BEACON provides automated workflow and case management of risk alerts to detect, assess and secure against the risk of anomalous behavior. Insider threat audit relies on several key technology platforms to deliver and aggregate the required data for effective detection, analysis and resolution or investigation. Depending on the event, a repeatable workflow process is tailored to the alert and an organization’s normal operating procedures. Analysts … Continue reading BEACON


ThreatBase is the knowledge repository of cyber threats, accessible by clients via a secure portal to provide an overview of recent threat trends, including tracking actors, threat origins, and most popular TTPs (Tactics, Techniques and Procedures). The ThreatBase knowledge repository contains all  intelligence reports, cross referenced and fully searchable. There are more than a dozen search options, each of which can also be used to … Continue reading Theatbase