top of page
External Attack Surface Management - Continuous Monitoring for Cyber Attacks

Pure Signal™ Recon

Proactive cybersecurity defense starts with real-time threat intelligence

Eliminate your adversary's element of surprise

Monitor.Block.Defend.

Look on to threat actor infrastructure with unmatched visibility

Black Background 1.png

“We found great utility in being able to pre-emptively stop an attack with visibility into changes that threat actors were making to their infrastructure in an effort to attack us again.”

– Senior Analyst, UK Bank

What is Recon Ultimate?

Recon is a web-based threat intelligence tool for advanced security analysts and mature SOC Teams.

 

With a simple GUI, graphical displays, tagged results and powerful query tools, it transforms how sophisticated users hunt, assess and monitor advanced persistent threat actors.


It is the place to greatly enhance investigations for single IPs, domains, or entire CIDR ranges related to malicious activity.

How it works

Simple process to build out a comprehensive and granular .

  • Complete query information to make it unique

    • Query Name, Description and the Group it is assigned to

  • Provide query settings to add date range and seed information

    • Search type: Date Range, or Hostname & Date, or IP & Date

    • Date range: Conditional (such ‘Last Week’ or Last 3 Months etc.) or specific across Date/Hour/Minute/Second

  • Select from over 40 data types to include in the query

    • Examples include NetFlow, PDNS and x509 Certificates among many others 

  • Input the IP address or domain(s) in the search bar.

Recon Create Query.png
Uncovering Phishing Threats in Cyberspace

Not just threat intelligence...

Learn how analyst teams gain an edge with on-demand access to global Internet traffic telemetry.

From closing gaps in visibility to achieving a more proactive security posture, the following whitepaper illustrates how any organization can benefit from on-demand access to Pure Signal ™.

Read this case study to learn how banks are…

  • proactively mapping APT infrastructures and watching them evolve in near-real time.

  • blocking phishing emails before they’re sent.

  • extracting more value from their other threat intelligence sources.

  • enforcing supply chain security.

Black Background 1.png

“When [a third party is] compromised, we identify it with Recon, then tell [the third party] how [the threat actor] got in...and what they need to do to stop them immediately."

– Lead Security Analyst, Fortune 1 Global Retail Organization

Discover the strategic value of tracking cyber threats beyond your perimeter.

Conducting Threat Reconnaissance for Proactive Defense

Supply Chain Security

Enforcing Supply Chain Security for Comprehensive Protection

Repeat Attacker Defense

Unveiling the Culprit by Conducting Cyber Investigation and Attribution

Data Breach Prevention

Proactively block new threats outside your perimeter, reducing risk.

What Elite Threat Hunters See Image.png

The idea that good organizations can have the ability to conduct recon on the bad actors is only recently surfacing among the most risk-averse enterprises. However, it is threat hunting as it should be.

Black Background 1.png

“We identified an APT (advanced persistent threat) attack on a subsidiary. None of the subsidiary's security solutions caught it, but we caught it with Recon."

– Security Analyst Team Lead, Top 5 Fortune 500 Company

Find, map, monitor, and block cyber threats before they even get to your doorstep.

  • Get to the origin of a threat, map malicious actor infrastructure and block it, then monitor and protect yourself against them indefinitely.

  • Robust searching and filtering across the broadest collection of global telemetry.

  • Correlate IP addresses with malware insights extracted from 10+ years of attack observance and malware analysis.

  • Batch and schedule queries.

  • No Hardware. No software. Instant on.

  • API integration.

  • Export to CSV, XML, XLSX or JSON.

Uncovering Cybersecurity Threats through Advanced Analysis
bottom of page