache, no-store, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"Sun, 26 Oct 2014 03:45:03 GMT"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Frame-Options","value":"deny"},{"key":"Access-Control-Allow-Origin","value":"*"},{"key":"Access-Control-Allow-Methods","value":"GET, POST, DELETE, PUT, PATCH, OPTIONS, HEAD"},{"key":"Access-Control-Allow-Headers","value":"*"},{"key":"Access-Control-Allow-Credentials","value":"true"},{"key":"Access-Control-Max-Age","value":"86400"},{"key":"Content-Encoding","value":"gzip"},{"key":"Strict-Transport-Security","value":"max-age=31536000; includeSubDomains;"}],"cookie":[],"responseTime":null,"body":"{\n    \"result\": {\n        \"itemsReceived\": 2,\n        \"curPage\": 1,\n        \"nextPage\": null,\n        \"prevPage\": null,\n        \"offset\": 0,\n        \"itemsTotal\": 2,\n        \"pageTotal\": 1,\n        \"items\": [\n            {\n                \"id\": 19918,\n                \"Name\": \"Enginsight Micro-Segmentation\",\n                \"vendor\": {\n                    \"id\": 26903,\n                    \"Name\": \"Enginsight\",\n                    \"Category\": \"GRC\"\n                },\n                \"tags\": [\n                    {\n                        \"tag_id\": 126,\n                        \"Name\": \"Zero Trust Architecture\"\n                    },\n                    {\n                        \"tag_id\": 327,\n                        \"Name\": \"Network access security\"\n                    },\n                    {\n                        \"tag_id\": 330,\n                        \"Name\": \"Microsegmentation\"\n                    }\n                ]\n            },\n            {\n                \"id\": 15616,\n                \"Name\": \"Tigera Identity-Aware Microsegmentation\",\n                \"vendor\": {\n                    \"id\": 24500,\n                    \"Name\": \"Tigera\",\n                    \"Category\": \"Endpoint Security\"\n                },\n                \"tags\": [\n                    {\n                        \"tag_id\": 330,\n                        \"Name\": \"Microsegmentation\"\n                    },\n                    {\n                        \"tag_id\": 406,\n                        \"Name\": \"Workload\"\n                    },\n                    {\n                        \"tag_id\": 668,\n                        \"Name\": \"Containment/Isolation\"\n                    }\n                ]\n            }\n        ]\n    }\n}"}],"_postman_id":"c91b2834-7fc4-4ff7-ae0c-815f34518fb9"},{"name":"Get Product","id":"c7d13b79-3140-4afa-8623-dcf598ae1365","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"Content-Type","value":"application/json"}],"body":{"mode":"raw","raw":"{\n    \"product\": 123,\n    \"token\": \"your_token\"\n}","options":{"raw":{"language":"json"}}},"url":"https://api.it-harvest.com/api:9CUm3jDG/eapi/products/get","description":"<h3 id=\"retrieves-details-for-a-specific-product-in-the-dashboard\"><strong>Retrieves details for a specific product in the Dashboard.</strong></h3>\n<ul>\n<li><p><strong><code>\"token\"</code></strong> (String, required): Your authentication token.</p>\n</li>\n<li><p><strong><code>\"product\"</code></strong> (Integer, required): The ID of the product you want to retrieve.</p>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api:9CUm3jDG","eapi","products","get"],"host":["api","it-harvest","com"],"query":[],"variable":[]}},"response":[{"id":"07b814b9-a65f-4d82-90cc-3777a0ac0994","name":"Get Product","originalRequest":{"method":"POST","header":[{"key":"Content-Type","value":"application/json","type":"text"}],"body":{"mode":"raw","raw":"{\n\t\"product\": 22159,\n\t\"token\": \"foo\"\n}","options":{"raw":{"language":"json"}}},"url":"https://api.it-harvest.com/api:9CUm3jDG/eapi/products/get"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Sat, 21 Sep 2024 23:14:15 GMT"},{"key":"Content-Type","value":"application/json; charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"Set-Cookie","value":"XNS=7275d65e7986286b501d784d4433a552|574d02c9abcc5e83d44caa3c8a37144d; Path=/socket/; Secure; HttpOnly; SameSite=Strict"},{"key":"X-App","value":"miss"},{"key":"X-Workspace","value":"hit"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"private, no-cache, no-store, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"Wed, 24 Sep 2014 23:14:15 GMT"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Frame-Options","value":"deny"},{"key":"Access-Control-Allow-Origin","value":"*"},{"key":"Access-Control-Allow-Methods","value":"GET, POST, DELETE, PUT, PATCH, OPTIONS, HEAD"},{"key":"Access-Control-Allow-Headers","value":"*"},{"key":"Access-Control-Allow-Credentials","value":"true"},{"key":"Access-Control-Max-Age","value":"86400"},{"key":"Content-Encoding","value":"gzip"},{"key":"Strict-Transport-Security","value":"max-age=31536000; includeSubDomains;"}],"cookie":[],"responseTime":null,"body":"{\n    \"result\": {\n        \"id\": 22159,\n        \"Name\": \"EndaceProbe Analytics Platform\",\n        \"Description\": \"The EndaceProbe Analytics Platform by Endace is designed to provide organizations with comprehensive visibility into their network activity, both on-premises and in the cloud. It serves as a foundational tool for security analysts to detect, investigate, and respond to cybersecurity threats. The platform records network traffic with zero packet loss, ensuring that every bit of data traversing the network is captured for analysis. This capability is critical for accurate incident response and threat hunting. The EndaceProbe integrates with a variety of security and performance monitoring tools, allowing analysts to pivot from alerts to the related packet-level network history for in-depth investigation. The platform's built-in investigation tool, EndaceVision, enables detailed analysis of recorded traffic, facilitating faster and more decisive responses to security events.\",\n        \"Features\": [\n            {\n                \"name\": \"Network History Recording\",\n                \"description\": \"The EndaceProbe Analytics Platform records a complete history of network traffic, ensuring that all data is captured for forensic analysis. This includes continuous, high-resolution recording capabilities with zero packet loss, which is essential for reconstructing events and understanding the context of security incidents.\"\n            }\n        ],\n        \"Integrations\": [\n            \"OKTA\"\n        ],\n        \"Usage_details\": [\n            {\n                \"details\": \"Define security requirements based on specific assets\"\n            }\n        ],\n        \"Compliance_details\": [\n            \"SOC2\"\n        ],\n        \"Deployment_details\": [\n            {\n                \"details\": \"SaaS\"\n            }\n        ],\n        \"vendor\": {\n            \"id\": 24702,\n            \"Name\": \"Endace\"\n        },\n        \"tags\": [\n            {\n                \"tag_id\": 117,\n                \"Name\": \"Incident Response\"\n            },\n            {\n                \"tag_id\": 442,\n                \"Name\": \"Threat Hunting\"\n            }\n        ],\n        \"mitre\": [\n            {\n                \"id\": 3219,\n                \"mitre_technique_id\": \"T1040\",\n                \"name\": \"Network Sniffing\",\n                \"tactic_id\": 9\n            }\n        ],\n        \"nist\": [\n            {\n                \"category_id\": 14,\n                \"name\": \"Continuous Monitoring\",\n                \"function_id\": 3,\n                \"nist_category_id\": \"DE.CM\"\n            },\n            {\n                \"category_id\": 18,\n                \"name\": \"Incident Analysis\",\n                \"function_id\": 4,\n                \"nist_category_id\": \"RS.AN\"\n            },\n            {\n                \"category_id\": 19,\n                \"name\": \"Incident Mitigation\",\n                \"function_id\": 4,\n                \"nist_category_id\": \"RS.MI\"\n            }\n        ]\n    }\n}"}],"_postman_id":"c7d13b79-3140-4afa-8623-dcf598ae1365"},{"name":"Get Products by Name","id":"8d9f2499-cf1a-4b89-a3ef-6a03b39c09f3","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"Content-Type","value":"application/json"}],"body":{"mode":"raw","raw":"{\n    \"token\": \"your_token\",\n    \"name\": \"product_name\",\n    \"similar_matches_limit\": 5\n}","options":{"raw":{"language":"json"}}},"url":"https://api.it-harvest.com/api:9CUm3jDG/eapi/products/match","description":"<h3 id=\"get-products-by-name\">Get products by name.</h3>\n<ul>\n<li><p><strong><code>\"token\"</code></strong> (String, required): Your authentication token.</p>\n</li>\n<li><p><strong><code>\"name\"</code></strong> (String, required): The name (or partial name) of the product you want to match.</p>\n</li>\n<li><p><strong><code>\"similar_matches_limit\"</code></strong> (Integer, optional, default: <code>5</code>, max: <code>25</code>): The number of additional matches to show.</p>\n</li>\n</ul>\n<h3 id=\"similar-matches-list\">Similar Matches List:</h3>\n<ul>\n<li>Products returned in this list are in descending order of similarity/proximity to the search term.</li>\n</ul>\n","urlObject":{"protocol":"https","path":["api:9CUm3jDG","eapi","products","match"],"host":["api","it-harvest","com"],"query":[],"variable":[]}},"response":[{"id":"6387550b-4570-45d9-96fa-3d7131de69e0","name":"Get Product by Name","originalRequest":{"method":"POST","header":[{"key":"Content-Type","value":"application/json"}],"body":{"mode":"raw","raw":"{\n    \"token\": \"foo\",\n    \"name\": \"password\",\n    \"similar_matches_limit\": 5\n}","options":{"raw":{"language":"json"}}},"url":"https://api.it-harvest.com/api:9CUm3jDG/eapi/products/match"},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"Date","value":"Sun, 29 Sep 2024 17:08:28 GMT"},{"key":"Content-Type","value":"application/json; charset=UTF-8"},{"key":"Transfer-Encoding","value":"chunked"},{"key":"Connection","value":"keep-alive"},{"key":"Set-Cookie","value":"XNS=d4eed45bf28d05549b13af4c96168020|574d02c9abcc5e83d44caa3c8a37144d; Path=/socket/; Secure; HttpOnly; SameSite=Strict"},{"key":"X-App","value":"miss"},{"key":"X-Workspace","value":"miss"},{"key":"X-XSS-Protection","value":"1; mode=block"},{"key":"Cache-Control","value":"private, no-cache, no-store, must-revalidate"},{"key":"Pragma","value":"no-cache"},{"key":"Expires","value":"Thu, 02 Oct 2014 17:08:28 GMT"},{"key":"X-Content-Type-Options","value":"nosniff"},{"key":"X-Frame-Options","value":"deny"},{"key":"Access-Control-Allow-Origin","value":"*"},{"key":"Access-Control-Allow-Methods","value":"GET, POST, DELETE, PUT, PATCH, OPTIONS, HEAD"},{"key":"Access-Control-Allow-Headers","value":"*"},{"key":"Access-Control-Allow-Credentials","value":"true"},{"key":"Access-Control-Max-Age","value":"86400"},{"key":"Content-Encoding","value":"gzip"},{"key":"Strict-Transport-Security","value":"max-age=31536000; includeSubDomains;"}],"cookie":[],"responseTime":null,"body":"{\n    \"matched_products\": [\n        {\n            \"id\": 9259,\n            \"Name\": \"Logmeonce Password Manager and Password Recovery\",\n            \"Description\": \"Logmeonce Password Manager and Password Recovery is a tool that allows users to securely store and manage their passwords, as well as recover lost or forgotten passwords.\",\n            \"Features\": [\n                {\n                    \"name\": \"Zero-Knowledge Technology\",\n                    \"description\": \"Logmeonce uses zero-knowledge technology, which means that the company does not know a user's encryption key or actual passwords. Only the user can decrypt their account.\"\n                }\n            ],\n            \"Integrations\": [\"OKTA\"],\n            \"Usage_details\": [\n                {\n                    \"details\": \"Define security requirements based on specific assets\"\n                }\n            ],\n            \"Compliance_details\": [\"SOC2\"],\n            \"Deployment_details\": [\n                {\n                    \"details\": \"SaaS\"\n                }\n            ],\n            \"similarity\": 2,\n            \"vendor\": {\n                \"id\": 25961,\n                \"Name\": \"Logmeonce\"\n            },\n            \"tags\": [\n                {\n                    \"tag_id\": 33,\n                    \"Name\": \"Password Manager\"\n                }\n            ],\n            \"mitre\": [\n                {\n                    \"id\": 3219,\n                    \"mitre_technique_id\": \"T1040\",\n                    \"name\": \"Network Sniffing\",\n                    \"tactic_id\": 9\n                }\n            ],\n            \"nist\": [\n                {\n                    \"id\": 7,\n                    \"name\": \"Identity Management, Authentication, and Access Control\",\n                    \"function_id\": 2,\n                    \"nist_category_id\": \"PR.AA\"\n                }\n            ]\n        },\n        {\n            \"id\": 20852,\n            \"Name\": \"Securden Password Vault for Enterprises\",\n            \"Description\": \"Securden Password Vault for Enterprises is a secure password management solution designed by Securden for IT teams. It centralizes the storage, organization, sharing, and tracking of all passwords and sensitive data within an enterprise. The product is available for on-premises self-hosting as well as a fully cloud-based service. It aims to control access, audit and monitor activities, automate password security best practices, and ensure compliance with standards to reduce security risks.\",\n            \"Features\": [\n                {\n                    \"name\": \"Centralized password storage\",\n                    \"description\": \"Allows enterprises to centrally store and organize all passwords and sensitive data in a secure vault.\"\n                },\n                {\n                    \"name\": \"Privileged account discovery\",\n                    \"description\": \"Automatically discovers privileged accounts within the enterprise environment.\"\n                },\n                {\n                    \"name\": \"Secure password sharing\",\n                    \"description\": \"Enables secure sharing of passwords within the team, with granular control over who can access what.\"\n                },\n                {\n                    \"name\": \"One-click remote connections\",\n                    \"description\": \"Facilitates launching of RDP, SSH, and SQL connections with a single click, including web-based connections and native client sessions.\"\n                },\n                {\n                    \"name\": \"Autofill credentials\",\n                    \"description\": \"Automatically fills in credentials on websites and applications, streamlining the login process.\"\n                },\n                {\n                    \"name\": \"Advanced authentication integration\",\n                    \"description\": \"Supports Active Directory integration for user provisioning and authentication, integration with SAML-based SSO solutions, and popular MFA tools for two-step verification.\"\n                },\n                {\n                    \"name\": \"Just-in-Time access provisioning\",\n                    \"description\": \"Grants just-in-time access to resources with full control over permissions, without revealing passwords, and includes access approval workflows.\"\n                },\n                {\n                    \"name\": \"Automated password changes\",\n                    \"description\": \"Automates periodic password changes and enforces password policies to maintain security best practices.\"\n                },\n                {\n                    \"name\": \"Role-based access controls\",\n                    \"description\": \"Establishes role-based access controls to define and enforce who can access specific resources within the enterprise.\"\n                },\n                {\n                    \"name\": \"APIs for application passwords\",\n                    \"description\": \"Provides APIs to manage application passwords, facilitating integration with other systems and applications.\"\n                },\n                {\n                    \"name\": \"Service account management\",\n                    \"description\": \"Manages Windows service accounts and their dependencies, ensuring secure and proper functioning of services.\"\n                },\n                {\n                    \"name\": \"SSH key and secret protection\",\n                    \"description\": \"Secures SSH keys and DevOps secrets, preventing unauthorized access and leaks.\"\n                },\n                {\n                    \"name\": \"Audit trails and actionable reports\",\n                    \"description\": \"Tracks activities with audit trails, generates actionable security reports, and provides alerts and notifications for expirations and events.\"\n                },\n                {\n                    \"name\": \"Cross-platform access\",\n                    \"description\": \"Enables access to the password vault from various platforms, including mobile devices and provisions for offline access.\"\n                },\n                {\n                    \"name\": \"Shared account MFA\",\n                    \"description\": \"Implements multi-factor authentication for shared accounts to enhance security.\"\n                },\n                {\n                    \"name\": \"Enterprise integration capabilities\",\n                    \"description\": \"Integrates with SIEM and ticketing systems, features inbuilt high availability, and supports database backup for large, complex, distributed environments.\"\n                },\n                {\n                    \"name\": \"Strongest encryption\",\n                    \"description\": \"Protects all sensitive data with AES-256 encryption, the strongest known military-grade algorithm, and enforces SSL/TLS on all connections.\"\n                }\n            ],\n            \"Integrations\": [],\n            \"Usage_details\": [],\n            \"Compliance_details\": [],\n            \"Deployment_details\": [],\n            \"similarity\": 1.5,\n            \"vendor\": {\n                \"id\": 26781,\n                \"Name\": \"Securden \"\n            },\n            \"tags\": [\n                {\n                    \"tag_id\": 33,\n                    \"Name\": \"Password Manager\"\n                }\n            ],\n            \"mitre\": [],\n            \"nist\": []\n        },\n        {\n            \"id\": 16302,\n            \"Name\": \"forghetti Password Generator and Management application\",\n            \"Description\": \"The forghetti Password Generator and Management application is a security solution designed to manage and generate passwords, PINs, and memorable words for users' online accounts. The application emphasizes security without the need to store passwords, offering a unique approach to password management. It allows users to access their passwords anywhere, on any device, and any platform, generating passwords on-demand without the necessity of remembering them.\",\n            \"Features\": [\n                {\n                    \"name\": \"Secure group sharing\",\n                    \"description\": \"The application provides a secure method for group sharing of passwords, PINs, and memorable words. It generates these credentials with a code that is not stored, ensuring that shared information remains secure.\"\n                },\n                {\n                    \"name\": \"Password generation on-demand\",\n                    \"description\": \"Passwords are generated when they are needed, which means users do not have to remember any passwords. This on-demand generation ensures that passwords are always fresh and potentially reduces the risk of password reuse.\"\n                },\n                {\n                    \"name\": \"Security without password storage\",\n                    \"description\": \"Unlike traditional vault-based password managers, forghetti does not store any passwords at all. This approach eliminates the risk associated with storing encrypted passwords and potentially reduces the attack surface for cyber threats.\"\n                },\n                {\n                    \"name\": \"Unique values for forghettibles\",\n                    \"description\": \"When a password, referred to as a 'forghettible', is set up within the application, it is immediately associated with several unique values. These include unique IDs, creation dates and times, modification dates and times, and other numeric values that are specific to that individual forghettible.\"\n                },\n                {\n                    \"name\": \"Cross-platform accessibility\",\n                    \"description\": \"The application is available on various platforms, including the App Store, Google Play, and for Windows and MacOS devices, allowing users to manage their passwords across different devices and operating systems.\"\n                },\n                {\n                    \"name\": \"Simple shape-based access\",\n                    \"description\": \"The application allows users to generate and access unique passwords using a simple shape, which simplifies the user experience while maintaining security.\"\n                }\n            ],\n            \"Integrations\": [],\n            \"Usage_details\": [],\n            \"Compliance_details\": [],\n            \"Deployment_details\": [],\n            \"similarity\": 1.5,\n            \"vendor\": {\n                \"id\": 26520,\n                \"Name\": \"forghetti\"\n            },\n            \"tags\": [\n                {\n                    \"tag_id\": 33,\n                    \"Name\": \"Password Manager\"\n                }\n            ],\n            \"mitre\": [\n                {\n                    \"id\": 3219,\n                    \"mitre_technique_id\": \"T1040\",\n                    \"name\": \"Network Sniffing\",\n                    \"tactic_id\": 9\n                }\n            ],\n            \"nist\": []\n        },\n        {\n            \"id\": 16272,\n            \"Name\": \"Password Security Game\",\n            \"Description\": \"Education Arcade's Password Security Game is an interactive educational tool designed to teach users about the importance of password strength and security. The game aims to enhance users' understanding of how to create robust passwords that can protect against unauthorized access and cyber threats. It is part of Education Arcade's suite of cyber security awareness games that leverage gamification to promote safe online behaviors.\",\n            \"Features\": [\n                {\n                    \"name\": \"Password strength education\",\n                    \"description\": \"The game educates users on what constitutes a strong password by highlighting the elements that can make passwords more secure, such as the inclusion of uppercase and lowercase letters, numbers, and special characters.\"\n                },\n                {\n                    \"name\": \"Passphrase creation\",\n                    \"description\": \"It guides users on how to turn a regular password into a long and strong passphrase, which is more effective at securing accounts against common cyber attacks.\"\n                }\n            ],\n            \"Integrations\": [],\n            \"Usage_details\": [],\n            \"Compliance_details\": [],\n            \"Deployment_details\": [],\n            \"similarity\": 1,\n            \"vendor\": {\n                \"id\": 26593,\n                \"Name\": \"Education Arcade\"\n            },\n            \"tags\": [\n                {\n                    \"tag_id\": 86,\n                    \"Name\": \"Password Security\"\n                }\n            ],\n            \"mitre\": [\n            ],\n            \"nist\": []\n        },\n        {\n            \"id\": 18133,\n            \"Name\": \"GateKeeper Password Manager\",\n            \"Description\": \"GateKeeper Password Manager by Untethered Labs is a cybersecurity solution designed to provide passwordless authentication for employees using proximity security keys. It integrates with a machine-learning privileged access control platform to manage user access to computers and websites, aiming to prevent poor password hygiene and reduce the risk of security breaches. The product enforces strong password policies and minimizes the attack surface by locking workstations when the user is not in proximity, thereby addressing the human element of security vulnerabilities.\",\n            \"Features\": [\n                {\n                    \"name\": \"Proximity-based passwordless 2FA\",\n                    \"description\": \"Utilizes Bluetooth technology to enable a passwordless two-factor authentication system. The device locks or unlocks computers based on the proximity of the user's security key, enhancing security without the need for manual password entry.\"\n                },\n                {\n                    \"name\": \"Active Directory integration with admin console\",\n                    \"description\": \"Offers integration capabilities with Active Directory, allowing for centralized management of user access and permissions through an administrative console.\"\n                },\n                {\n                    \"name\": \"Automatic lock for all workstations\",\n                    \"description\": \"Automatically locks workstations when the user's security key is out of the predefined Bluetooth range, ensuring that unattended computers remain secure.\"\n                },\n                {\n                    \"name\": \"Continuous authentication password manager\",\n                    \"description\": \"Provides ongoing authentication by continuously verifying the user's presence through their security key, maintaining security throughout the session.\"\n                },\n                {\n                    \"name\": \"Automatic OTP on websites for 2FA\",\n                    \"description\": \"Generates and inputs one-time passwords (OTPs) automatically on websites that require two-factor authentication, streamlining the login process and enhancing security.\"\n                },\n                {\n                    \"name\": \"Wireless login for PC, Mac, web, and software\",\n                    \"description\": \"Enables wireless login to PCs, Macs, web services, and software applications, leveraging the proximity of the security key for access without the need for manual password entry.\"\n                }\n            ],\n            \"Integrations\": [],\n            \"Usage_details\": [],\n            \"Compliance_details\": [],\n            \"Deployment_details\": [],\n            \"similarity\": 1,\n            \"vendor\": {\n                \"id\": 25655,\n                \"Name\": \"GateKeeper Access\"\n            },\n            \"tags\": [\n                {\n                    \"tag_id\": 33,\n                    \"Name\": \"Password Manager\"\n                },\n                {\n                    \"tag_id\": 462,\n                    \"Name\": \"Identity and Access Management\"\n                }\n            ],\n            \"mitre\": [],\n            \"nist\": []\n        }\n    ]\n}"}],"_postman_id":"8d9f2499-cf1a-4b89-a3ef-6a03b39c09f3"},{"name":"Gideon","id":"6ac5340c-15b6-4273-91e1-f30eb2e6df94","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"Content-Type","value":"application/json","type":"text"}],"body":{"mode":"raw","raw":"{\n    \"chat_context\": [{\"role\": \"user\", \"content\": \"I'm looking for an anti-phishing solution.\"}],\n    \"token\": \"your_token\"\n}","options":{"raw":{"language":"json"}}},"url":"https://gideon.it-harvest.com/enterprise/product","description":"<h3 id=\"returns-list-of-products-based-on-natural-language-input\">Returns list of products based on natural language input.</h3>\n<ul>\n<li><p><strong>\"token\"</strong> (<code>String</code>, required): Your authentication token.</p>\n</li>\n<li><p><strong>\"chat_context\"</strong> (<code>List of Chat Objects</code>, required): The conversation history. Allowed values are:</p>\n<ul>\n<li><p><code>Chat Object</code></p>\n<ul>\n<li><p>{\"role\": <em>\"string\"</em>, \"content\": <em>\"string\"</em>}</p>\n<ul>\n<li>Roles can either be <strong>\"user\"</strong> or <strong>\"assistant\"</strong>.</li>\n</ul>\n</li>\n</ul>\n</li>\n<li><p><strong>The first and last message in the chat context must have a role of \"user\".</strong></p>\n<ul>\n<li><p>If you are asking a single question with no conversation history, then you would pass:</p>\n<ul>\n<li><code>\"chat_context\" = [{\"role\":\"user\", \"content\": \"what are crowdstrike's products\"}]</code></li>\n</ul>\n</li>\n</ul>\n</li>\n<li><p>User chat content must be less than 800 characters long.</p>\n</li>\n<li><p>Assistant chat content must be less than 10,000 characters long.</p>\n</li>\n<li><p><strong>Roles must be alternating each message, starting and ending with user messages.</strong></p>\n</li>\n</ul>\n</li>\n</ul>\n<h4 id=\"chat-context\">Chat Context:</h4>\n<ul>\n<li><p>Chat context is the conversation history being passed to the chatbot.</p>\n</li>\n<li><p>The input is a list of chat objects, each of which is either a user message or an assistant message. All chat objects must have a \"content\" string representing the user's prompt or the assistant's reply.</p>\n</li>\n</ul>\n<h4 id=\"more-details--input-intent-detection\">More Details + Input Intent Detection:</h4>\n<ul>\n<li><p>This endpoint is desined to only return a list of products. There is no natural language output. Returned products are those that Gideon has determined are most relevant to the user's prompt. This endpoint will <em>not</em> return long lists of products (the upper limit is around fifteen to twenty).</p>\n</li>\n<li><p><strong>Prompts with explicit intent that go beyond asking for products may be rejected</strong>. Gideon screens the user's input to ensure that the prompt is relevant and is asking <em>for</em> a product(s). Prompts with direct and explicit parameters on what products the user is looking for will yield the best results.</p>\n<ul>\n<li><p><strong>Why does intent matter?</strong></p>\n<ul>\n<li>Gideon is single-purpose, designed to return a list of products, nothing else. By asking for non-product data, it can be rendered ineffective at determining what to return and may respond with products that are not directly related to the user's prompt.</li>\n</ul>\n</li>\n<li><p><strong>Bad Question Examples:</strong></p>\n<ul>\n<li><p>\"Does crowdstrike have any post-quantum capabilities?\"</p>\n<ul>\n<li>Intent is to extract features or subsets of product data, <em>not</em> the product itself.</li>\n</ul>\n</li>\n<li><p>\"What kind of anti-phishing functionalities does OPSWAT's product suite have?\"</p>\n<ul>\n<li>Intent is to extract features or subsets of product data, <em>not</em> the product itself.</li>\n</ul>\n</li>\n</ul>\n</li>\n<li><p><strong>Good Question Examples:</strong></p>\n<ul>\n<li><p>\"Show me Crowdstrike Falcon.\"</p>\n<ul>\n<li>Intent is to retrieve a product.</li>\n</ul>\n</li>\n<li><p>\"Return all of OPSWAT's email security products or solutions that have some kind of email protection features.\"</p>\n<ul>\n<li>Intent is to retrieve a list of products.</li>\n</ul>\n</li>\n<li><p>\"I need to replace my cloud SIEM solution, reccomend me some that aren't Splunk.\"</p>\n<ul>\n<li>Intent is to retrieve a list of products.</li>\n</ul>\n</li>\n</ul>\n</li>\n</ul>\n</li>\n</ul>\n","urlObject":{"protocol":"https","path":["enterprise","product"],"host":["gideon","it-harvest","com"],"query":[],"variable":[]}},"response":[{"id":"9db92fc5-3a19-46e9-a2e8-6df7b283f732","name":"Example","originalRequest":{"method":"POST","header":[{"key":"Content-Type","value":"application/json","type":"text"}],"body":{"mode":"raw","raw":"{\n    \"chat_context\": [{\"role\": \"user\", \"content\": \"show me a network security solution by sangfor\"}],\n    \"token\": \"foo\"\n}","options":{"raw":{"language":"json"}}},"url":"https://gideon.it-harvest.com/enterprise/product"},"_postman_previewlanguage":"json","header":[{"key":"Content-Type","value":"application/json","description":"","type":"text"}],"cookie":[],"responseTime":null,"body":"{\n    \"products\": [\n        {\n            \"id\": 27683,\n            \"name\": \"Network Secure\",\n            \"description\": \"Sangfor Network Secure (previously known as NGAF) is an AI-powered next-generation firewall (NGFW).\",\n            \"Features\": [\n                {\n                    \"name\": \"Ai-Powered Malware Detection\",\n                    \"description\": \"Integrates with Engine Zero detection engine using machine learning models and AI algorithms to detect known and unknown malware with 99.76% accuracy rate by analyzing traffic patterns and behaviors\"\n                },\n                {\n                    \"name\": \"Deep Packet Inspection\",\n                    \"description\": \"Inspects content of data packets beyond header information to enable granular firewall rules based on specific data types, applications, services, devices and users\"\n                },\n                {\n                    \"name\": \"Cloud Deception Capability\",\n                    \"description\": \"Implements deception technology to set up decoy systems for detecting malicious actors and lateral movement attempts within the network\"\n                }\n            ],\n            \"compliance\": [\n                \"SOC2\"\n            ],\n            \"usage\": [\n                \"Scan devices\"\n            ],\n            \"deployment\": [\n                \"On-premise\"\n            ],\n            \"integrations\": [\n                \"Okta\"\n            ],\n            \"nist\": [\n                \"PR.PS-04\"\n            ],\n            \"mitre_mitigations\": [\n                {\n                    \"mitre_mitigation_id\": \"M1019\",\n                    \"mitigation_name\": \"Threat Intelligence Program\"\n                }\n            ],\n            \"mitre_attack\": [\n                {\n                    \"mitre_subtechnique_id\": \"T1602.001\",\n                    \"subtechnique_name\": \"Data from Configuration Repository: SNMP (MIB Dump)\"\n                }\n            ]\n        }\n    ]\n}"}],"_postman_id":"6ac5340c-15b6-4273-91e1-f30eb2e6df94"},{"name":"Get Gideon Credits","id":"8b5fb6ad-05fa-4d94-89e7-c0724863b6c6","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"Content-Type","value":"application/json","type":"text"}],"url":"https://gideon.it-harvest.com/enterprise/credits?token=your_token","description":"<h3 id=\"gets-remaining-gideon-credits\"><strong>Gets remaining Gideon credits.</strong></h3>\n<ul>\n<li><strong><code>\"token\"</code></strong> (String, required): Your authentication token.</li>\n</ul>\n","urlObject":{"protocol":"https","path":["enterprise","credits"],"host":["gideon","it-harvest","com"],"query":[{"key":"token","value":"your_token"}],"variable":[]}},"response":[{"id":"6d2bb33d-2aed-4006-bb66-f6dfce80bb96","name":"Example","originalRequest":{"method":"GET","header":[{"key":"Content-Type","value":"application/x-www-form-urlencoded","type":"text"}],"url":{"raw":"https://gideon.it-harvest.com/enterprise/credits?token=your_token","protocol":"https","host":["gideon","it-harvest","com"],"path":["enterprise","credits"],"query":[{"key":"token","value":"your_token"}]}},"status":"OK","code":200,"_postman_previewlanguage":"json","header":[{"key":"content-type","value":"application/json"},{"key":"x-cloud-trace-context","value":"0b469091bc24a2a3e333d4482e0a394b"},{"key":"date","value":"Wed, 08 Oct 2025 19:44:53 GMT"},{"key":"server","value":"Google Frontend"},{"key":"Content-Length","value":"26"}],"cookie":[],"responseTime":null,"body":"{\n    \"credits_remaining\": 6.35\n}"}],"_postman_id":"8b5fb6ad-05fa-4d94-89e7-c0724863b6c6"}]}