Automatically discover hidden relationships and patterns using: automatic filtering, linking, network analysis, geo-location; AI, face and object recognition; Bot detection, time-series analysis, clustering and segmentation, NLP technology, Named Entity Recognition (NER), language detection and translators, OCR, sentiment analysis and text transcription from audio and video.
Threat Detection Software & Service
Comprehensive, accurate, automated threat detection and tracking for the Public and Private Sector.
Supporting the entire Intelligence Lifecycle, Tracker fuses internal and external data with powerful analytics
for comprehensive detection and tracking.
Full spectrum data coverage
Collect and fuse internal and external data from surface to dark web, including hundreds of connectors from Social Media, forums and our proprietary breach data lake: the largest of its kind with over 180 billion attributes and 124 billion curated identity records spanning 125 countries and 53 languages.
Real-time dashboards, reports and alerts
Customise views, visualize entity relationships and see all current activity patterns across trending topics, handles, hashtags, websites, etc.—setting rules to automate actions and trigger real-time alerts by source, topic, content, volume variation, source changes or user behavior.
Asset protection and tracking workspace
Increase efficiency of digital surveillance, threat monitoring, situational awareness and early warning—monitoring specific assets (companies, personas, domains, etc.) through advanced filtering configuration, pattern matching and automatic entity extraction
Multiple case management workspace
Perform highly efficient, collaborative investigations with managed workflows: generate new case files, create personas/entities relationship graphs, selectively share insights, filter and extract content, create associations, save and manage multiple cases
Multi-tenant, secure, scalable collaboration
Support different organizations (for MSSPs), missions or Intel Units (for Enterprises or LEAs) with granular access controls, permissions and sharing policies to isolate sensitive information and workspaces—configuring, scheduling and managing thousands of collection tasks/policies.
Powerful analytics and automation
Custom threat intelligence models
Define and implement specific threat models for companies or verticals/use cases by defining taxonomies, assets, sources, trackings and filters—reducing customers’ risk profile through a more relevant, accurate and efficient threat intelligence workflow.
Fully supported intelligence cycle
Support the entire intelligence workflow of an analyst for increased efficiency and real-time, actionable intelligence—from planning & direction through to collection, processing & storage, analysis and dissemination of intelligence.