Navigator provides a comprehensive and curated overview of active physical threats, information leaks, security exposures, and risks to your assets, operations, and people.

Navigator ensures early risk detection, giving you a distinct advantage. Early detection allows security teams to stay ahead of issues that can disrupt your business, damage property, or put your people at risk. The real-time detection and validation process identifies risks based on the current online environment and takes quick action to reduce them. Navigator does this through methods such as automation and filtering posts through keywords.

Navigator dashboard

Platform Overview

Our unified intelligence platform automates collection and filtering, and provides a suite of investigative tools to explore and validate threats. Uncover critical information that impacts the security of your assets and operations.

Save valuable time and resources by leveraging the power of Navigator. 

A laptop displaying Navigator's Dashboard feature
Illustration of data collection and threat monitoring

Collect & Aggregate Threat Actors

We pinpoint vulnerabilities and potential threat actors 24/7 through automated collection. These risks are virtually impossible to identify without the help of dedicated automated collection technology. Navigator does this hard work by collecting data from all public online sources, including:

  • Social Media
  • Blogs, Boards, Forums
  • Alternative Social Channels
  • Classifieds, Paste sites 
  • Deep Web sites
  • Dark Web sources

Once Navigator detects a threat, it alerts your team and provides multiple tools for validation, identity resolution, and dissemination.    

A laptop with multiple sources in the palm of a hand
Aggregate Your intelligence sources with

Automated Collection

Navigator monitors the internet 24/7 with custom search criteria to detect high-risk threats to your people, assets, and operations from diversified sources.
  • Social Media
  • Blogs, Boards, Forums
  • Alternative Social Channels
  • Classifieds, Paste Sites 
  • Deep Web sites
  • Dark Web sources

Understand the breadth of your organization’s threat landscape

Threats to business continuity are a constant concern for every organization, and larger organizations tend to have more live threats to address. 

Our deep intel-driven platform provides a broad, legible view of your organization’s threat landscape using several tools:

  • Custom Keyword Tracking
  • Boolean Search Terms
  • Curated Threat Feeds
  • Geo-location
  • Inferred Location
  • Analyst Annotated Events
Illustration of the globe with drop pin markers on each continent
Customize your visualization with

Filtered Intelligence

Finding the needle in the haystack is a growing challenge for security operations teams. Navigator provides advanced filtering tools to capture the breadth of the online threat landscape.
  • Custom Keyword Tracking
  • Boolean Search Terms
  • Curated Threat Feeds
  • Geo-location
  • Inferred Location
  • Analyst Annotated Events
Abstract illustration with filter lines overlayed on a cityscape.
An illustration of a laptop with various datapoints displayed on the screen.

Intelligence at Your Fingertips

Powered by data, analyze and immediately validate your intelligence with our suite of investigative tools, including:

  • Identity Resolution
  • Targeted Monitoring 
  • Threat Intel Management
  • Dashboards/Visualization
  • Sentiment Analysis
  • Threat Connectivity
An illustration of a laptop with various datapoints displayed on the screen.
ANALYZE & VALIDATE YOUR INTELLIGENCE WITH

Investigative Tools

Uncover, explore, and use a variety of sources to validate intelligence related to threat actors, events, and special interest projects or security issues.
  • Identity Resolution
  • Targeted Monitoring 
  • Threat Intel Management

  • Dashboards/Visualization
  • Sentiment Analysis
  • Threat Connectivity

Stay Notified Around the Clock

You will never have to worry about missing any threat with our array of real-time alerts and notifications through SMS, email, mobile app, and Slack. We will ensure that your team is kept up to speed on all risks as they arise and develop.

Illustration of a mobile device with alert notifications displayed on the screen
Notify your team with

Alerts & Reporting

Send or receive alerts or summary reports in relation to events, assets, or operations. Navigator sends push notifications of intelligence that meets custom notification criteria.

  • Real-time Alerting
  • SMS, Email, Mobile App Alerts
  • Slack Alerts
  • Reports/Alert Summaries
  • API Integrations
An illustration of a mobile device with alert notifications displayed on the screen

Feature Highlights

Screenshot of Navigator's Global Awareness Feature

Global Awareness

Display company assets on the map and alert your team of potential threats within a custom radius, including extreme weather, disruptive events, public safety, etc.

Screenshot of Navigator's Query feature

Live Monitoring

Gather and filter data from millions of online sources with custom parameters, reducing the noise to return only the most relevant posts and intelligence.

Screenshot of Navigator's Dossiers feature

Threat Management

Simplify your investigations by consolidating intelligence discovery, validation, and ongoing management of threat actors, specific events, or business entities.

Feature Highlights

A screenshot of Navigator's Global Awareness feature

Global Awareness

Display company assets on the map and alert your team of potential threats within a custom radius, including extreme weather, disruptive events, public safety, etc.

A screenshot of Navigator's Live Monitoring capabilities

Live Monitoring

Gather and filter data from millions of online sources with custom parameters, reducing the noise to return only the most relevant posts and intelligence.

Navigator's Dossiers feature

Threat Management

Simplify your investigations by consolidating intelligence discovery, validation, and ongoing management of threat actors, specific events, or business entities.

Use Cases

Protective Intelligence

Executive Protection

As a corporate security analyst, you are responsible for identifying and mitigating threats to your company's executives. With the rise of online threats and social media's ubiquity, it is more important than ever to have access to intelligence about potential risks. If you are prepared, you can respond and react immediately.  

Here's how LifeRaft can help with Executive Protection Services: 

  • Targeted monitoring of events, entities, and bad actors
  • Physical & digital threat detection related to an executive, their families, or associates
  • Understand and analyze social engineering exposure
  • Perform travel/location research & analysis
  • Uncover PII and doxxing on the deep web & darknet
  • Perform due diligence for assets, operations, & business entities
  • Be alerted promptly of potential risks, allowing you to respond quickly and effectively.
  • Receive data from the broadest spectrum of sources with a high degree of coverage
  • Combining threat identification with ongoing validation to ensure the effectiveness of security measures in place. 

Workforce Protection (travel safety)

As a corporate security professional responsible for workforce protection, ensuring the safety of your employees while traveling is a top priority. With an increasing number of travel-related incidents and emergencies around the world, it is more important than ever to have access to timely intelligence and threat management tools.  

Here’s how LifeRaft can help with Workforce Protection:

  • Monitor for physical, cyber, environmental, or situational threats or events that impact business continuity
  • Leverage analyst-annotated notices on events around the globe for risk assessments and reporting
  • Contextualize both proximity and high-risk events within a custom radius to your fixed assets
  • Uncover information for identity resolution or to garner further intel on known threat actors
  • Customize notifications for first-alert or a specified cadence of summary reports
  • Display location-based data on customizable dashboards for ease of analysis and ongoing monitoring 
Location & Event-based Threat Monitoring

Geo-political Risk Management

As a corporate security analyst, your organization faces a range of potential geopolitical risks that can impact your operations, employees, and assets. From political unrest to economic instability and natural disasters, there are many factors to consider when monitoring for and managing these threats.  

Here’s how LifeRaft can help with Geo-political Risk:

  • Monitor for physical, cyber, environmental, or situational threats or events that impact business continuity
  • Leverage analyst-annotated notices on events around the globe for risk assessments and reporting
  • Collect data from local online sources that provides ground truth for emerging or ongoing situations
  • Harness curated regional feeds to identify trends and events that will inform decision making  

Physical Asset Protection

As a security professional responsible for physical asset protection, ensuring the safety of your organization's assets is a top priority. With a wide range of potential threats, you need the latest information to successfully monitor threats to your physical infrastructure, offices and critical locations.  

Here’s how LifeRaft can help with Physical Asset Protection:

  • Identify threats of violence or safety-related concerns
  • Monitor for severe weather or issues from ongoing global events that could impact the security of your assets
  • Be notified of location-based activity that may disrupt your operations based on risk-level or proximity
  • Investigate and track niche sources for security intelligence
  • Display dynamic mapping and data visualization for ease of analysis 

Event Security

As a corporate security professional responsible for event security, you understand the importance of staying ahead of potential threats and ensuring the safety of attendees, staff, and assets. With an increasing number of potential threats, including extremism, weather events and violence, it is more important than ever to have access to timely intelligence and threat management tools.  

Here’s how LifeRaft can help with event security:

  • Investigate known threat actors or uncover key intelligence to conduct identity resolution
  • Monitor activity of interest, relating to topics, locations, or online authors of interest
  • Set up custom search queries for intelligence relating to intrusions, acts of violence, counterfeit, or other disruptive activity
  • Analyze custom dashboards with curated threat feeds, dynamic mapping, and high-risk posts for monitoring
  • Conduct investigations on networks of interest, connectivity, and relationships to executives or business interests 

 

Event Detection

As a corporate security professional responsible for detecting disruptive events, you need to be able to detect potential events that pose a threat to your business operations before they escalate. This is important so you can ensure you take proactive measures to mitigate risk.  

Here’s how LifeRaft can help with Event Detection:

  • Analyzing social media to identify emerging posts that could signal a disruptive event
  • Analyze location-based and inferred data, providing insights into potential threats in specific areas
  • Harness curated localized social media feeds to identify events that emergency services and news sources are reporting
  • Display dynamic mapping and data visualization for ease of analysis
  • Automating alerts to inform security teams and stakeholders of emerging events
  • Providing context and ongoing validation following the initial event detection  
Digital Risk Protection

Brand Protection

As a corporate security analyst, monitoring threats towards your brand is critical to maintaining the reputation and trust of your customers. In today's fast-paced digital landscape, threats to your brand can emerge at any time, from anywhere in the world.  

Here is how LifeRaft can help with Brand Protection Solutions:

  • Filter and analyze data to understand trends, influencers, and conduct market research
  • Monitor customer/stakeholder sentiment
  • Analyze how current Issues impact your operations
  • Investigate controversial conversations surrounding your brand
  • Aggregate and consolidate data for crisis management 

Anti Piracy

As a professional in charge of protecting digital content, digital piracy is a major concern. Digital piracy can result in lost revenue, damage to brand reputation, and even legal consequences. In order to protect your company from digital piracy, you need a comprehensive anti piracy solution that can help you detect and monitor potential threats, enabling users to respond with the utmost urgency.  

Here is how LifeRaft can help with Anti Piracy Protection:

  • Identify unauthorized use of IP on the internet
  • Uncover niche “how-to” guides for bad actors
  • Monitor unique sources for leaked content
  • Detect counterfeit materials on marketplaces/forums
  • Discover/track streaming sites
  • Conduct investigations and perform identity resolution 

 

Content Protection

As a professional in charge of content protection, your intellectual property is critical to your business success. Unauthorized access to your content can result in lost revenue, damage to your brand reputation, and even legal consequences.  

Here’s how LifeRaft can help with Content Protection:

  • Identify unauthorized use of IP on the internet
  • Uncover niche “how-to” guides for bad actors
  • Monitor unique sources for leaked content 
  • Detect counterfeit materials on marketplaces/forums
  • Discover/track streaming sites
  • Conduct investigations and perform identity resolution 
Threat Actor Investigations

As a corporate security analyst, finding and understanding the individuals and groups that pose a threat is critical to protecting your organization. Threat actors are constantly evolving their tactics and strategies, making it difficult for companies to have the context they need to reduce potential risks.  

Here’s how LifeRaft can help with Threat Actor Investigations:

  • Uncover the online footprint of a threat actor 
  • Associating an online persona with a real-world individual
  • Assess the digital history of a threat actor across multiple online sources from surface web to dark web
  • Provide automated alerting to understand changes in threat posture  
LEARN MORE

Book a Discovery Call

Our team of experts are here to set you up with your customized security solution.

Get Started

Use Cases

While the use cases for Navigator are endless, the examples below are the most common among our clients.

Anti-Piracy/Content Protection

As the world continues to expand and evolve online, new piracy methods are challenging intellectual property divisions everywhere:

  • Identify unauthorized use of IP on the internet
  • Uncover niche “how-to” guides for bad actors
  • Monitor unique sources for leaked content
  • Detect counterfeit materials on marketplaces/forums
  • Discover/track streaming sites
  • Conduct investigations and perform identity resolution
Asset Protection

Monitor for threats to your executives, employees, infrastructure, and offices.

  • Identify threats of violence or safety-related concerns
  • Monitor for severe weather or issues from ongoing global events that could impact the security of your assets
  • Be notified of location-based activity that may disrupt your operations based on risk-level or proximity
  • Investigate and track niche sources for security intelligence
  • Display dynamic mapping and data visualization for ease of analysis
Brand Protection / Public Relations

Be prepared in the event of a crisis or issues that may challenge brand protection:

  • Filter and analyze data to understand trends, influencers, and conduct market research
  • Monitor customer/stakeholder sentiment
  • Analyze how current Issues impact your operations
  • Investigate controversial conversations surrounding your brand
  • Aggregate and consolidate data for crisis management
Business Continuity

Understand how information on the internet can inform your decisions and provide intelligence for critical operations.

  • Identify disruptions to supply chain, infrastructure, and other key assets or operations
  • Monitor and investigate emerging events impacting your industry/company
  • Investigate connectivity within networks related to your business
  • Discover threat actors that impact your business
  • Identify pertinent online authors and intelligence related to identity resolution
  • Consolidate and manage intelligence from within a single collection & investigation platform
Crisis Response

Follow emerging situations and global or local activity to better inform crisis response plans and reduce reaction time for key operations.

  • Display curated threat feeds specific to a location and/or scope of work
  • Use dynamic global and local mapping tools for severe weather, health & public safety, disruptive events (planned or emerging)
  • Be notified of activity within a predetermined radius of static assets in real-time or a specified alert cadence
  • Apply advanced filtering by keywords, risk level, source channel, etc. to reduce noise and return actionable intelligence
  • Leverage online crowd-sourced intelligence along with analyst-verified event activity
  • Understand impact from past events to develop future preparedness plans
Cyber & Intellectual Property

Monitor difficult-to-navigate deep web and darknet sources with custom search criteria to uncover a wealth of information that is traditionally inaccessible.

  • Monitor for leaked data, such as doxxing and sensitive personal or business information
  • Identify vulnerabilities and exposure to threat actors
  • Monitor for cyber threats to your systems or employees, including planned DDOS attacks, phishing scams, etc.
  • Analyze trends within cyber security and which industries are experiencing targeted attacks
  • Investigate brand and employee social exposure
  • Investigate leads and online aliases with curated sources and access to our darknet search engine
Executive Protection

There is a wealth of intelligence from online sources that can help security teams manage threats and exposure to their executives:

  • Targeted monitoring of events, entities, and bad actors
  • Physical & digital threat detection related to an executive or their families, associates
  • Understand and analyze social engineering exposure
  • Perform travel/location research & analysis
  • Uncover PII and doxxing on the deep web & darknet
  • Perform due diligence for assets, operations, & business entities
Event Security

Use OSINT and investigative tools to protect your physical and digital perimeters for sports & entertainment, conferences & tradeshows, major business events, disruptive events, or evolving global circumstances

  • Investigate known threat actors or uncover key intelligence to conduct identity resolution
  • Monitor activity of interest, relating to topics, locations, or online authors of interest
  • Set up custom search queries for intelligence relating to intrusions, acts of violence, counterfeit, or other disruptive activity
  • Analyze custom dashboards with curated threat feeds, dynamic mapping, and high-risk posts for monitoring
  • Conduct investigations on networks of interest, connectivity, and relationships to executives or business interests
Fraud

The online threat landscape continues to expand with new sources and sites emerging daily, increasing space for bad actors to perpetuate their scams and advance their fraudulent activity.

  • Investigate known threat actors or conduct identity resolution
  • Monitor for imposter accounts, misrepresentation, scams, how-to guides, etc.
  • Identify false advertising campaigns and analyze the impact or security exposure
  • Search for and track the promotion/sale of counterfeit materials or services
  • Follow authors of interest and learn more about connectivity within networks or in relation to those with sensitive information
  • Retain data, consolidating information into a central platform for further investigation or case management
Location Monitoring

Whether a fixed asset or garnering intelligence for travel, business expansion, or operational impact, monitoring locations of interest is critical to security operations.

  • Monitor for physical, cyber, environmental, or situational threats or events that impact business continuity
  • Leverage analyst-annotated notices on events around the globe for risk assessments and reporting
  • Contextualize both proximity and high-risk events within a custom radius to your fixed assets
  • Uncover information for identity resolution or to garner further intel on known threat actors
  • Customize notifications for first-alert or a specified cadence of summary reports
  • Display location-based data on customizable dashboards for ease of analysis and ongoing monitoring

Industries Using Navigator

A broadcasting tower icon


Broadcasting &
Telecommunications

A laptop icon


Commercial &
Information Technology

An icon of two people talking with speech balloons


Consulting &
Professional Services

Cryptocurrency icon


Cryptocurrency &
P2P

Energy icon


Energy &
Mining

A money bag icon


Finance &
Insurance

A video game controller icon


Gaming &
Film/TV Studios

A medical icon


Health &
Pharmaceutical

A ring-for-service bell icon


Hospitality

A gear icon


Manufacturing &
Consumer Goods

A book icon


Publishing

A house icon


Retail & Property
Management

A security badge icon


Security
Providers

A star icon


Sports &
Entertainment

An airplane icon


Transportation
& Logistics

A lightbulb icon


Utilities

Request a Demo of Navigator

Let us show you the power of our platform and how to customize intelligence collection to identify and investigate threats or security risks.