cyber attaques

Signs that cyberattacks
are being prepared

risuqe atteintes physiques

Risks of physical
attacks

Deliberate or unintentional
data leaks over the Internet

contrefaçons

Infringements and
distribution networks

With more than 15 years of experience supporting the state’s critical services, Bertin IT uses technologies and an investigative methodology that can withstand the challenges of the web and all that lurks beneath its surface. Our analysts are all part of a well-developed culture of sharing information, economic intelligence and details of the cyber environment.

We patrol cyberspace, detecting and identifying:

Signs that preparations are underway to target your organisation with a cyberattack (ransomware, DDOS attack, website defacement, etc.)

Risks of physical damage to people and property in your company

We inform you immediately and advise you on the measures you should take.

Leaks of confidential or personal information – deliberate or otherwise.

We find out the reason for the leak and assess its scope

Sales of counterfeit products

We help you find out who is involved and map their distribution networks

Clear, documented alerts

For every piece of evidence that we find, we immediately send you an alert, together with all the relevant documentation and actionable recommendations.
We also provide online summaries that can be accessed at any time, facilitating communication between your services and our specialists

Monthly and half-yearly reports contain all the metrics (indexed sources, number of alerts handled, industry trends, etc.) and a summary of our monitoring activities for the period just ended.
We can also conduct investigations on request into any issue of interest for your organisation.

In-depth monitoring

The solutions we provide automate the collection and indexing of multi-format (text, images, audio, video) and multi-sourced data (Clear/Deep/Dark web), 24 hours a day, 7 days a week:

UGC – PODCASTS – BLOGS – FORUMS – SOCIAL MEDIA – IRC – CYBER SOURCES – DARK WEB SEARCH ENGINES

They also collect information about updates for vulnerabilities via specialist information sites.

They feature in-depth processing capabilities:

  • Ability to extract text content from image and video files
  • Multilingual speech-to-text transcription
  • Machine translation
  • Semantic analysis
  • Relational network graph

About our Cyber Intelligence services

Our services are built on the MediaCentric and AMI Enterprise Intelligence platforms already in operation in several departments within France’s Ministry of Defence and Ministry of the Interior for critical strategic monitoring and information analysis applications.

MediaCentric®

Cyber Threat Intelligence | OSINT

read more

AMI Enterprise Intelligence

Detect risks & opportunities in your environment
and accelerate your competitiveness

read more