Download PDF version Contact company

Cobwebs Technologies (Cobwebs) has launched the only available, fully automated web investigation platform capable of unified identity resolution to the corporate security market.

The ability to work in stealth mode and bridge the digital and physical world will boost the corporate security team’s threat intelligence and mitigation capabilities.

The law enforcement grade platform’s AI and machine learning (ML)-powered algorithms’ ability to extract targeted intelligence from the web’s big data and deliver trustworthy threat intelligence is unprecedented.

Battle-proven technology

Currently, corporate security teams have limited investigative, threat intelligence and detection capabilities because many use disparate systems only capable of monitoring the surface web."

"Some still use time-consuming and error-prone manual investigative processes. Cobwebs makes these outdated processes redundant,” explains Johnmichael O’Hare, Sales and Business Development Director at Cobwebs Technologies.

Cobwebs allows corporate security teams to bridge the digital and physical world with its ability to deanonymise threat actors anywhere. No one else has this capability. Our technology is already battle-proven and used by law enforcement agencies and homeland security departments around the world.

How does it work?

The Cobwebs web investigation platform works similarly to a search engine. An analyst enters their search terms and the platform conducts wide and deep threat monitoring across the web.

When something suspicious is found, the platform moves into the web investigation phase.

Here, it not only locates and analyses the activities of threat actors in a myriad of digital and social media channels across the open, deep and dark web but it also proactively thwarts their planning and activities with precision.

Investigative process

The process seamlessly culminates in the deanonymisation and confirmation of the nefarious individual’s identity irrespective of their online or global location. Corporate security analyst’s identity is masked and secured via Cobweb’s secured browsing tool

The threat actor’s identity together with threat intelligence data relevant to the search terms is then displayed on an intuitive dashboard.

Throughout the entire investigative process, the corporate security analyst’s identity is masked and secured via Cobweb’s secured browsing tool.

Strengthens risk profiles

Cobwebs strengthen the risk profiles of companies using the platform and deliver true threat intelligence.

Our platform will give the teams and departments responsible for protecting some of America’s most important businesses the investigative capabilities they need to enhance their field intelligence with actionable and trustworthy data.

This allows them to manage their internal and external risks, and cyber threats, protect their bottom line, and boost their situational awareness. Company employees, digital and physical assets, and intellectual property remain protected,” adds O’Hare.

User protocols

From a privacy perspective, the platform is only able to locate information already in place on the surface, deep or dark web.

All corporate security teams using Cobwebs Technologies have their own internal user protocols and oversight that govern the appropriate use of the technology.

Cobwebs provide the web intelligence platform, trains corporate security teams on how to use it, and provides after-sales support to all clients. It does not carry out investigations on behalf of clients.

Download PDF version Download PDF version

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?