Counterintelligence Packages

Cyber threats can strike any department, or any job function, in your organization

You can’t stop people from targeting your organization, but you can at least ensure that you are prepared when threats do arise. For an example, see this case study.

Our expert CI team works with different departments within your organization to detect and address potential threats to your data, brand and people. We are an extension of your team, offering advanced monitoring, analysis and threat intelligence using a human-driven, technology-assisted approach.

ci-packges-wheel

Cyber threats can strike any department, or any job function, in your organization

Learn more by clicking each section below:

  • Add to your existing cybersecurity suite of solutions
  • Gain visibility to issues and challenges to your data, brand and people
  • Leverage our expertise to access advanced intelligence normally inaccessible to you

Features

  • Physical threats
  • Compromised assets
  • Threat actor monitoring
  • Threats to industry
  • Source code searches
  • Rogue app searches
  • IP and hash feeds
  • @domain monitoring
  • Typosquatting
  • Tunable escalations
  • Quarterly threat actor report
  • Threat Watch
  • Monthly overview report
  • Predictive analysis

Download Data Sheet

  • Gain insight into what’s being said about your company through channels inaccessible to your marketing team
  • Go beyond what current brand and campaign monitoring tools on the market can offer

Features

  • Brand image
  • Slander
  • Social media monitoring
  • Trending analysis on campaigns
  • Monthly overview report
  • Tunable escalations
  • Darknet and Clearnet monitoring
  • Competitive analysis

Download Data Sheet

  • Gain visibility to situations happening in your organization (e.g. sexual harassment, office bullying, etc) in order to mitigate and intervene, if necessary
  • Have confidence you are hiring the right employee

Features

  • Sexual harassment
  • Disgruntled employee
  • X amount of new hire investigations
  • Monthly overview
  • Tunable escalations
  • Darknet and Clearnet monitoring

Download Data Sheet

  • Investigate a person of interest to your organization (e.g., former employee, threat actor) using means not accessible to you
  • Proactively determine if a threat exists and develop plans to mitigate it

Features

  • Direct monitoring for x amount of people
  • Person of interest monitoring
  • Trending monitoring mixed with HAL
  • Full picture of POI
  • Hobbies
  • Groups POI belongs to
  • Friends
  • Predictive analysis
  • Monthly overview
  • Tunable escalations
  • Weekly status calls
  • Darknet and Clearnet monitoring

Download Data Sheet

  • Monitor for threats against an executive or high profile employee using means not accessible to you
  • Proactively determine if a threat exists and develop plans to mitigate it

Features

  • Monitoring for X amount of execs
    • Physical threats
    • Slander
    • Menacing
    • Protesting
    • Targeted email monitoring
    • X amount of travel risk assessments
  • Monthly overview
  • Tunable escalations
  • Darknet and Clearnet monitoring

Download Data Sheet

  • Monitor for threats against an executive’s family members using means not accessible by you
  • Proactively determine if a threat exists and develop plans to mitigate it

Features

  • Direct monitoring for client and direct family members
    • Physical threats
    • Social media training
    • Targeted email monitoring
    • Darknet and Clearnet monitoring
    • Monthly overview
    • Tunable escalations

Download Data Sheet

  • Proactively monitor for physical and cyber threats against the school and its students
  • Gain insight to apps students are using to cyberbully

Features

  • Darknet and Clearnet monitoring
  • Clearnet scraping
  • Social media monitoring
  • Social media scraping
  • School app monitoring
  • School app scraping
  • Physical threats
    • Active shooter situations
    • Bullying/Harassment
    • Drug use
  • Monthly overview
  • Weekly email
  • Tunable escalations

Download Data Sheet

  • Purchase Counterintelligence services at an hourly rate
  • Any of the above services can be purchased a la carte

Features

Any of the following:

  • Darknet deep dive (Historical investigation)
  • Darknet and Clearnet deep dive (Historical investigation)
  • @Domain monitoring
  • Typosquatting monitoring
  • IP and Hash feed
  • Malware reversing
  • Tunable escalations
  • Deep dive investigations
  • Travel risk assessments
  • Threat watch
  • Rogue app search
  • CIIR

Ready to learn more?

Bundled pricing is available if you purchase multiple packages. Contact us for more information and a quote.