The Wapack labs Threat Analysis Center
The Wapack Labs Threat Analysis Center (TAC) terminal is the “Bloomberg Terminal” for Cyber Intelligence Professionals. Here they can access analytic tools, raw collections, assistance, crowdsourcing, training, and much more… Our dashboard has the tools that your analysts want and the intelligence that they need all in one place.
TAC COMMUNICATION TOOLS
Wapack Labs Threat Analysis Center(TAC) dashboard includes access to the service portals and communication tools, needed to get the best cyber intelligence. Communicate directly with cyber proffesionals and team members.
rED SKY ALLIANCE
A private, member’s only information sharing environment for exchanging cyber security information, advice from global security professionals and defensive strategies.
The Red Sky portal is a repository of cyber intelligence, analysis, reports, malware analysis and profiles of cyber attackers, written by Wapack Labs analysts from their own sources. Interested parties must be approved for membership.
An on-line meeting application with easy to use collaboration and screen sharing features. Meetings can be started immediately, as there are no viewer downloads required.
An application that allows team members to quickly and easily collaborate via group chats, video chats and screen sharing without security concerns.
oN-LINE hELP dESK
During extended working hours, Monday through Friday, a manned help desk is available for users who may need some assistance navigating the TAC services and features.
Report incident to the government. Maecenas non leo laoreet, condimentum lorem nec, vulputate massa. Donec eget risus diam.
TAC DASHBOARD TOOLS
These tools will enable analysts, not just feed them with overwhelming data. The Threat Analysis Center (TAC) dashboard has the tools needed to get the work done efficiently. Don’t have time or budget to build a cyber threat intelligence team, use TAC for less than the cost of adding one FTE.
An application that will allow users to reliably and securely take data from any source, in any format and search, analyze and visualize it in real time.
Is an application that searches and amalgamates open source content to offer the user quick and inexpensive content.
Is an open source malware repository that leverages open source software to create a unified tool for analysts engaged in cyber threat defense.
Is a proprietary software used for open-source intelligence and forensics. It focuses on providing a library of transforms for discovery of data from open sources and visualizes that information in a graph format suitable for link analysis and data mining.
Is a malware analysis system that provides detailed results describing what a file was intended to do inside an isolated environment.
Is a service that offers cyber threat assessment tools, cyber security procedures, expert analysis and risk intelligence.