Platform

Simple enough for sales teams. Strong enough for analysts.

CIH hides the collection and analysis complexity behind an MSSP-friendly workflow: add the client, launch the scan, review verified findings, ask Concierge, and deliver the report.

First signalFast enough to create momentum
Operator burdenNo integration required to get started
OutputsFindings, reports, briefs, investigation
The workflow in plain English

Put in a client website. Click go. Wait around 15 minutes. Ask questions. Deliver the report.

That sentence should feel obvious to an MSSP buyer. It says you can start quickly, show value fast, and deliver something professional without turning this into a heavy implementation project.

01

Add the client

Domain first, then optional aliases and keywords. The workflow starts where MSSPs already think.

02

See verified exposures

Findings should begin appearing quickly enough to create confidence and urgency.

03

Ask Concierge what matters

Turn findings into client language, priorities, and report-ready explanation.

04

Generate the report

White-label delivery is built in. Present under your own brand, or name CIH as the intelligence layer behind the service when the credibility adds weight.

Cyber Exposure

Evidence-rich findings for both project work and recurring monitoring.

CIH surfaces client-specific exposures with enough context to support action: leaked credentials, infostealer traces, market visibility, ransomware-related observations, and actor chatter tied to real entities.

  • Assessment mode for one-off projects and sales acceleration
  • Continuous mode for ongoing managed services
  • Verified findings with evidence attached
  • Reports that support executives and technical teams alike
Evidence in
Leaked credentialsInfostealer tracesMarket chatterActor mentions
Explanation layer
"What should we tell the client first?"
Concierge groups the evidence by severity, explains what to act on first, and drafts the client-ready language.
Report-ready output
Client summaryPrioritized actionsWhite-label ready
Concierge

CIH Concierge helps analysts sound sharper, faster.

Concierge exists to explain what was found, help shape reports, answer operator questions, and reduce the time between finding detected and client-ready explanation delivered. More of your team can deliver intelligence services without needing dedicated threat-intelligence training.

Explain the risk

Turn technical findings into language that executives can understand.

Guide remediation

Support MSSP teams that need to move from evidence to action fast.

Refine outputs

Regenerate or reshape reports and summaries without losing the underlying intelligence.

The Watch

Live intelligence feed, daily briefings, and full-screen office mode for client-facing sessions.

The Watch gives MSSPs a real-time dark web observation stream with daily intelligence briefings. Use it for operational awareness, client presentations, and publishing credible intelligence commentary across LinkedIn, X, newsletters, and customer updates.

  • Live feed across 10+ threat categories with real-time filtering and search
  • Daily briefings with structured analysis: situation overview, significant developments, threat actor activity
  • Full-screen office mode with 4 themes — readable from 3-5 meters for SOC wall displays and client sessions
  • Threat actor profiles with credibility scoring and historical activity tracking
  • Result: stronger thought leadership, better client trust, and more reasons for clients to stay with the MSSP
Watch Premium
Customer-specific daily briefings tailored by geography, industry, and custom instructions.

Turn the global feed into a personalized intelligence service per MSSP client. Geography filters, industry filters, and free-text instructions shape what each customer sees.

Investigation

Natural-language search across dark web sources — no rigid filter trees.

Ask for a specific threat actor, breach, person, discussion, marketplace, or campaign and get evidence-grounded results. Faster analyst flow, faster client answers, and less friction in high-pressure investigations.

  • "Show recent ransomware discussions mentioning Black Basta and Finnish logistics companies."
  • "Find breaches in the last 30 days linked to healthcare providers in Germany."
  • "What is the latest chatter about [threat actor] targeting SaaS vendors?"
  • "Show references to [person/alias] across forums, markets, and paste sources."
  • "List discussions where [company/domain] appears with credential-sale context."
How it works
Ask in natural language. Get evidence-grounded results across criminal ecosystems.

Search across forums, markets, paste sites, breaches, and actor-linked context with clear provenance, timestamps, and Concierge explanation.

Access

Three ways to use CIH.

Start in the browser with no setup. Pull intelligence into your own systems via API. Connect via MCP and any AI agent can operate the full platform — findings, Concierge, reports.

Browser

Web UI

Full platform in the browser. Built for sales, delivery, and leadership. No specialist training required to start delivering intelligence services to clients.

No setup · No integration · Start immediately
Programmatic

API

Generate an API key and consume CIH findings, reports, and intelligence signals programmatically inside your own systems and workflows.

REST · JSON · API key auth · Read or read/write
Agents

MCP

One click generates a key. Copy the MCP server prompt. Any modern AI agent — Claude, Codex, Gemini, Grok, or any MCP-capable stack — can operate CIH end-to-end: query findings, run Concierge, generate reports. Tested, no developer lift required.

Tested with Claude, Codex, Gemini, Grok · Any MCP client
Ready to start

Show clients evidence they cannot easily dismiss.

Submit your intent. We verify MSSP status quickly and confirm pricing. No commitment until you approve. Start date is yours to choose.