Understand the risks
Backchannel Intelligence supplies customers with a range of collections, analysis, and operations services. Our global collections platform allows us to deliver broad coverage with a light footprint, and provide customers with granular insights to empower business risk decisions.
Solutions
External Intelligence
As a private intelligence service, we apply all the assets in our portfolio to further your security intelligence requirements.
Finished Intelligence
Backchannel Intelligences produces finished intelligence products (FINTEL) for a variety of customers in security, sales, marketing, and management.
Competetive Analysis
With our access and auditing tools, we create broad risk assessments across entire industries or marketplaces.
Attribution Operations
We work well in low-data environments to correlate against our own internal and external sources and help make investigation breakthroughs.
Approach
Collections
Backchannel’s Parity® service continuously detects relevant intel from millions of events.
Analysis
Backchannel produces a range of intelligence products to fit customer needs.
Operations
We retain a unique set of assets to engage, disrupt, and deter threat actors.
Unique Tech
Telex, a Swiss army knife for attribution
Backchannel Intelligence deploys Telex®, a data collection platform designed to aid online investigations. Telex® produces technical evidence on a target that can be correlated and enriched with other data sources, bringing security operators one step closer to attribution on the target.
Parity, Backchannel's data extraction and detection platform
Parity® is a flexible streaming data solution for real time detection and response. Backchannel Intelligence uses it as the backend platform for all of our services. Parity® ingests millions of events daily sourced from 400+ global cybercriminal forums, 10k+ e-crime chatrooms, and more. You may also integrate detection capability via native integration or API.
Pricing
- Notifications of a security threat intended to provide customers with immediate insights
- Requirements-based intelligence collection
- Collection from open and closed sources
- Incident-based alerting
- Description of threat actor activity
- Malware / software dissection
- Development of persistent detection methods
- Competitive / Marketplace Landscape analysis
- Customized engagements to deny, disrupt, and deceive threat actors exploiting users and platforms.
- Attribution services
- Red team operations
- Attribution services