Platform > services > Extortion monitoring
Extortion Monitoring
Powered by our extensive, signal-rich collections and alerting engine, Flashpoint’s Extortion Monitoring Service delivers real-time automated alerts of identified leaked assets as a result of an extortion incident, providing teams with the necessary insight into the extent of exposure and damage.
Continuous monitoring
In the event of a breach, stolen data could end up on illicit markets months or years after the initial compromise has occurred—potentially leading to legal ramifications and reputation damage. Extortion Monitoring provides pre-and post-event keyword monitoring based on your requirements, to continuously assess reputation and legal obligations beyond the conclusion of an investigation or incident response.
Strong bench of resources and collections
Flashpoint’s multidisciplinary intelligence analysts speak over 35 languages and drive our global collections engine which accounts for our extensive collection of illicit communities. Our data and collections cover more regions, countries, and types of threat actors than our industry peers.
Real-time alerts
Flashpoint’s automated alerting matches conversations from illicit online communities with keywords associated with the team’s areas of concern and automatically provides these matches directly to the user.