The Open Source cyber threat knowledge management platform
The Open Source adversary simulation and crisis exercises platform
The Open Source cyber crisis management platform
Track malware and threat actors which target your organization with context-aware data
Empower your Security Operation Center with intelligence-driven approaches, both technical and operational
Handle all your security cases and collaborate on on-going incidents with built-in threat intelligence
Your Filigran product fully managed in our cloud environment
Support packages for on-premise deployments with SLA and workshops
Learn how to use Filigran solutions with e-learning and instructor-led training
Connect with fellow community members
Access all GitHub repositories, open feature requests and report bugs
Join community members in physical or virtual events to learn and share
Managed service providers and business partners
Integration partners for data sources, operationalization and interconnections
Deploy Filigran solutions using cloud provider market places
All information about our company and teams
Join a dynamic team solving the most advanced cybertech challenges
Discover our latest corporate and product updates
Upcoming ad-hoc or external events
Sessions with customers about use cases
Read the latest articles published by our team
Monthly sectorial threat landscape dashboards
Documentation spaces of the Filigran products
Watch tutorials and use cases on our channel
All the features and premium services you need to customize and scale your deployment with confidence.
Hosted on your own servers.
We host the platform for you.
Open source under Apache 2 license
Knowledge management
Investigations and dashboards
Triggers, digests and webhooks
Connectors, feeds and enrichment
Roles based access control
Community support
Everything in community plus…
Audit logs and user behavior analytics
Playbooks and automation
Full text indexing of documents
Natural Language Processing
Advanced correlation and machine learning
Premium support
Exercises and campaigns management
Audiences, documents and challenges
Simulated media pressure
Injectors and scanners
Players space with virtual world
Virtual cyber range infrastructure
Standard operating procedures automation
Multi-exercises dependencies and correlation