ALL SOURCE AUTOMATED DATA COLLECTION AND ENRICHMENT:

WEB | ENTERPRISE DATA | REPOSITORIES | 3rd PARTY | SIEM | EMAIL | OSINT

Threat Hunter™ integrates multiple internal and external data sources, including SIEM, Email, OSINT or any other information repository, including the i2 EIA InfoStore and iBase.

Threat Hunter™ enables analysts and investigators to search and access these sources for relevant data via an HTML5 Web browser or from directly within the IBM i2 Analyst’s Notebook chart.


Capture, Enrich and Integrate

Threat Hunter™ is an immediate fit into the Intelligence Cycle and gives all investigators and analyst's a Common Operational Picture across all connected data.

The range data integration and automation of data capture and processing shortens the time to the production of viable intelligence products.


Collate evidence and investigate behaviours

Threat Hunter™ can provide investigators and analyst's with enriched intelligence including:

  • Matched Content
  • Evidence
  • Files of Interest
  • Keywords
  • Locations
  • Images
  • Persons of Interest
  • Mention of Assets

Extensibility

Threat Hunter™ is built in Point Duty's InMedias Framework. The flexibility of the InMedias means that the core Threat Hunter™ components can be extended as required to met operational and investigation needs.