Attribution + context
in the first hour of an incident.
When you're 30 minutes into a confirmed breach, you need fast answers: who is this attacker, what else have they touched, what's exposed about our org on the dark web, what does the public footprint of the threat actor look like. Tracelight pulls all of that in parallel, citation-anchored, in under 5 minutes — without the SOC pulling out of triage to do OSINT.
What this fixes.
8+ data sources running in parallel.
The report that lands on your desk.
- 1Threat-actor profile with attribution-confidence summary + behavioral signatures
- 2IOC table with cross-source confirmation + first-seen / last-seen dates
- 3Org dark-web exposure footprint (emails + credentials + mentions)
- 4Infrastructure map of related domains + IPs + certs
- 5Citation appendix linking every claim to the originating data source
Common questions.
Does this replace a real threat-intel platform?+
No — Tracelight is OSINT-flavored IR support, not full threat-intel like Recorded Future or Mandiant. We surface publicly available context fast; you still need your EDR + SIEM + dedicated TI for the meat of the response. Tracelight is the OSINT layer that complements them.
Can I integrate this into my SOAR?+
Yes — the public REST API + webhook event subscriptions let you wire Tracelight into Tines, Torq, Splunk SOAR, or homegrown playbooks. Common pattern: SOAR detects suspicious indicator → calls Tracelight enrichment API → posts findings to the IR Slack channel.
How is this priced for SOC teams?+
The Agency plan ($499/mo) covers 500 enrichments/mo + unlimited users + API access — typically the right tier for a mid-size SOC. For burst capacity above the monthly cap, contact us at sales@trytracelight.com.
Try a sample IR enrichment — free for 7 days.
No credit card. Cancel anytime. Same product, same OSINT workers, same audit trail — just scoped to your investigation.
