Cyber Threat Intelligence
Detect and deter external threats to your business with Threat Compass, our modular cyber threat intelligence solution. Threat Compass covers the broadest range of threats on the market and delivers actionable intelligence to maximize incident response performance. Empower your security teams with a central point of control for automated, operational, tactical, and strategic threat intelligence.
About Threat Compass
Each Threat Compass module is backed up by our world-class in-house analyst team, and can be acquired and used individually giving you the flexibility to choose the intelligence that is most relevant to your business. Enrich and contextualize threats so you can defend your assets and understand your adversaries’ plans before they strike.

Credentials
Detect and retrieve your compromised credentials in real-time.

Credit Cards
Find stolen customer credit cards, bank information, and infected POS devices.

Data Leakage
Detect leaked documents and information from employees & third parties.

Domain Protection
Combat phishing and cybersquatting attacks with automated detection of malicious sites.

Dark Web
Track and monitor your organization’s footprint on the Dark Web.

Hacktivism
Monitor global social borne hacktivism operations and protect your networks and employees from potential attacks.

Mobile Apps
Discover false, infected, modified, and non-compliant use of your business apps.

MRTI Feed
Access millions of IOCs in real-time and manage threats more efficiently.

Social Media
Track your organization’s digital footprint, including unauthorized use of brands, logos, and assets.

Threat Explorer
Mitigate and prioritize risks with advanced vulnerability intelligence and custom alerting.

Threat Context
Prepare your perimeter against attacks with contextual intelligence around threat actors, campaigns, Indicators of Compromise (IOCs), and more.
Features
- 13+ years of historical threat data
- Data gathering from open, closed, and private sources
- Human-verified delivery that minimizes false positives
- Big data analytics with context and underlying details
- Malware threat scoring and classification
- STIX/TAXII threat data integration and information sharing
- Plugins available for SIEMs, SOAR, and TIPs
- Dynamic risk-scoring system to feed vulnerability management programs via API
- Flexible business model for different partnerships, including MSSP programs
- Ongoing partnership with Cyber Threat Alliance (CTA)

How Threat Compass Works
We continuously search the open, deep, and dark web to discover customer-specific threat information, using automated technology for speed and scale. We retrieve and deliver this intelligence in a modular format, giving customers a straightforward way to confront external cyberthreats and manage their digital risk.
Frequently Asked Questions
A cyber threat intelligence solution can help businesses identify the threats that are targeting them, and reduce incident response times. It can also identify if a compromise has already occurred.
Threat Compass covers a broad range of threats on the market. With its pay-as-you-need modular architecture, you can choose the modules that are most relevant for your business.
Threat Compass can detect both leaked credentials in underground markets, and stolen credentials obtained by malware. Our infrastructure of sinkholes, honeypots, crawlers, and sensors are continuously searching, and can also capture credentials obtained by malware in real-time.
You can configure Threat Compass in a matter of minutes, and get high-impact results almost immediately. The cloud-based solution eliminates the need for software installations, or endpoints.
Threat Compass offers API integration with other systems. The solution also supports STIX/TAXII for easy information sharing between different data formats, and platforms.
Success Stories
Threat Compass enabled one of the world’s largest telecom companies, Telefónica to provide specific, predictive, and actionable intelligence to their clients for accelerated decision making.
Request A Live Demo
Please fill in your information to submit a demo request. All fields are mandatory.