Tracker Datasheet

Powering Threat Intelligence Teams in the Public and Private Sector.

Tracker enables threat intelligence teams to identify and monitor threat actors and their activity across the Surface, Deep, Dark Web, and Social Media. It supports the full intelligence cycle by enabling investigators to configure the collection and analysis of information to meet their specific requirements.

Tracker delivers technology-agnostic threat tracking for any user-defined areas of interest. Analysts can explore entities and relationships to gain insights on any aspects of their investigations.

The built-in search capabilities give analysts the freedom to locate useful information based on hierarchies, synonyms, relatedness, natural language processing, fuzzy searches, proximity searches, and Boolean operators.

1. PLAN & COLLECT

  • Define Mission

  • Configure Sources and Taxonomies

2. EXTRACT & CATEGORIZE

  • Auto-extract, Disambiguate Entities

  • Auto-discover Relationships

Tracker cyber investigations Infographic

4. REPORT & RESPOND

  • Produce & Publish Reports

  • Adjust Mission and Tune System

3. INVESTIGATE & COLLABORATE

  • Query, Filter, Drill Down

  • Create Cases, Share Research

HIGHLIGHTS

  • Support for the full Intelligence lifecycle.

  • Collect & Fuse data from internal and external sources.

  • Configure, schedule and manage thousands of collection policies.

  • Automatic Entity Extraction and Enrichment.

  • Dynamic Taxonomies.

  • Automatic Linking & Powerful Analytics - Strong filtering, Network analysis, Maps and Geo-location, Time-series analysis etc.

  • Support different missions and Intel Units with granular access controls / permissions.

  • Secure collaboration, Investigation case files, internal and cross unit, comprehensive Audit logs.

  • Deploy software on-premises or in the cloud.

Collect & Fuse

Tracker can be configured to fuse external data sources with internal email, file systems and other document sources. Data is stored using Apache-SOLR. The system comes with 45+ built-in connectors to sources including crawlers, search engines, social networks, niche websites, bins, dark web meta-search engines, and more.

Additional highlights include:

  • Granular control over thousands of crawling policies

  • Secure Colloboration

  • Automatic linking and powerful analytics

  • Dynamic Taxonomies

  • Automatic entity extraction

  • Automatic enrichment

Tracker datasheet dashboard

KEY FEATURES

  • Robust Integrated Data

    The largest collections of compromised identities, including over 131 billion attributes and 66 billion curated identity records spanning 125 countries and 53 languages.

  • Flexible Deployment

    Tracker can be deployed on-premise, in private cloud or managed by Constella in the public cloud.

  • Dashboard, Reports & Alerts

    Once the collected data has been analyzed, it can be presented to users in a variety of formats such as customized reports and visual graphs that show the relationships between entities.

  • Powerful Analytics

    Tracker allows analysts to visualize relationships between entities and search across all data at once to discover new relationships and surface previously hidden patters.

See Constella in Action