A decade ago, Recorded Future was founded with the ambition to organize everything published on the internet and make it available for analysis — in real time. Our ability to model all relevant security information available on the internet is what has set us apart since the beginning.

The Security Intelligence Graph represents the methodology and patented technology we use to fulfill our mission. This white paper describes the different components of the Security Intelligence Graph, including:

  • How the Security Intelligence Graph guides analytic processes for both human analysts and algorithms
  • Why the intersections of ontologies and events are critical when mapping complex relationships
  • How Recorded Future clients can access the Security Intelligence Graph through different APIs
Tell Your Network

You can unsubscribe from our communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy.