identiqa Intelligence

When the attack is over,
the investigation begins.

identiqa Intelligence is our investigative product line for law enforcement agencies, government bodies, and qualified security teams. Powered by Black Iris AI, with capabilities spanning forensic analysis, threat intelligence, attribution, and strategic briefings.

Not a public product page — by design. Detailed capabilities, technical specifications, and pricing are shared under NDA only, with verified law enforcement and government contacts. This page introduces what we do. Access is by request.
What identiqa Intelligence is

A separate product line for those who investigate, not just those who defend.

Most of identiqa is built around defense — keeping attacks from reaching customers. ProtectionGrid is that side of our business. Identiqa Intelligence is the other side: what happens when something has already occurred and the question shifts from "how do we stop this?" to "who did it, how, and what comes next?"

Our investigative tools are built for forensic analysts, intelligence officers, incident response teams, and policy advisors — operating under European jurisdiction, with court-admissible evidence handling and chain-of-custody documentation built in from the start.

Six capability areas

What we offer, at a glance.

Brief outlines below. Full technical capabilities, deployment options, and case studies are shared under NDA with verified prospects.

Tool 01

Forensic Analysis

Deep technical analysis of compromised systems, malware artefacts, network traffic, and digital evidence. Output formatted for court admissibility under EU evidence frameworks.

Tool 02

Threat Intelligence

Curated, contextualized threat feeds focused on European critical infrastructure, government targets, and active campaigns. Strategic, operational, and tactical levels available.

Tool 03

Incident Response

Active incident support — on-call assistance during active intrusions, war-room coordination, immediate containment guidance, and structured handover to long-term forensic teams.

Tool 04

Attribution

Technical and behavioural analysis to attribute attacks to specific threat actors, with confidence-scored findings, supporting evidence chains, and correlation across past campaigns.

Tool 05

Dark Web Monitoring

Continuous monitoring of dark-web marketplaces, leak sites, and threat actor channels for mentions of customer assets, credentials, or planned operations. Reporting tailored to investigative requirements.

Tool 06

Strategic Briefings

Periodic intelligence briefings for executive and ministerial audiences — translating technical threat data into strategic decisions, policy recommendations, and resource priorities.

Who this is for

Access is by request, not by purchase.

Identiqa Intelligence isn't a self-service product. We engage selectively, under NDA, with verified institutional contacts. Below: who fits, and who doesn't.

For

Verified institutional users

  • Law enforcement agencies (national, regional, federal)
  • Government bodies and ministries with cybersecurity mandates
  • National CSIRTs and military CERTs
  • Intelligence services and dedicated cyber units
  • Critical infrastructure operators with active incident exposure
  • Qualified security researchers with verifiable institutional affiliation
Not for

Out of scope

  • Private individuals seeking offensive cyber capabilities
  • Anonymous or unverified inquiries
  • Engagements that may target individuals without legal mandate
  • Commercial customers — those are served by ProtectionGrid
  • General SMB cybersecurity needs (defence is a separate product)
  • Marketing or competitive-intelligence research
Get in touch

Request access.

If your organization fits the criteria above, the form opposite is the right starting point. Use a verifiable institutional email address (e.g., a domain associated with your agency or ministry). Anonymous inquiries are not processed.

We typically respond within 3 business days with a brief verification step, followed by an NDA and a substantive technical conversation. There is no public sales funnel for Intelligence — every engagement starts with a real conversation.

Engagement process
  1. Inquiry submitted. Verified institutional email and brief context.
  2. Verification. We confirm institutional affiliation through standard channels.
  3. NDA. Mutual non-disclosure agreement before substantive technical discussion.
  4. Technical session. 60-minute briefing tailored to your specific use case.
  5. Proposal. Engagement scope and terms, written for your procurement process.
Intelligence inquiry

For verified law enforcement, government, and qualified institutional contacts only.

By submitting you accept our privacy notice. Inquiries from unverified or non-institutional senders are not processed.