Threat IntelligenceOur proprietary technologies are complemented by world-class analysts to process and contextualise thousands of sources. This analysis can be visualised via our platform, dashboards, and metrics.

Acquisition

Acquisition

Data is collected from open and closed sources across both the Clearnet and darknet.
Transformation

Transformation

Our platform and team transform this data into relevant information.
Dissemination

Dissemination

Actionable intelligence is then disseminated in real-time to your organisation.

Cyjax Threat Intelligence is available in a variety of mediums: via a subscription to our Threat Intelligence Platform; straight to your inbox (included with a subscription); or on an individual basis without paying an annual fee.

Our platform includes light and dark mode options

Services

Dashboards and Visualisation

Our unique widget and dashboard tooling enable users to visualise and query data from thousands of threat feeds in one place.

  • Create your own fully customisable dashboards to highlight and collate information pertinent to your interests.
  • Visualise data and information in tables, graphs or charts.
  • Set and filter parameters with keyword queries.
  • Identify trends and links between information, incidents and malicious actors.
More Info
Brand Protection

Our team and platform monitor for suspicious activity related to your brand across the Clearnet, darknet and deep web, including the following sources:

  • Automated Twitter and YouTube monitor
  • Analyst social media overwatch
  • Paste site monitor
  • News articles and forum posts
  • Newly registered domains
  • SSL certificate registrations
More Info
Analyst Services

Cyjax analysts work proactively to monitor emerging threats and your brand. Our specialist teams can be tasked with investigations or continuous tracking, including but not limited to:

  • Open-source intelligence
  • Darknet and deep web
  • Threat contextualisation
  • Malware analysis
More Info
Incidents and Profiling

Our team reports on incidents and malicious actors across the world, providing critical context and in-depth analysis.

  • Reports and profiles are mapped to the MITRE ATT&CK framework
  • Tactics, Techniques and Procedures (TTPs) and Indicators of Compromise (IOCs) are extracted from incidents and aligned with adversarial profiles
More Info
Vulnerability and Exposure Monitoring

Our service monitors your critical assets. We provide:

  • Breach alert tracking tokens
  • Email credential monitoring
  • Infrastructure and domain monitoring
  • Enhanced vulnerability intelligence and scanning
  • Contextualised Indicators of Compromise (IOCs)
More Info
Social Media Intelligence (SOCMINT)

We cover all forms of mainstream social media, as well as instant messaging platforms and forums. Our operations team provides up-to-date intelligence on activity that could impact your organisation. The SOCMINT team can be tasked with tracking and collating activity related to a specific topic of interest. Features include:

  • Digital profiling (Executive)
  • Social media monitoring
  • Real-time sentiment analysis
  • Analytics
+ More Info
Training and Simulation

Cyjax’s experts are available to provide proprietary training courses specifically tailored to your organisation’s requirements. Topics include:

  • Threat intelligence analyst training
  • Cyber security awareness training
  • Phishing simulation
+ More Info
API Endpoint Architecture

The Cyjax Platform can work with almost any API endpoint architecture. Our platform supports JSON, STIX/TAXII and CEF formats out-the-box as well as a host of native integrations. A complete developer guide and control framework enables ad hoc integrations between platforms.

Available integrations exist for the following:

  • QRadar
  • HP ArcSight
  • Splunk
  • IBM I2
  • Any third-party platform with REST API support
More Info

Data Security

Cyjax is ISO:27001 certified and offers flexible data hosting options including private cloud hosting as well as on-premise installations. Contact us for more information on how we approach data security and compliance.

Request a free demo and see how our Threat Intelligence Platform can protect your organisation.