Cyber Intelligence

We offer centralized technologies for data collection & intelligent learning for better organizational efficiency.
VIEW TECHNOLOGIES

Fusion & Situational Awareness Center

Centralized investigation platform unifying cross-organizational data-sources, bringing valuable insights to the surface, and turning knowledge into action.
REQUEST SOLUTION

Mass Collection Intelligence Systems

Automatically collects and analyzes mass IP, telephony content and metadata at virtually any scale and enables to rapidly generate case relevant leads and retrospective intelligence – even from encrypted communications. Using mass analytics and machine learning the system focuses on relevant communications, gains intelligence from encrypted apps, creates mass automatic profiles, and delivers meaningful intelligence from the mass.

Target Based Lawful Interception Systems

Collects and integrates target Voice and IP intercepts, geo location, for case and target investigations using automated target profiling and investigation frameworks, built-in monitoring functionality, invaluable IP intelligence, automatic highlight of suspicious behavior or relations, and provides evidence for use in court.
REQUEST SOLUTION

Web Intelligence

Covert access to vast amounts of data on the surface, deep and dark web, together with proprietary web analytics capabilities, to identify and investigate online crime and terror:

OSINIT

Access vast amounts of data in the open, deep and dark web to identify and investigate existing and developing threats.

PROFILER

Construct an instant Web intelligence picture on suspect’s behavior, interests, locations, social and professional activities and general way of life – on masses of entities.

WEB AWARENESS

Monitor social media communications for persons of interest or events and locations of interest, for real-time notifications and analysis of ad hoc developments.

DARK-WEB INTELLIGENCE

Covert and automatic analysis of Dark Web activity to gain alerts on threatening activities based on your organization’s items of interest.

Tactical Intelligence

Wide portfolio of portable and covert off-air MITM interception solutions, independent of service providers, across virtually any network or technology:

Active-cellular Interception System

For target interception over 2G, 3G & 4G (Native) networks

Passive cellular interception system

for off-air monitoring of mass 2G, 3G communications.

Satelite Interception Passive “all-in-one” mass interception

for Thuraya, IsatPhone Pro & Iridium

Airborn

Integrated solutions combining COMINT & VISINT payloads with various airborne platforms.

Border Intelligence

A layer of COMINT sensors deployed on stationary & mobile platforms along a border.

Advance Content Extraction

Sophisticated capabilities for extracting valuable content from end point devices and networks – even when communications are encrypted.
REQUEST SOLUTION

Geolocation

Remote desktop solution for locating targets over 2G, 3G & 4G networks, allowing real time and historical monitoring, geofencing and more.
REQUEST SOLUTION

Cyber Threat Intelligence (CTI)

Our Risk Protection platform provides an external attack surface monitoring, infused by Threat Intelligence from variety of sources, including Social Media, chat forums, paste bins, Deep & Dark web and more.
REQUEST SOLUTION

Don't miss out on our newsletters.

Stay up to date with our latest technological innovations