Threat Awareness

CONTACT US

Learn about threats before
they occur.

609.806.5000
contact@icginc.com

Finding the threat needle in the data haystack

Threats can come from anywhere in the world. We use proprietary technology to find them.

We collect data from public and hidden websites around the globe, including:

  • More than 100,000 public and social media websites
  • 200+ cyber Internet Relay Chat (IRC) channels
  • Entertainment and media sites
  • Underground and hidden websites

As new sources of intelligence threats – often invisible to search engines – pop up, we locate, enumerate and monitor them for all threatening activities.

The result: We sift through millions of records each day, in virtually every language spoken around the world, to detect threats against you, your people, your facilities and your intellectual property.

 

Threats can come from anywhere in the world. We use proprietary technology to find them.