Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • SOCRadar Extended Threat Intelligence Reviews & Ratings
    104 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    210 Ratings
    Company Website
  • Proton Pass Reviews & Ratings
    31,996 Ratings
    Company Website
  • Iris Identity Protection Reviews & Ratings
    3 Ratings
    Company Website
  • Criminal IP ASM Reviews & Ratings
    18 Ratings
    Company Website
  • Guardz Reviews & Ratings
    117 Ratings
    Company Website
  • Reflectiz Reviews & Ratings
    29 Ratings
    Company Website
  • TrafficGuard Reviews & Ratings
    89 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    163 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    681 Ratings
    Company Website

What is DarkIQ?

Pre-attack signals no other vendor can see – infostealer infections, early data breach detection, and proprietary dark web traffic monitoring. Part of Searchlight Cyber's PTEM platform. DarkIQ continuously monitors the clear, deep, and dark web, filtering out the noise to expose pre-attack signals no other vendor can see. – Targeted Intel: Monitor mentions of your brand across underground forums and private chats. – Exposed Data: Identify infostealer-infected devices and exposed credentials before criminals act.Dark Web Traffic: Detect threats via proprietary Tor traffic analysis to and from your network. – Disrupt Phishing: Track suspicious sites and utilize embedded takedown services. – Actionable Context: Resolve threats quicker with automated MITRE ATT&CK® mapping and one-click health reporting.

What is ACID Cyber Intelligence?

ACID's Cyber Intelligence solution employs a distinctive array of specialized robots that perform thorough, effective, and ongoing surveillance across a wide range of targeted online sources, including: • Social media networks • Criminal discussion boards • IRC chat rooms • Content from the Deep Web • Dark Net spaces and other relevant platforms... These investigations are carried out using a virtually boundless set of client-defined keywords, which are effortlessly translated into multiple languages. The searches focus on various identifiers that could place the organization at risk, such as: • Leaked usernames and passwords • Email addresses • Domain names • Credit card details • Cyber activities • Intellectual property • Information about key personnel and much more... Clients receive real-time alerts through the user-friendly and intelligent ACID dashboard, guaranteeing that they are notified immediately via email without any waiting period. Additionally, any new data is swiftly disseminated as it becomes available, ensuring clients remain up-to-date at all times. This proactive methodology significantly bolsters the organization's capacity to quickly address potential security threats, allowing for a more agile response. With such comprehensive monitoring and immediate communication, clients can feel more secure in their digital environments.

Media

Media

Integrations Supported

Searchlight Cyber

Integrations Supported

Searchlight Cyber

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Searchlight Cyber

Date Founded

2017

Company Location

United Kingdom

Company Website

slcyber.io/products/darkiq/

Company Facts

Organization Name

ACID Technologies

Date Founded

2014

Company Location

Israel

Company Website

www.acid-tech.co

Categories and Features

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Popular Alternatives

Popular Alternatives

Lunar Reviews & Ratings

Lunar

Webz.io