Understand the risks
Backchannel Intelligence supplies customers with a range of collections, analysis, and operations services. Our global collections platform allows us to deliver broad coverage with a light footprint, and provide customers with granular insights to empower business risk decisions.
As a private intelligence service, we apply all the assets in our portfolio to further your security intelligence requirements.
Backchannel Intelligences produces finished intelligence products (FINTEL) for a variety of customers in security, sales, marketing, and management.
With our access and auditing tools, we create broad risk assessments across entire industries or marketplaces.
We work well in low-data environments to correlate against our own internal and external sources and help make investigation breakthroughs.
Backchannel’s Parity® service continuously detects relevant intel from millions of events.
Backchannel produces a range of intelligence products to fit customer needs.
We retain a unique set of assets to engage, disrupt, and deter threat actors.
Telex, a Swiss army knife for attribution
Backchannel Intelligence deploys Telex®, a data collection platform designed to aid online investigations. Telex® produces technical evidence on a target that can be correlated and enriched with other data sources, bringing security operators one step closer to attribution on the target.
Parity, Backchannel's data extraction and detection platform
Parity® is a flexible streaming data solution for real time detection and response. Backchannel Intelligence uses it as the backend platform for all of our services. Parity® ingests millions of events daily sourced from 400+ global cybercriminal forums, 10k+ e-crime chatrooms, and more. You may also integrate detection capability via native integration or API.
- Notifications of a security threat intended to provide customers with immediate insights
- Requirements-based intelligence collection
- Collection from open and closed sources
- Incident-based alerting
- Description of threat actor activity
- Malware / software dissection
- Development of persistent detection methods
- Competitive / Marketplace Landscape analysis
- Customized engagements to deny, disrupt, and deceive threat actors exploiting users and platforms.
- Attribution services
- Red team operations
- Attribution services