Overview: Dendrite Capabilities
4.5k
Command & Control (C2) servers tracked
1 . 8M
Dark web resource records created
80k
Unique dark web users discovered
31Bn
Leaked credential profiles developed
51Bn
Data point correlations generated
Our core platform enables real-time threat intelligence analysis, powered by proprietary data sources, advanced data-point correlations and AI-augmented workflows.
Capabilities
Each of our capabilities are crafted for the sole purpose of enabling defenders to “shift left” several steps ahead of a cyber attack or event.
All existing and development roadmap capabilities are available for À la carte, but come paired as a standard offering.
-
Advanced dark web resource and user enumeration. Explore more than 1.8M pre-corelated records, updated multiple times each day.
-
Monitoring, fingerprinting and tracking all discoverable C2s. Search our database of historical or active records.
-
Understand your organizations risk exposure and aid investigations with a homogenized data set of more than 31 billion user records, pre-correlated to our other data sources.
-
Explore Dendrite and other supported data sources in graphical view, collaborate with team members and share intelligence with organizations in your industry.
-
Weekly updates, commentary and analysis
True to our roots in the open-source security and AI/ML communities, we’re committed to releasing research and utilities that everyone can use.
Built different, from the ground up.
Dendrite was founded by leaders, innovators and practitioners, combining many decades of experience building cybersecurity assets, big data and infrastructure solutions at the enterprise and mega-scale. Built from the ground up with the goal of augmenting existing SIEM, CTI and DE workflows, Dendrite's data driven approach aids defenders with actionable intelligence, gained by bringing context to a sea of information.
Get in touch
Interested in learning more, scheduling a demo or speaking with our team? Get in contact with us - we'd love to hear from you.