Hacker Newsnew | past | comments | ask | show | jobs | submit | Bisen's commentslogin

Our whole aim is to make you happy by downranking those false positives while remaining explainable. We blogged about the explainability part in case you're interested: https://www.overwatchdata.ai/blog/the-imperative-of-explaina...


I'd love to take you up on that offer. Hn doesn't reveal emails but we have one listed here that directs straight to me, in case you're able to drop us a line: https://www.overwatchdata.ai/request-a-demo Looking forward to learning from your experience!


Great, I'll write you an email later tonight


Great points - can say this is all 'coming soon'! One note, because this profile isn't personalized to a particular user's products, tech stack, and 3rd party/ supply chain, it's especially chaotic. For a more tailored profile, the social, news, and dark web posts all cluster around a specific events since there are far fewer critical events of interest to a specific user. No excuses, just sharing for background. Interesting point on the hedge fund use case, haven't been able to find a good user/ persona to interview about that and would love any suggestions if you have any. Thanks again for checking us out.


Thanks for the advice. Maybe a loom video would have been better with a walk through of a single use case. Taking it on notice for next time!


EDR's are a great way to help secure endpoints but high fidelity threat intel which is tailored to your environment and org's needs can help increase awareness and shine light on potential security blindspots. This is especially critical when the threats are ever evolving and time to exploit is decreasing year over year. Qualys in a 2023 report stated that "25 percent of these security vulnerabilities were immediately targeted for exploitation, with the exploit being published on the same day as the vulnerability itself was publicly disclosed. They offer some outside the perimeter threats but by reputation, it’s a weakness and narrowly targeted to your organizations credentials and vulns, and orgs usually still need a threat intel provider. For example, one of our users who already uses an EDR, may not know about a 3rd party that’s been ransomed by a threat actor e.g. APT 73. An alert from Overwatch saying a 3rd party has been compromised will also include information about recent IOCs e.g. hashes and file extensions attributed to that threat actor so that the user can add them to virus total and scan internally to make sure they haven’t been compromised. This is an example of how EDRs and threat intel can work in concert.


Thanks for clarifying - honestly, we're a tiny startup so not really here to play PR games, just didn't fully understand the question. Users can 100% review all the results even if they aren't ranked as 'high priority'. You can even free form search our repositories with boolean strings like you would any other OSINT tool, but with the added benefit of an AI agent to help triage, if you so wish.


RF contracts are heavily services based and cost up to 7 figures for tailored intel across a number - we delivers a similarly personalized experience but for a fraction of the price. AI agents can also do a range of additional and customizable tasks e.g. bringing together relevant context about a threat actor, tracking fraud methods, compromised checks and cards, narrative analysis, geopolitical disruptions etc. They can also be automated to create new escalations and actions through integrations. It's like having RF data as well as digital analysts to do a lot of the leg work for you.


thanks, that's super helpful! godspeed!


Our current users are CISO's security ops team, threat intel team, blue team, fraud strategy or fraud intel team. Hope that helps!


We totally hear you and that’s why we don’t really charge by keyword but instead look at how many agents we need to deploy/ use cases we build towards. A 1000+ assets is the norm for our users. Would you be interested in connecting on a call to better understand the use cases and tell you more about how it works?


Not really because we just build all out stuffs out in house.

I would like an answer on the Telegram questions tho :)


That's definitely the vibe of the example we're presenting. But for specific customers, the agent can cluster and bring additional relevant context to each of the 'events', and even recommend actions / automate certain actions e.g. if you detect a compromised account, send it team X.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: