Today’s physical security teams require a solution that enables them to manage security threats in a single SaaS-based platform. Teams must have the insight and access to critical data such as social media, encrypted connected security systems, public and company-proprietary records and communications, and be immediately notified of relevant threats. This ultimately empowers physical security professionals to quickly and effectively detect, analyze, and mitigate potentially harmful threats to executives, employees and customers.

Ontic is the first protective intelligence software company to digitally transform how Fortune 500 and emerging enterprises proactively identify, investigate, assess, watch and manage physical security threats to protect employees, customers and assets. Ontic’s SaaS-based platform collects and connects threat indicators to provide a comprehensive view of potential threats while surfacing critical knowledge so companies can assess and action more to maintain business continuity and reduce financial impact.

When combining Ontic’s deep and dark web monitoring with Flashpoint’s Alerting capability, teams can gain the necessary insight and additional context into chatter taking place on illicit online communities and are provided immediate notification in order to protect against the latest, most critical threats.

By bringing these two systems together, teams have more visibility into their threat landscape and can therefore take action.

The Flashpoint & Ontic Advantage

Ontic Protective Intelligence Platform integrated with Flashpoint Alerting provides corporate and physical security teams immediate notification of potential threats and discussions taking place within illicit online communities.

As the threat landscape dramatically evolves, companies are focusing on the convergence of physical and cyber security operations. This integration enables the automatic flow of concerning cyber-related data and malicious discussions to physical security teams, improving visibility, and the efficiency of security personnel to act on critical intelligence in a proactive manner.

Integrated Flashpoint Dataset


Automated: Matches conversations from illicit online communities with a client’s areas of concern, and automatically provides these matches directly to the user. Generated alerts are available in the Flashpoint Intelligence Platform, ensuring timely notifications that identify potential risks to the organization, as well as the ability to investigate further within the platform.

Key Features

  • Access to Flashpoint’s signal-rich discussions from illicit threat-actor communities, adding value and context to existing intelligence feeds in Ontic, including public records, social media, incident reports and more

  • Enhanced investigations and collaboration for advanced understanding with connected intelligence and threat signals

  • Ontic’s rule engine can trigger automated workflows, such as assign messages, notify users, update profile and case information and more, to help ensure proper response

  • The ability to connect Flashpoint data with other key intelligence from client systems such as HR portals, CRM, access control and case management further expanding insight into the threat landscape

Use Case


Flashpoint alerts that contain relevant posts from illicit communities are sent directly to Ontic and are associated with other activities and data points for an active person of interest (POI) or investigation. Alerts that indicate a heightened risk trigger workflows for the security team to take action.

For example, security teams can uncover relevant intelligence from Flashpoint’s collections that contain identifying information about a potential threat or person of interest. This information is automatically sent to Ontic’s platform, enabling security teams to seamlessly launch an internal investigation and apply the identifying information into Ontic’s research suite. Users are able to uncover additional details about the threat, streamlining how teams identify further information and assess the incident.

Did this answer your question?