Intelligence Services.
Threat Monitoring
At Overt, threat monitoring is performed as persistent monitoring for entities (companies or people) or scheduling-based monitoring for locations (future events). Monitoring is proactive, by nature. For example, our analysts can tailor output for protective service details to inform them of personnel threats and location assessments.
The purpose of threat monitoring is to identify security threats (detection), categorizing and prioritizing threats, identifying the source or identity of the threat (attribution) whenever possible, and alerting/reporting to the customer.
Threat Intelligence
Different from threat monitoring, threat intelligence services are reactive in nature. Threat intelligence can be provided in cases of employees being hired, such as pre-candidate screening or background checks. For cases where employees have been terminated and leave on bad terms, due diligence reports can scan for potential threats.
Note that, in some cases, consent must be provided in writing by the person whose background is being checked. This is especially true when hiring decisions are being made. Overt may request that signed consent forms are provided when performing employment background checks.
On this page:
SECURITY
SETS YOU FREE.