Comprehensive, accurate, automated detection and tracking
Supporting the entire Intelligence Lifecycle, Tracker fuses internal and external data with powerful analytics for comprehensive detection and tracking. It consistently delivers the most accurate real-time asset protection, situational awareness, automated threat detection and workflow efficiency in the market: from planning through intelligence dissemination and multiple case management. Advanced filtering configuration, pattern matching, automatic entity extraction, relationship mapping and selective insight sharing further enhance Tracker’s powerful potential.
Full spectrum data coverage
Collect and fuse internal and external data from surface to dark web, including hundreds of connectors from Social Media, forums and our proprietary breach data lake: the largest of its kind with over 100 billion attributes and 25 billion curated identity records spanning 125 countries and 53 languages.
Real-time dashboards, reports and alerts
Customise views, visualize entity relationships and see all current activity patterns across trending topics, handles, hashtags, websites, etc.—setting rules to automate actions and trigger real-time alerts by source, topic, content, volume variation, source changes or user behavior.
Asset protection and tracking workspace
Increase efficiency of digital surveillance, threat monitoring, situational awareness and early warning—monitoring specific assets (companies, personas, domains, etc.) through advanced filtering configuration, pattern matching and automatic entity extraction.
Multiple case management workspace
Perform highly efficient, collaborative investigations with managed workflows: generate new case files, create personas/entities relationship graphs, selectively share insights, filter and extract content, create associations, save and manage multiple cases.
Multi-tenant, secure, scalable collaboration
Support different organizations (for MSSPs), missions or Intel Units (for Enterprieses or LEAs) with granular access controls, permissions and sharing policies to isolate sensitive information and workspaces—configuring, scheduling and managing thousands of collection tasks/policies.
Powerful analytics and automation
Automatically discover hidden relationships and patterns using: automatic filtering, linking, network analysis, geo-location; AI, face and object recognition; Bot detection, time-series analysis, clustering and segmentation, NLP technology, Named Entity Recognition (NER), language detection and translators, OCR, sentiment analysis and text transcription from audio and video.
Custom threat intelligence models
Define and implement specific threat models for companies or verticals/use cases by defining taxonomies, assets, sources, trackings and filters—reducing customers’ risk profile through a more relevant, accurate and efficient threat intelligence workflow.
Fully supported intelligence cycle
Support the entire intelligence workflow of an analyst for increased efficiency and real-time, actionable intelligence—from planning & direction through to collection, processing & storage, analysis and dissemination of intelligence.