4iQ is an identity intelligence company empowering intel analysts, security researchers, and criminal investigators with capabilities to unmask adversaries and prevent fraud, account takeover, and cyber espionage. 4iQ continuously validates, then archives, identity records collected from data breaches and leaks exposed in the deep and dark web into the 4iQ IDLake™. The 4iQ IDLake™ is unique because we don’t just systematically collect breach corpuses and exposed identities, we also conduct an extensive cleansing, curation and breach attribution process to filter out fake and duplicate data. As of September 2019, the 4iQ IDLake has over 20 billion identity attributed, 6+ billion clear text passwords and over 30,000 large, unknown and accidental breach corpuses.
The 4iQ IDLake™ powers 4iQ IDHunt™ - an identity intelligence and attribution analysis platform. 4iQ IDHunt™ uses proprietary algorithms to display context and unmask individuals posing a threat to businesses and society, produces actionable intelligence leading to identity attribution, and pieces together historically exposed data to expedite the investigation process and solve crimes - all in one platform. Depending on the mission, Intel units can fuse data from the 4iQ IDLake™ with data across the surface, deep, and dark web, internal file systems and 3rd party data sources to build a private datalake; configure the system to track, monitor and receive real-time alerts in order to uncover the real identity and motivations behind an actor; and predict and prevent future attacks and exploitations.
The 4iQ team is comprised of intelligence community analysts, infosec pioneers and tech entrepreneurs with a single mission: to disrupt cyber-enabled crime at the source - the people behind the attacks.
4iQ IDHunt™ Core is an easy-to-use SaaS application that enables Intel analysts and investigators to quickly piece together exposed open source data from the 4iQ IDLake™ (a proprietary datalake with 20+ billion identity records from transient, historical and newly surfaced breach corpuses), correlate and enrich findings with Pastebin documents, historical DomainWhoIs data, cryptocurrency addresses, social profiles and standard search engines, reverse IP lookups and other data sources.
4iQ IDHunt™ Core provides context to threat actors, revealing their real identities, cohort and criminal rings. By unmasking cybercriminals attacking your organization, you can take action to know your adversary and prevent future attacks.
4iQ IDHunt™ Enterprise allows you to know your adversary and prevent future attacks.
4iQ iDHunt Enterprise is an investigative platform providing meaningful and actionable intelligence in real-time, enabling analysts to investigate cases, and quickly collaborate and share findings with cross-functional teams.
4iQ iDHunt™ Enterprise leverages unique, historical, and transient breaches/leaks, fuse relevant insights with 3rd party, surface web, dark web, and internal sources, then explore (pivot), enrich, contextualize and visualize data to solve cases fast. With 4iQ iDHunt™ Enterprise, investigators can analyze data quickly, leveraging the platform’s AI and ML capabilities.
4iQ IDTheft™ is a dark web monitoring solution (RESTful APIs) used by some of the largest Identity Theft Protection service providers, security vendors and organizations to alert millions of consumers, citizens and employees of exposed personal information as soon they are detected. Organizations can also scan and monitor identities by domains, brands, and other attributes in order to reset passwords, stop account takeovers, lock-down networks and protect assets.
4iQ IDTheft™ is powered by the 4iQ IDLake™, a proprietary datalake with 20+ billion identity records from transient, historical and newly surfaced breach corpuses. 4iQ subject matter experts and automated crawlers continuously searches for breached and leaked corpuses openly available in the surface, deep and dark web to find, sometimes detected months before
they even become available to the general public. 4iQ has machine learning algorithms that quickly identify real, sensitive data, removes duplicate records, and normalize the information for further analysis.