Luminar was deployed within a few days, with no interference to operations. Following the CNI’s team onboarding and training, the system became operational. Luminar has the capacity to continuously monitor the CNI’s ~2,000 IT and OT assets and to scale with the company. By monitoring and analyzing clear, Deep & Dark Web sites, as well as closed hacking forums, social networks, instant messaging platforms and technical intelligence sources, Luminar uncovers malicious activities at their earliest stages. Luminar began gathering and ingesting relevant data from threat intelligence sources, based on the CNI’s critical assets, industry, region, and predefined threat hunting requirements. The automated monitoring enabled the identification of leaked records and mentions in the Deep and Dark Web in real-time. The monitoring plan is dynamic and the assets can be changed and updated in real-time and still ensure the monitoring is accurate. In addition, reconnaissance activities are performed to reveal exposures of the high-risk personnel and recommend how to minimize the personal attack surface. Luminar is also used to monitor new domain registrations that impersonate the organization in order to provide early warnings and suggest take-down procedures, and to monitor social media networks to alert in real-time when customers mention such potentially fraud-related activity. Since its implementation, Luminar has delivered threat intelligence findings regarding all the issues that drove the organization to deploy a CTI solution to begin with, enabling the organization to proactively mitigate threats in the making. Among the threats identified by Luminar were: PROACTIVE DISCOVERY AND MITIGATION OF THREATS CONTINUOUS COMPREHENSIVE MONITORING AT SCALE About Cognyte Software Ltd. Cognyte is the global leader in investigative analytics software that empowers governments and enterprises with Actionable Intelligence for a Safer World TM . Use of these products or certain features may be subject to applicable legal regulation. The user should familiarize itself with any applicable restrictions before use. These products are intended only for lawful uses by legally authorized users. Not all features may be available in all jurisdictions and not all functionalities may be available in all configurations. Unauthorized use, duplication, or modification of this document in whole or in part without the prior written consent of Cognyte Software Ltd. is strictly prohibited. By providing this document, Cognyte Software Ltd. is not making any representations regarding the correctness or completeness of its contents and reserves the right to alter this document at any time without notice. Features listed in this document are subject to change. Contact your Cognyte representative for current product features and specifications. All marks referenced herein with the ® or TM symbol are registered trademarks or trademarks of Cognyte Software Ltd. or its subsidiaries. All other marks are trademarks of their respective owners. © 2021 Cognyte Software Ltd. All rights reserved worldwide. Suspicious domains and potential phishing attempts Ransomware attacks that have hit suppliers Leaked records Hacktivists attacks against the nation resulted in attacks against the CNI Fraud activities on energy consumption meters Customers defaming the company over social media Exposed and vulnerable servers Employees that suffered a bot attack and had their credentials traded on the Dark Web