OUR OFFER

Tracker

Comprehensive, accurate, automated detection and tracking

Supporting the entire Intelligence Lifecycle, Tracker fuses internal and external data with powerful analytics for comprehensive detection and tracking. It consistently delivers the most accurate real-time asset protection, situational awareness, automated threat detection and workflow efficiency in the market: from planning through intelligence dissemination and multiple case management. Advanced filtering configuration, pattern matching, automatic entity extraction, relationship mapping and selective insight sharing further enhance Tracker’s powerful potential.

01

Full spectrum data coverage

Collect and fuse internal and external data from surface to dark web, including hundreds of connectors from Social Media, forums and our proprietary breach data lake: the largest of its kind with over 100 billion attributes and 25 billion curated identity records spanning 125 countries and 53 languages.

02

Real-time dashboards, reports and alerts

Customise views, visualize entity relationships and see all current activity patterns across trending topics, handles, hashtags, websites, etc.—setting rules to automate actions and trigger real-time alerts by source, topic, content, volume variation, source changes or user behavior.

03

Asset protection and tracking workspace

Increase efficiency of digital surveillance, threat monitoring, situational awareness and early warning—monitoring specific assets (companies, personas, domains, etc.) through advanced filtering configuration, pattern matching and automatic entity extraction

04

Multiple case management workspace

Perform highly efficient, collaborative investigations with managed workflows: generate new case files, create personas/entities relationship graphs, selectively share insights, filter and extract content, create associations, save and manage multiple cases

Multi-tenant, secure, scalable collaboration

Support different organizations (for MSSPs), missions or Intel Units (for Enterprises or LEAs) with granular access controls, permissions and sharing policies to isolate sensitive information and workspaces—configuring, scheduling and managing thousands of collection tasks/policies.

Powerful analytics and automation

Automatically discover hidden relationships and patterns using: automatic filtering, linking, network analysis, geo-location; AI, face and object recognition; Bot detection, time-series analysis, clustering and segmentation, NLP technology, Named Entity Recognition (NER), language detection and translators, OCR, sentiment analysis and text transcription from audio and video.

Custom threat intelligence models

Define and implement specific threat models for companies or verticals/use cases by defining taxonomies, assets, sources, trackings and filters—reducing customers’ risk profile through a more relevant, accurate and efficient threat intelligence workflow.

Fully supported intelligence cycle

Support the entire intelligence workflow of an analyst for increased efficiency and real-time, actionable intelligence—from planning & direction through to collection, processing & storage, analysis and dissemination of intelligence.

Featured Content

Report

Constella 2020 COVID-19 Threat Report

Report

Constella 2021 Identity Breach Report