THREAT TRACKER
THREAT TRACKER
POCKET THREAT INTELLIGENCE
Frustrated by a clunky old-fashioned way of tracking client threats via spreadsheets and manual processing we decided we must change.
We partnered with Transforming Data to create our own powerful in pocket tool, empowering our people to upload potential threats with speed, anywhere, anytime straight from their mobile devices for automated, real-time cross-referencing and matching.
Our unique algorithms match threats in real-time, issuing alerts and actionable intelligence to our managers, team leaders and operators of our choice.
Now, we are offering this simple and highly effective threat tracking tool to you.
TT - CORE
Core provides users with everything they need to start tracking threats in real-time. Add your threats, vehicles and people to Threat Tracker directly from your smartphone via our web app and receive instant alerts to matches.
-
Enter suspicious events, people, and vehicles quickly and easily from your phone.
-
Keep all your records in one, easily viewable location, our IMAP process automatically lets you know when there’s a match.
-
Our intelligent matching automated process (IMAP) checks every entry, everytime you make an entry, alerting you by sms or email to a match, direct to your device.
-
Easily review entries you have selected and marked with an elevated risk (RED List) or decreased risk (WHITE List) easily from your app.
-
Core provides you with one account which is easily accessed from your mobile device or any web browser, using your uniques login credentials.
-
Online support via ticket.
TT - ADVANCED
For users and businesses who need to effectively monitor and manage large threat actor risks and data sets across multiple sites, locations and teams via their phones and via desktop solutions for control rooms and operation centres.
-
Threats are entered quickly and easily through the Threat Tracker web app or via your desktop application. Entries can be easily edited and viewed.
-
Teams or groups can work in isolation or collaboratively, seeing each others entries and receiving alerts to matches. If you have partners you wish to share data with, team to team or company to company, matches can be issued to you when threat actors match across locations.
-
Import your previous lists of threat actors from your clunky excel spreadsheets or multiple unrecorded items post task quickly and easily to Threat Tracker via your desktop application.
-
Run your images or video of vehicles to Threat Tracker via AI, extracting the details you need to populate your entries automatically and reducing the burden of manual extraction and upload.
-
Produce reports for your organisation or clients to keep them periodically informed of the threats you are tracking on their behalf.
-
Online ticketed support service
TT - ENTERPRISE
Effortless data entry for field teams, with AI insights, deep integrations, and bespoke development. Scalable, Multi-user access provides secure, scalable, and fully customisable intelligence platform.
-
-
-
Item description
-
-
-
Item description
-
Item description
Choose your plan
CORE
£4.99/month
Single User - 12 months
Most popular with close Protection officers and those with personal safety concerns
ADVANCED
coming soon
ENTERPRISE
£POA
IMAP
Our automated intelligent matching process is the core of Threat-Tracker. Not only does it alert to matches, our unique fuzzy matching process provides you with a range of matches and match certainty scores.