In an environment of digital transformation and globalization, the use of technological information sources adds value thanks to the knowledge that companies acquire about the environment in which they operate.
Faced with this scenario, a company needs to protect its business by collecting and analyzing news about risks and threats from competitors, customers and other factors so that, with this information, it can make decisions that reduce uncertainty.
Tarlogic Security’s approach to intelligence is proactive. The intelligence provided by our team involves anticipating events by developing different scenarios and analyzing related indicators. Our team is made up of professionals with extensive experience in technological research in both the public and private sectors.
PHASE 1MANAGEMENT
Cybersecurity threat
Actors: Cybercrime, Hacktivism…
Indicators: campaigns, leaks…
Reputation threat
Actors: Clients, Doctors…
Indicators: eFeelling…
Competitive threat
Actors: Competitors, insiders…
Indicators: Actor-collective relationship…
Personal interest
Actors: VIPs, press…
Indicators: CEO fraud, defamation…
PHASE 2OBTAINING
Threat Context
- Credentials
- Data Leaks
- Malware
- Exposure
- Campaigns
- Threat Actors
- TTPs
WEBINT
- Forums
- Web
- Press
- DeepWeb
- Feed y Lists
SOCMINT
- Communities of interest
- Persons of interest
- Content and relations
Virtual HUMINT
SIGINT
Tracking Messaging & Social Media
BUSINESS CONTINUITY
PHASE 3ANALYSIS AND PROCESSING
NORMALCY
MONITORING

Periodic reports
THREAT
DETECTION
e.g.: read document
24/7 alert notification and informational notes 8/5
ACTORS and INDICATORS
ANALYSIS
e.g. extra-filtered insider
Situation scenario
FOLLOW-UP
RESEARCH
e.g.: tracking insider
Intelligence report