Powering Threat Intelligence Teams in the Public and Private Sector.
Tracker enables threat intelligence teams to identify and monitor threat actors and their activity across the Surface, Deep, Dark Web, and Social Media. It supports the full intelligence cycle by enabling investigators to configure the collection and analysis of information to meet their specific requirements.
Tracker delivers technology-agnostic threat tracking for any user-defined areas of interest. Analysts can explore entities and relationships to gain insights on any aspects of their investigations.
The built-in search capabilities give analysts the freedom to locate useful information based on hierarchies, synonyms, relatedness, natural language processing, fuzzy searches, proximity searches, and Boolean operators.
1. PLAN & COLLECT
2. EXTRACT & CATEGORIZE
4. REPORT & RESPOND
3. INVESTIGATE & COLLABORATE
Collect & Fuse
Tracker can be configured to fuse external data sources with internal email, file systems and other document sources. Data is stored using Apache-SOLR. The system comes with 45+ built-in connectors to sources including crawlers, search engines, social networks, niche websites, bins, dark web meta-search engines, and more.
Additional highlights include: