We patrol cyberspace, detecting and identifying:
Signs that preparations are underway to target your organisation with a cyberattack (ransomware, DDOS attack, website defacement, etc.)
Risks of physical damage to people and property in your company
We inform you immediately and advise you on the measures you should take.
Leaks of confidential or personal information – deliberate or otherwise.
We find out the reason for the leak and assess its scope
Sales of counterfeit products
We help you find out who is involved and map their distribution networks
The solutions we provide automate the collection and indexing of multi-format (text, images, audio, video) and multi-sourced data (Clear/Deep/Dark web), 24 hours a day, 7 days a week:
UGC – PODCASTS – BLOGS – FORUMS – SOCIAL MEDIA – IRC – CYBER SOURCES – DARK WEB SEARCH ENGINES
They also collect information about updates for vulnerabilities via specialist information sites.
They feature in-depth processing capabilities:
- Ability to extract text content from image and video files
- Multilingual speech-to-text transcription
- Machine translation
- Semantic analysis
- Relational network graph