The Cybersecurity Directory

Back to search results

Constella Intelligence is a leader in global digital risk protection, working in partnership with some of the world’s largest organisations to safeguard what matters most and defeat digital risk. 

Its solutions are broad, collaborative and scalable, powered by a unique combination of proprietary data, technology and human expertise – including the largest breach data collection on the planet, with over 100 billion attributes and 45 billion curated identity records spanning 125 countries and 53 languages. 

Constella is the largest and most reliable source of open source information for investigators, analysts, strategic communicators, financial crime leaders and executives around the world. 

The world’s most sophisticated organisations, including Fortune 500, Government agencies, financial institutions and NGOs trust Constella Intelligence to manage their close protection and threat monitoring needs with proprietary datasets and tools for surface, deep and dark web investigations. 

Main office address

289 S. San Antonio Road
Suite 110
Los Altos
94022 California,
United States

Telephone number

+44 7492 739 359


Key Products / Services / Sectors (USPs)

Always-on risk & threat visibility

Our technology collects and indexes content and billions of records from social media, dark marketplaces, news sites, leaked data sets and breaches to identify exposed information to stay ahead of malign actors. By continuously tracking and collecting information sources from the surface, deep and dark web, Constella empowers companies to stop scams before they happen, mitigating losses and preempting customer and public relations crises.

Superior intelligence for your confidence 

Our solution provides the most sophisticated breach collection and curation process in the industry, protecting 20,000,000 consumers by identifying stolen PII, compromised credentials and harmful content online.

Proprietary data for comprehensive intelligence

We extract powerful intelligence through advanced data use with over 100 billion attributes and 25 billion curated identity records spanning 125 countries and 53 languages, comprising massive networks and 10+ years historical data.

Accelerate decision-making with real-time contextual OSINT data on geopolitical mentions, threats and trends in key geographies or languages of interest—ensuring constant access to superior insights into shifting public opinion, polarisation, and sociopolitical unrest.

Fluid anti-fraud and criminal investigations

With our Hunter solution, we empower analysts to attribute, search, graph, pivot, expand, correlate, collate and share intelligence in one place. Analysts can build automated breach data correlations and comprehensive profiles by recording targeted intelligence in dedicated target areas.

360-degree executive & close protection 

Our comprehensive real-time monitoring and proprietary analytics are designed to keep executives and assets one step ahead of danger, providing advanced anticipation and early warning.


Backup and disaster recovery

Backup solutions

Incident response

Disaster recovery solutions

Disaster Recovery as a Service (DRaaS)

Penetration testing

Vulnerability scanning

Automated test tools

Web app PEN tests

Mobile app/IoT PEN tests

Social engineering PEN tests

Red Teams

Cybersecurity awareness training programs

On-site training programs

Online training

Interactive training videos


Automated phishing simulations

Cybersecurity consultancy

Compliance assistance

Security assessment, policy help, strategic advise

Information risk assessment

Privacy Impact Assessment services

Security architecture

Digital forensics and investigation services

Security and data protection audit

Network security

Data Loss Prevention (DLP)

Distributed denial of service (DDoS) prevention

Email security

Firewalls and web access firewalls (WAF)

Network segmentation

Security information and event management (SIEM)

Other intrusion detection (Machine Learning / AI based)

Endpoint security solutions

Mobile security


IoT security

Endpoint Detection and Response (EDR)

Network infrastructure controls, e.g. Firewalls, switches, security policy enforcement


URL filters

Security email gateway


Print management and security

Threat intelligence monitoring and detection

Consultancy and advice

User and Entity Behavior Analytics (UEBA)

Security information and event management (SIEM)

Network Traffic Analysis Framework

Web Proxy

Cybersecurity Platform

Phishing detection

Fraud detection

Rogue or Fake Mobile App Detection

Surface, “Deep” and “Dark” Web Monitoring

Social media monitoring

Brand Monitoring

Managed security services (MSSP)

Protective monitoring

Incident response

Vulnerability management

Threat management

Telco security

Security help desk and support

Staff training

Identity and access management

Identity provisioning (IDP)

Data verification

Data orchestration services

Identity hub

Authentication (credential) of citizens

Authentication (credential) of employees and other internal persons

Anti-fraud services, e.g. behavioural monitoring

Attribute provisioning and verification

Identity networks

Identity apps

Privacy and consent management

Privileged access management (PAM)


I have been testing the new release of Hunter and was blown away by the new graphing capabilities. It's exactly what we needed in order to paint a visual picture with the massive data lake we have access to.”

CISO, Anti-Human Trafficking Intelligence Initiative

“We use this daily to both identify the users of emails and other entities, to match people to passwords and vice versa, to identify and locate offenders through their social media and other internet footprints. Numerous cyber criminals have been identified, located and arrested through our use of this tool. It’s powerful and with its every expanded functionality and coverage its one I always recommend to fellow researchers and investigators”.

Operations Director, Cyber Defence Alliance.

“It took two agents using Hunter one day to create a usable persona map versus 70 analysts about three months to build a comparable intel package using the same mission.”

InfoSec Officer, Government Agency

“It took us over 14 months to find this bad actor which with Hunter,
took only 5 minutes.”

Fraud Analyst, Top Tier Bank



Anti-Human Trafficking Initiative (ATII)



Cyber Defence Alliance

Anti-Phishing Working Group (APWG)

Main point of contact

Name: Lindsay Whyte


Phone: +44 7492 739 359