Welcome to the future of threat intelligence:

Real-time, omni-channel automated collection

With the maturity of machine learning, NLP and big data, Sixgill takes a quantum leap into the next stage of threat intelligence evolution. It features unique, automated data collection, it is hyper scalable and fully covert. Unlike other solutions that rely heavily on humans, Sixgill’s collection and correlation is 100% automated – it minimizes human errors, reduces false-positives and increases analyst productivity.

The culmination and combination of these technologies provides an automated solution that increases security teams’ confidence in their ability to fight fraud, maximize incident response and preemptively protect their organization’s critical assets.

Unparalleled Collection

Light Years Ahead
Of The Threat Curve

Sixgill’s vast data lake allows you to converge and consolidate all underground threat intelligence into a contextual model to power and modernize all security tools, platforms, processes and people.

0 x
COLLECTION

from dark web
sources

0 x
COLLECTION

FROM INSTANT
MESSAGING APPS

Contextual

Intelligence That Gets
The Big Picture

Sixgill understands how critical each threat or breach is, and knows how to prioritize the mitigation process. It provides you with insights about threat status, asset criticality and actions required for remediation.

Covert

Invisible.
Invincible.

When your analysts don’t expose information while researching, your battle is already half won. Sixgill solutions are the only ones that are fully covert, keeping your teams and your assets fully anonymous.

0 x
DETECTION

of leaked Credentials

0 x
FASTER

extraction

Real-time

Intelligence That’s
Faster Than Fraud

Nothing is faster than real-time. Sixgill catches events as they happen, before attacks are deployed or leaked credentials are sold. With unmatched extraction speed, it is your best source for fresh intelligence.

Searchable & Intuitive

A Whole New Class
In A Single Pane
Of Glass

Sixgill understands how critical each threat or breach is, and knows how to prioritize the mitigation process. It provides you with insights about threat status, asset criticality and actions required for remediation.

Language Agnostic

Fluent In
The Language
Of The Underground

Currently supporting English, Russian, Spanish, Chinese and Arabic, and with a powerful translation engine that allows you to speak the language of the underground.

Power beyond compare

  •  
  • Sixgill
    100% automated
  • Other Solutions
    Relies on humans for manual back-office “detection”
  • Avg. detection time
  • Seconds
  • days/week 
  • Time from setup to relevant data
  • Minutes
  • days
  • Collection from dark web sources (forums, markets)
  • 100s
  • 12s
  • Customize sources
  • Quick. Automatic.
  • Slow. Manual.
  • Collection from instant messaging apps
  • 10s of millions items, updated in real-time; automatic expansion to new groups
  • 1 million at best; manual joining to new groups
  • Extraction speed
  •  
  • Item 3
  • Image/ OCR extraction
  • Yes
  • No
  • Multi language support
  • Any language
  • Depends on analyst
  • Data-driven insights
  • Yes
  • Yes
  • Global reach
  • Yes
  • No
  • Scalability
  • Instant
  • Weeks-months