Surface, Deep and Dark Web. A priori separate worlds but between which cybercriminals interconnect different relays to download exploit kits, malware or stolen identification data. From Twitter to Pastebin and Tor links are distilled discreetly…

Cyber Threat Intelligence platform, MediaCentric® offers in-depth monitoring and analysis capacities of the activity on all the sources – social networks, blogs, forums, video platforms, pastes, IRC and alternative networks –making it possible to get early warnings in order to prevent attacks and intrusions.

Thwart cyber threats and spot information leaks

With MediaCentric®, the cyber analyst can break the APT kill chain by acting from its early phases :

Time-line of a hacking campaign

Threat Intelligence and data leaks

Our Products

Crossing®

Trusted Gateway for sensitive
information systems

more information

MediaCentric®

Software platform for advanced processing
of multilingual multimedia open sources

more information