SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Climax Unveils Hybrid Security System

    Climax Unveils Hybrid Security System

    Hanwha PNM-9085RQZ Multi-Sensor Camera

    Hanwha PNM-9085RQZ Multi-Sensor Camera

    Ava Aware Cloud: Simple, Smart Security

    Ava Aware Cloud: Simple, Smart Security

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Legrand Launches A Smart Video Doorbell Equipped With High Definition Wide Angle Camera
    • Airwards Becomes The First Global Awards Platform Recognizing Groundbreaking Drone Work
    • Brinks Home Security Announces Long-Term Contract With Its Major Authorized Dealer, Skyline Security
    • Effective Security Devices To Protect Banknote Due To Counterfeiting Cash Scam Says International Trade Body
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Security bytes
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2020
    • Year in Review 2019
    Featured
    • Safety In Smart Cities: How Video Surveillance Keeps Security Front And Center
    • Which New Buzzwords Reflect The Security Industry’s Trends?
    • Biometrics Provides Industries With Security, Access Control And Data Protection
    • Retail Security In 2021 And Beyond
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Dahua Technology Installs HD CCTV Cameras With Smart Analytics Using AI To Secure Iconic Battle Of Britain Bunker

    Dahua Technology Installs HD CCTV Cameras With Smart Analytics Using AI To Secure Iconic Battle Of Britain Bunker

    Oliver Law Security Installs Vanderbilt ACT365 Security System To Protect One Of Doncaster’s Largest Gyms, The Fitness Village

    Oliver Law Security Installs Vanderbilt ACT365 Security System To Protect One Of Doncaster’s Largest Gyms, The Fitness Village

    Hikvision IP CCTV Systems Protect Visitors And Stores At Somerset Mall In South Africa

    Hikvision IP CCTV Systems Protect Visitors And Stores At Somerset Mall In South Africa

    CLIQ® Access Control Solution From ASSA ABLOY Helps Secure Museums, Shopping And Indoor Leisure Sites

    CLIQ® Access Control Solution From ASSA ABLOY Helps Secure Museums, Shopping And Indoor Leisure Sites

  • Virtual events
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Management Systems
    • Integrated Systems
    • Asset Management
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Capture New Opportunities With Computer Vision And Video Analytics

    Capture New Opportunities With Computer Vision And Video Analytics

    Maximizing 8K Resolution & LPR Solutions for Stadiums, Municipalities and Government

    Maximizing 8K Resolution & LPR Solutions for Stadiums, Municipalities and Government

    Vanderbilt ACT365 With Schlage ENGAGE Locks

    Vanderbilt ACT365 With Schlage ENGAGE Locks

    How Open Supervised Device Protocol (OSDP) is Revolutionizing Access Control Systems

    How Open Supervised Device Protocol (OSDP) is Revolutionizing Access Control Systems

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • Hanwha Techwin America
    • Eagle Eye Networks
    • ELATEC USA
    • Security & Safety Things
    • Gallagher Security (Europe) Ltd
    Other Resources
    • eMagazines
    • Videos
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    10 Step Guide to Staying Ahead of Emerging Security Threats

    10 Step Guide to Staying Ahead of Emerging Security Threats

    2021 Trends in Video Surveillance

    2021 Trends in Video Surveillance

    5 Security Lessons For Navigating COVID-19

    5 Security Lessons For Navigating COVID-19

    Security Investments Retailers Should Consider For Their 2021 Budget

    Security Investments Retailers Should Consider For Their 2021 Budget

About us Advertise
  • Artificial intelligence (AI)
  • Counter Terror
  • Cyber security
  • Robotics
  • Thermal imaging
  • Intrusion detection
  • Body worn video cameras
  • ISC West
  • Video management software
  • Video analytics
  • COVID-19
  • View all
Artificial intelligence (AI)
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Artificial intelligence (AI)

Cobwebs Launches Web Investigation Platform To Automate Hunting And Identification Of Threat Actors In The Corporate Security Market

24 Nov 2020

Cobwebs Launches Web Investigation Platform To Automate Hunting And Identification Of Threat Actors In The Corporate Security Market
Download PDF version
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook

Cobwebs Technologies (Cobwebs) has launched the only available, fully automated web investigation platform capable of unified identity resolution to the corporate security market.

The ability to work in stealth mode and bridge the digital and physical world will boost the corporate security team’s threat intelligence and mitigation capabilities.

The law enforcement grade platform’s AI and machine learning (ML)-powered algorithms’ ability to extract targeted intelligence from the web’s big data and deliver trustworthy threat intelligence is unprecedented.

Battle-proven technology

“Currently, corporate security teams have limited investigative, threat intelligence, and detection capabilities because many use disparate systems only capable of monitoring the surface web."

"Some still use time-consuming and error-prone manual investigative processes. Cobwebs makes these outdated processes redundant,” explains Johnmichael O’Hare, Sales and Business Development Director at Cobwebs Technologies.

“Cobwebs allows corporate security teams to bridge the digital and physical world with its ability to deanonymize threat actors anywhere. No one else has this capability. Our technology is already battle-proven and used by law enforcement agencies and homeland security departments around the world.”

How does it work?

The Cobwebs web investigation platform works similarly to a search engine. An analyst enters their search terms and the platform conducts wide and deep threat monitoring across the web.

When something suspicious is found, the platform moves into the web investigation phase.

Here, it not only locates and analyzes the activities of threat actors in a myriad of digital and social media channels across the open, deep, and dark web but it also proactively thwarts their planning and activities with precision.

Investigative Process

The process seamlessly culminates in the deanonymization and confirmation of the nefarious individual’s identity irrespective of their online or global location. Corporate security analyst’s identity is masked and secured via Cobweb’s secured browsing tool

The threat actor’s identity together with threat intelligence data relevant to the search terms is then displayed on an intuitive dashboard.

Throughout the entire investigative process, the corporate security analyst’s identity is masked and secured via Cobweb’s secured browsing tool.

Strengthens risk profiles

Cobwebs strengthen the risk profiles of companies using the platform and deliver true threat intelligence.

“Our platform will give the teams and departments responsible for protecting some of America’s most important businesses the investigative capabilities they need to enhance their field intelligence with actionable and trustworthy data.”

“This allows them to manage their internal and external risks, and cyber threats, protect their bottom line, and boost their situational awareness. Company employees, digital and physical assets, and intellectual property remain protected,” adds O’Hare.

User protocols

From a privacy perspective, the platform is only able to locate information already in place on the surface, deep or dark web.

All corporate security teams using Cobwebs Technologies have their own internal user protocols and oversight that govern the appropriate use of the technology.

Cobwebs provide the web intelligence platform, trains corporate security teams on how to use it, and provides after-sales support to all clients. It does not carry out investigations on behalf of clients.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version
  • Business security systems
  • ATM Security
  • Public sector security
  • Asset tracking
  • Identity management
  • Bank security
  • Public security
  • Security software
  • Physical Security Information Management (PSIM)
  • Integration software
  • Cyber security
  • Crime prevention
  • Border Security
  • Corporate Security
  • Data Security
  • Artificial intelligence (AI)
  • Machine Learning
  • Related categories
  • Access control software
Featured white papers
2021 Trends in Video Surveillance

2021 Trends in Video Surveillance

Download
Security Investments Retailers Should Consider For Their 2021 Budget

Security Investments Retailers Should Consider For Their 2021 Budget

Download
Optimize Your Business with Analytics and AI

Optimize Your Business with Analytics and AI

Download
Related articles
Legrand Launches A Smart Video Doorbell Equipped With High Definition Wide Angle Camera

Legrand Launches A Smart Video Doorbell Equipped With High Definition Wide Angle Camera

IDIS America’s Cannabis EBook Helps Systems Integrators Succeed In The Fast-Growing Sector

IDIS America’s Cannabis EBook Helps Systems Integrators Succeed In The Fast-Growing Sector

NW Security Signs Integration Partnership Agreement With Arcules As ‘Cloud CCTV’ Sees Wide Adoption In The United Kingdom

NW Security Signs Integration Partnership Agreement With Arcules As ‘Cloud CCTV’ Sees Wide Adoption In The United Kingdom

Follow us

Sections Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Virtual events Events White papers Videos November 2020 news RSS
Topics Artificial intelligence (AI) Counter Terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras ISC West Video management software
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Limited 2000 - 2021, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACInformed.com

Subscribe to our Newsletter


Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download SecurityInformed.com product tech spec