Enabling Threat Intelligence Teams in the Public and Private Sector

Hunter Fusion Center enables threat intelligence teams to identify and monitor threat actors and their activity across the Surface, Deep, Dark Web, and Social Media. It supports the full intelligence cycle by enabling investigators to configure the collection and analysis of information to meet their specific requirements.

OSINT Fusion Center delivers technology-agnostic threat tracking for any user-defined areas of interest. Analysts can explore entities and relationships to gain insights on any aspects of their investigations.

The built-in search capabilities give analysts the freedom to locate useful information based on hierarchies, synonyms, relatedness, natural language processing, fuzzy searches, proximity searches, and Boolean operators.

Tracker cyber investigations Infographic

HIGHLIGHTS

  • Support for the full Intelligence lifecycle.

  • Collect & Fuse data from internal and external sources.

  • Configure, schedule and manage thousands of collection policies.

  • Automatic Entity Extraction and Enrichment.

  • Dynamic Taxonomies.

  • Automatic Linking & Powerful Analytics - Strong filtering, Network analysis, Maps and Geo-location, Time-series analysis etc.

  • Support different missions and Intel Units with granular access controls / permissions.

  • Secure collaboration, Investigation case files, internal and cross unit, comprehensive Audit logs.

  • Deploy software on-premises or in the cloud.

1. PLAN & COLLECT

  • Define Mission

  • Configure Sources and Taxonomies

2. EXTRACT & CATEGORIZE

  • Auto-extract, Disambiguate Entities

  • Auto-discover Relationships

3. INVESTIGATE & COLLABORATE

  • Query, Filter, Drill Down

  • Create Cases, Share Research

4. REPORT & RESPOND

  • Produce & Publish Reports

  • Adjust Mission and Tune System

Collect & Fuse

OSINT Fusion Center can be configured to fuse external data sources with internal email, file systems and other document sources. Data is stored using Apache-SOLR. The system comes with 45+ built-in connectors to sources including crawlers, search engines, social networks, niche websites, bins, dark web meta-search engines, and more.

  • Granular control over thousands of crawling policies

  • Secure Colloboration

  • Automatic linking and powerful analytics

  • Dynamic Taxonomies

  • Automatic entity extraction

  • Automatic enrichment

Tracker image 04 June

KEY FEATURES

  • Robust Integrated Data

    The largest collections of compromised identities, including over 180 billion attributes and 124 billion curated identity records spanning 125 countries and 53 languages.

  • Flexible Deployment

    Can be deployed on-premise, in private cloud or managed by Constella in the public cloud.

  • Dashboard, Reports & Alerts

    Once the collected data has been analyzed, it can be presented to users in a variety of formats such as customized reports and visual graphs that show the relationships between entities.

  • Powerful Analytics

    Allows analysts to visualize relationships between entities and search across all data at once to discover new relationships and surface previously hidden patters.

See Constella in Action