Learn about threats before
Threat detection and analysis: It starts with technology
ICG uses a patented process that starts with proprietary, in-house technology for aggregating and filtering big data. That process:
- Collects data from open- and closed-source intelligence specific to each client’s business challenges and threat landscape
- Filters and analyzes this data to deliver relevant, actionable information to clients
Threat intelligence via data mining
Our proprietary threat detection and analysis software aggregates and analyzes millions of pieces of data every day to find patterns and indicators that demonstrate potential cyber or physical threats for our clients. Our software can follow seemingly innocent tweets, veiled language, temporary pop-up sites and hidden websites, and Internet Relay Chat (IRC) channels to find threats from known malicious individuals and groups, as well as criminals and activists. Our technology can also find websites that are illicitly distributing intellectual property, or are being used to plan other threats.
Our technology doesn’t just find and view the threat data, but analyzes and separates the important information from the background noise. Continually refined and improved, ICG's technology is unlike anything else in the industry.
Continually refined and improved, ICG's technology is unlike anything else in the industry.