Nisos OSINT Monitoring and Analysis

Additional Info

Company size (employees)50 to 99
Type of solutionService


Nisos OSINT Monitoring and Analysis provides broad and customized monitoring of social media data to enable actionable intelligence for Nisos clients

Nisos customizes social media, dark web, and open source (OSINT) analysis to enable enterprises to use Managed IntelligenceTM operations for:
ƒ Physical security
ƒ Cybersecurity
ƒ Fraud
ƒ Platform abuse
ƒ Third-party risk
ƒ Brand reputation
ƒ Executive protection teams
Nisos also maintains a robust OSINT analysis capability, which includes disinformation and threat actor unmasking.

Our highly-trained analysts use many types of technologies, providing both broad coverage of thousands of platform pages and bespoke solutions to gain access to closed forums.

OSINT monitoring and analysis enables clients to take action and protect your people, your business, your customers, and your assets with rapid and curated responses to intelligence questions and concerns.
Deliverables included:
1)Situation Briefing: Monthly summary status report of trends and activity observed by Nisos researchers and analysts
2)Spot Report: a supplemental brief used to quickly communicate time-sensitive intelligence for significant events impacting a client

How we are different

1) Broad-Based Collection
We use broad-based collection strategies to pool thousands of pages of content, which we then search for keyword mentions of the brand, key personnel, the company, or company products. Using over 30 sources including third-party products and our own proprietary tools and personas, we view, store, collect, and export many social media pages and archive this data in a highly-secure and closely-maintained central storage location. We collect thousands of pages of content, which Nisos operators then review for long-term monitoring and event-driven investigations.

2) Virtual Research Environment
We conduct all OSINT research from virtual research environments provisioned with appropriate security measures. Within these environments, through actively engaging or passively observed, our analysts move swiftly between platforms and personas to garner a better understanding of threat actors’ motives and plans.

3) Attribution and Unmasking, if Necessary
Finally, attribution is needed for various threats. Advanced adversary research attribution relies on advanced tradecraft to ensure accuracy. Our ability to correctly attribute bad actors to confirm their identity, and to do so in a manner that is unseen by the adversary,
is often a critical component of our research capability.