SOLUTIONS

Threat Intelligence

We aggregate global threat databases and use them to evaluate traffic to your sites and apps

Whether it be information from the dark web or confirmed threat patterns contributed from thousands of security researchers around the globe. We realised that we needed a way to not only check for contextual and behavioral anomalies but also to cross-check against these intelligence sources.

To make this fast and simple we continuously aggregate data from multiple sources and process every event sent through our APIs against it. The end result is more accurate risk scoring and an increased chance of stopping attackers before any damage is done.

Project Honey Pot

Project Honey Pot

This is a database containing over 120 million ‘bad’ IP addresses that have been reported in the past as having been used by spammers or hackers. We match the IP addresses of user logins against this database and alert when it appears as if a malicious user is attempting to gain access.

Tor Usage

Tor is a network protocol and browser that hides a user’s location by bouncing their traffic through a number of access points. ThisData monitors for Tor exit nodes - where the connection emerges back on to the traditional internet - as a way of ensuring unauthorised access to data is flagged in real-time.

Tor Usage
Alien Vault

Open Threat Exchange

We partner with AlienVault to gain access to a crowd-sourced database of known attack patterns and indicators of compromise. This integration enables our algorithms to adjust rapidly when members of the intelligence community report or upload breach or attack data.

Analyzers
Account Takeover
Analyzers
Two Factor Authentication
Analyzers
Continuous Authentication
Analyzers
Fraud Detection
Analyzers
Adaptive Authentication
Analyzers
Risk Scoring