ONYX – OPEN SOURCE INTELLIGENCE

Fivecast ONYX – OSINT platform for discovery, targeted collection & AI-powered risk analysis
Cover more sources, miss fewer relevant signals – from digital forensics to multilingual risk detection in text, image and video.

What is Fivecast ONYX?

Fivecast ONYX is an OSINT solution that combines the complete process of modern online investments in one platform, we speak of digital footprints:

  1. Discovery (find & verify quickly),

  2. Collection (targeted, continuous and auditable collection),

  3. Risk Detection (AI-supported filtering, classification and pattern recognition).

The result: fewer tool changes, less manual work – and faster usable intelligence.

Who is Fivecast ONYX suitable for?

Typical fields of application:

  • Authorities / Public security: extremism, transnational crime, foreign influence, trafficking, situation reports
  • Financial Crime: AML/KYC/EDD, Fraud Detection, Risk Assessment & Continuous Threat Assessment
  • Corporate security: personnel security, insider threat, protection of assets/IP, investigations

Data coverage: Broad source coverage and great data depth

Fivecast ONYX combines numerous publicly and commercially available data sources, including

  • News & Newsstreams, Search Engines, Open Web
  • Social media & platforms (incl. niches/marketplaces depending on coverage)
  • Personal & company databases
  • Sanctions/watchlists, curated data sets
  • Dark Web & data leaks (important for hard-to-reach research)

Covered data sources / accounts:

  • Accounts/handles (9 billion+),
  • Personal records (8 billion+) & identifiers (28 billion+),
  • Companies (280 million+) & Domains (29 million),
  • News articles/day ( 3.3 million)
  • Data Leaks (10 billion+),
  • Dark web sites (200,000) & entries (200 million),
  • Sanctions (blacklists 1.4 million),
  • Scientific articles (389 million),
  • plus millions of open websites.

Core functions

 

1) Discovery: fast, wide, “pivot-capable”

  • Search across many data domains in one interface
  • Creating digital footprints, verifying information, resolving identities
  • Continuous “pivoting” from hits (recognize networks/relationships faster)
  • Start the search in just a few clicks, results in seconds

2) Collection: Deep Targeted & entity-centric – Hard-to-Reach-Data

  • Automated, continuous and targeted collection (text, image, video)
  • Entity-centric collection: focus on entities & networks (less noise, higher relevance)
  • Configurable, secure and auditable
  • “hard-to-access” sources are made operationally usable – without analysts having to reload everything manually.

3) AI-enabled risk detection: configurable & multilingual

  • Configurable “detectors” for risks and patterns
  • Recognition of keywords/phrases, objects/concepts, logos/quotes, images and text in images, among other things
  • Multilingual analysis (manufacturer’s specification: 100+ languages)
  • Focus: filtering large amounts of multimedia data so that analysts get actionable insights faster

Hard-to-Reach Data: Dark Web Intelligence

When “normal” search engines are not enough, dark web intelligence can become relevant – e.g. for:

  • Topic/group monitoring and situation reports
  • Leak/exposure indicators and insider threat issues
  • Fraud/money laundering contexts and due diligence research
  • Markets/communities that operate outside the open web

Important: Dark web research should always take place within clear compliance and security guidelines.

Security, Compliance & Oversight

For many organizations, it is not just “more data” that is crucial, but also legally compliant and secure processing.

 

  • Built-in obfuscation / identity protection in the collection process
  • Auditability & compliance-oriented control of the data lifecycle
  • Orientation towards security standards (e.g. Essential 8, UK Cyber Essentials, NIST SP 800-171)

Integrations & existing workflows

API / OSINT Data Fusion:

For teams with existing systems (case management, data lakes, SIEM/SOC, analytics), API integration is key: OSINT can be “hooked” into workflows to connect data silos, reduce manual handovers and provide continuous AI risk insights.

Fivecast ONYX – Request more information

The application spectrum of Fivecast ONYX is specifically designed for safety-related topics. We can provide you with more information. However, the prerequisite is a legitimate interest. We reserve the right to review your request and will then contact you.

Contact the Open Source Intelligence specialists!

Consent to data transmission

2 + 4 =