About iThreat

Internet Investigative and Monitoring Specialists

Founded in 1997, iThreat has assisted hundreds of clients with thousands of internet monitoring and investigations, including multiple successful multinational law enforcement operations.

iThreat’s SignalAlert™ efficiently funnels billions of data points to extract and analyze the relevant risk signals that can impact your organization.

Content protection and critical asset defenses

  • The iThreat platform runs 24/7, monitoring open-source and indexed web, as well as the dark web and unindexed deep web.
  • We apply targeted rules to capture highly relevant signal intelligence that is important to our clients’ digital, intellectual, and physical assets.
  • iThreat’s data acquisition and analysis capabilities far surpass internal solutions in run time, cost efficiency, agility, and customization. We help free up our clients’ internal security teams so they can focus on intelligence analysis, not data validation.

Proven threat discovery expertise that businesses count on

  • Our program enhances internal global security, intellectual property protection, legal, and risk management teams.
  • Our unique expertise includes commercial markets, with broad experience in consumer products, pharmaceutical, healthcare, entertainment, and financial verticals.
  • Our team can provide additional investigative support to help you fully understand the nature of critical signals that affect your organization.

Leadership

iThreat has a long history of helping clients mitigate threats with online investigations and intelligence monitoring. iThreat helps clients identify threats directed at key staff and facilities, threats of disruption from activists and extremists, brand disparagement and infringement, counterfeiting, insider threats, and other reputational and security concerns. The relationships we’ve built with CSOs, general counsels, brand and IP protection teams, and other security leaders, has made iThreat an indispensable partner in fighting internet abuse that can cause harm on multiple levels. Our executive staff features a depth of experience in security, investigations, and criminal justice.

Jeffrey Bedser
Jeffrey Bedser
Executive Chair

Jeff Bedser is a technical security and investigations professional whose driving principle is to clean up the internet to make it a safer environment for creativity, commerce, and privacy. After working in the pharmaceutical and banking industries, Jeff began his entrepreneurial pursuits in 1997 when the convergence of technology, the advent of the internet, and the subsequent boom in cybercrime led him to create iThreat. Begun as a subdivision of a Wall Street due diligence firm, iThreat has since assisted hundreds of clients with thousands of monitoring and investigations efforts, in addition to multiple successful multinational law enforcement operations.

Away from his desk, Jeff is passionate about his volunteerism helping smaller entities fight cybercrime. He has belonged to a multitude of internet governance organizations, including: ICANN SSAC, Internet Governance Forum of the United Nations, topDNS with eco, DNS Abuse Institute, the Internet & Jurisdiction Policy Network – Program Contract Group, and the APTLD – Asia Pacific Top Level Domain Association, in addition to multiple community access networks. Jeff graduated from Rutgers College of Rutgers University with a bachelor’s in history and holds multiple certifications and industry recognitions.

Read More +
Edward Yakely
Edward Yakely
CFO & Head of Operations

Ed Yakely is a CPA and certified fraud examiner with over 30 years of experience in operations, finance, tax, human resources and internal IT functions of mid-market and PE funded enterprises. He has had senior leadership roles at Integrichain, Coree Networks and The Claremont Companies, in addition to Ernst & Whinney (now EY).

Read More +
Ashleigh Brady
Ashleigh Brady
Managing Director

Ashleigh has been with iThreat since 2012 specializing in online investigations and intelligence monitoring. As a senior executive, she works directly with clients to help build and implement comprehensive online monitoring programs using iThreat’s SignalAlert system. Prior to assuming her role as managing director, Ashleigh held various positions within the company rising from analyst to project manager and then senior manager before her present job title. Ashleigh is passionate about the value of open-source intelligence and its impact on today’s industries. She has a bachelor’s in criminal justice from Penn State.

Read More +

FAQ Headline

Where does iThreat source data?
iThreat sources data from every corner of the internet and applies the same rules and funneling process no matter if it’s open-source and indexed web, or unindexed dark web and deep web. If the data is text based we will find it.
Read More +
Can SignalAlert detect threats in multiple languages?
Yes!
Read More +
We already have an internal team scanning for online threats. How is iThreat any different?
iThreat scans for data 24/7, internal analysts are limited by work hours. iThreat unburdens your internal analysts from tedious scanning activities so they can concentrate on analysis and investigations. And, if you’re weighing the benefits of building an internal tool to track threats to your organization, you really should talk to iThreat before you make a commitment. You might find (in fact, you will find) that iThreat is significantly more cost effective for your company than populating a team of analysts.
Read More +
Can SignalAlert “listen” to video/audio files online?
Only text-based data is scanned. If transcripts exist of the video or audio files, they can be monitored. We can also monitor video/audio titles, author information and comments on or related to videos/audio.
Read More +
How much does a SignalAlert monitoring program cost?
We work with organizations of all sizes to create monitoring programs tailored to their needs. To learn more and receive a proposal, please call (609) 806-5000.
Read More +
How can iThreat help our company clamp down on intellectual property theft?
iThreat’s SignalAlert IP Lifecycle Protection reports unauthorized content leaks related to your intellectual property. Any text-based indication of theft, misuse, unauthorized use, or threats that compromise the privacy and proprietary nature of your IP can be rooted out no matter where it appears on the internet. Our powerful rules engine and analytical expertise mines relevant data points that help protect your trade secrets, new product development, copyrights, trademarks, and more.
Read More +
Is iThreat able to monitor non-mainstream social media platforms?
Yes!
Read More +

Contact Us

See for yourself how iThreat can elevate your threat intelligence discovery. Complete the form to schedule a free demo.