What is Fivecast ONYX?
Fivecast ONYX is an OSINT solution that combines the complete process of modern online investments in one platform, we speak of digital footprints:
-
Discovery (find & verify quickly),
-
Collection (targeted, continuous and auditable collection),
-
Risk Detection (AI-supported filtering, classification and pattern recognition).
The result: fewer tool changes, less manual work – and faster usable intelligence.
Who is Fivecast ONYX suitable for?
Typical fields of application:
- Authorities / Public security: extremism, transnational crime, foreign influence, trafficking, situation reports
- Financial Crime: AML/KYC/EDD, Fraud Detection, Risk Assessment & Continuous Threat Assessment
- Corporate security: personnel security, insider threat, protection of assets/IP, investigations
Data coverage: Broad source coverage and great data depth
Fivecast ONYX combines numerous publicly and commercially available data sources, including
- News & Newsstreams, Search Engines, Open Web
- Social media & platforms (incl. niches/marketplaces depending on coverage)
- Personal & company databases
- Sanctions/watchlists, curated data sets
- Dark Web & data leaks (important for hard-to-reach research)
Covered data sources / accounts:
- Accounts/handles (9 billion+),
- Personal records (8 billion+) & identifiers (28 billion+),
- Companies (280 million+) & Domains (29 million),
- News articles/day ( 3.3 million)
- Data Leaks (10 billion+),
- Dark web sites (200,000) & entries (200 million),
- Sanctions (blacklists 1.4 million),
- Scientific articles (389 million),
- plus millions of open websites.
Core functions
1) Discovery: fast, wide, “pivot-capable”
- Search across many data domains in one interface
- Creating digital footprints, verifying information, resolving identities
- Continuous “pivoting” from hits (recognize networks/relationships faster)
- Start the search in just a few clicks, results in seconds
2) Collection: Deep Targeted & entity-centric – Hard-to-Reach-Data
- Automated, continuous and targeted collection (text, image, video)
- Entity-centric collection: focus on entities & networks (less noise, higher relevance)
- Configurable, secure and auditable
- “hard-to-access” sources are made operationally usable – without analysts having to reload everything manually.
3) AI-enabled risk detection: configurable & multilingual
- Configurable “detectors” for risks and patterns
- Recognition of keywords/phrases, objects/concepts, logos/quotes, images and text in images, among other things
- Multilingual analysis (manufacturer’s specification: 100+ languages)
- Focus: filtering large amounts of multimedia data so that analysts get actionable insights faster
Hard-to-Reach Data: Dark Web Intelligence
When “normal” search engines are not enough, dark web intelligence can become relevant – e.g. for:
- Topic/group monitoring and situation reports
- Leak/exposure indicators and insider threat issues
- Fraud/money laundering contexts and due diligence research
- Markets/communities that operate outside the open web
Important: Dark web research should always take place within clear compliance and security guidelines.
Security, Compliance & Oversight
For many organizations, it is not just “more data” that is crucial, but also legally compliant and secure processing.
- Built-in obfuscation / identity protection in the collection process
- Auditability & compliance-oriented control of the data lifecycle
- Orientation towards security standards (e.g. Essential 8, UK Cyber Essentials, NIST SP 800-171)
Integrations & existing workflows
API / OSINT Data Fusion:
For teams with existing systems (case management, data lakes, SIEM/SOC, analytics), API integration is key: OSINT can be “hooked” into workflows to connect data silos, reduce manual handovers and provide continuous AI risk insights.
Fivecast ONYX – Request more information
The application spectrum of Fivecast ONYX is specifically designed for safety-related topics. We can provide you with more information. However, the prerequisite is a legitimate interest. We reserve the right to review your request and will then contact you.
