Constella Intelligence is a leader in global digital risk protection, working in partnership with some of the world’s largest organisations to safeguard what matters most and defeat digital risk.
Its solutions are broad, collaborative and scalable, powered by a unique combination of proprietary data, technology and human expertise – including the largest breach data collection on the planet, with over 100 billion attributes and 45 billion curated identity records spanning 125 countries and 53 languages.
Constella is the largest and most reliable source of open source information for investigators, analysts, strategic communicators, financial crime leaders and executives around the world.
The world’s most sophisticated organisations, including Fortune 500, Government agencies, financial institutions and NGOs trust Constella Intelligence to manage their close protection and threat monitoring needs with proprietary datasets and tools for surface, deep and dark web investigations.
Main office address
289 S. San Antonio Road
+44 7492 739 359
Key Products / Services / Sectors (USPs)
Always-on risk & threat visibility
Our technology collects and indexes content and billions of records from social media, dark marketplaces, news sites, leaked data sets and breaches to identify exposed information to stay ahead of malign actors. By continuously tracking and collecting information sources from the surface, deep and dark web, Constella empowers companies to stop scams before they happen, mitigating losses and preempting customer and public relations crises.
Superior intelligence for your confidence
Our solution provides the most sophisticated breach collection and curation process in the industry, protecting 20,000,000 consumers by identifying stolen PII, compromised credentials and harmful content online.
Proprietary data for comprehensive intelligence
We extract powerful intelligence through advanced data use with over 100 billion attributes and 25 billion curated identity records spanning 125 countries and 53 languages, comprising massive networks and 10+ years historical data.
Accelerate decision-making with real-time contextual OSINT data on geopolitical mentions, threats and trends in key geographies or languages of interest—ensuring constant access to superior insights into shifting public opinion, polarisation, and sociopolitical unrest.
Fluid anti-fraud and criminal investigations
With our Hunter solution, we empower analysts to attribute, search, graph, pivot, expand, correlate, collate and share intelligence in one place. Analysts can build automated breach data correlations and comprehensive profiles by recording targeted intelligence in dedicated target areas.
360-degree executive & close protection
Our comprehensive real-time monitoring and proprietary analytics are designed to keep executives and assets one step ahead of danger, providing advanced anticipation and early warning.
Backup and disaster recovery
Disaster recovery solutions
Disaster Recovery as a Service (DRaaS)
Automated test tools
Web app PEN tests
Mobile app/IoT PEN tests
Social engineering PEN tests
Cybersecurity awareness training programs
On-site training programs
Interactive training videos
Automated phishing simulations
Security assessment, policy help, strategic advise
Information risk assessment
Privacy Impact Assessment services
Digital forensics and investigation services
Security and data protection audit
Data Loss Prevention (DLP)
Distributed denial of service (DDoS) prevention
Firewalls and web access firewalls (WAF)
Security information and event management (SIEM)
Other intrusion detection (Machine Learning / AI based)
Endpoint security solutions
Endpoint Detection and Response (EDR)
Network infrastructure controls, e.g. Firewalls, switches, security policy enforcement
Security email gateway
Print management and security
Threat intelligence monitoring and detection
Consultancy and advice
User and Entity Behavior Analytics (UEBA)
Security information and event management (SIEM)
Network Traffic Analysis Framework
Rogue or Fake Mobile App Detection
Surface, “Deep” and “Dark” Web Monitoring
Social media monitoring
Managed security services (MSSP)
Security help desk and support
Identity and access management
Identity provisioning (IDP)
Data orchestration services
Authentication (credential) of citizens
Authentication (credential) of employees and other internal persons
Anti-fraud services, e.g. behavioural monitoring
Attribute provisioning and verification
Privacy and consent management
Privileged access management (PAM)
I have been testing the new release of Hunter and was blown away by the new graphing capabilities. It's exactly what we needed in order to paint a visual picture with the massive data lake we have access to.”
CISO, Anti-Human Trafficking Intelligence Initiative
“We use this daily to both identify the users of emails and other entities, to match people to passwords and vice versa, to identify and locate offenders through their social media and other internet footprints. Numerous cyber criminals have been identified, located and arrested through our use of this tool. It’s powerful and with its every expanded functionality and coverage its one I always recommend to fellow researchers and investigators”.
Operations Director, Cyber Defence Alliance.
“It took two agents using Hunter one day to create a usable persona map versus 70 analysts about three months to build a comparable intel package using the same mission.”
InfoSec Officer, Government Agency
“It took us over 14 months to find this bad actor which with Hunter,
took only 5 minutes.”
Fraud Analyst, Top Tier Bank
Anti-Human Trafficking Initiative (ATII)
Cyber Defence Alliance
Anti-Phishing Working Group (APWG)
Main point of contact
Name: Lindsay Whyte
Phone: +44 7492 739 359