Filigran | Company Profile - Revenue, Headcount, Tech Stack, Contacts
Contact Information
Industry & Market
Company Metrics
Funding Information
Headcount Distribution
By Department
Department Breakdown
Technology Stack
Analytics & Tracking
Social & Marketing
Video & Media
Email & Communication
Keywords & Focus Areas
Filigran
Overview
Filigran is a European cybersecurity firm founded in 2022 with headquarters in Paris, France, and New York, United States. Specializing in open-source threat intelligence and cyber risk management solutions, Filigran aims to democratize access to threat intelligence, enabling organizations to bolster their defense against cyber attacks.
The company provides a suite of products within its eXtended Threat Management (XTM) portfolio, such as OpenCTI for aggregating and operationalizing threat intelligence data, and OpenAEV for attack simulation and validation. Filigran supports its global client baseβwhich includes major organizations like Marriott, Airbus, and the FBIβby offering enterprise technical support, cloud hosting, and open-source development services. Led by co-founders Samuel Hassine and Julien Richard, Filigran is backed by Eurazeo and other notable investors and has surpassed 6,000 worldwide deployments.
Basic Information
| Industry | computer & network security |
|---|---|
| Founded | 2022 |
| Revenue | 19.7M |
| Headquarters | Paris, New York, United States |
| Languages | German |
Contact Details
- Phone: +33 6 26 81 01 87
- Website: filigran.io
- LinkedIn: linkedin.com/company/filigran
Key Focus Areas & Initiatives
- Cyber threat intelligence
- Open source
- Breach & attack simulation
- Cybersecurity
- Threat management
- OpenCTI
- SaaS
- Enterprise edition
- Adversarial exposure validation
- OpenAEV
- CTEM
- Security posture
- Community edition
- GRC
- Threat detection and response
- Security posture assessment
- B2B
- Threat intelligence connectors
- Threat intelligence platform customization
- Threat intelligence community engagement
- Threat intelligence platform interoperability
- Threat actor tracking
- Threat intelligence collaboration
- Threat data correlation
- Threat intelligence platform scalability
- Threat actor attribution
- Threat intelligence visualization
- Breach and attack simulation
- Threat intelligence standards
- Threat intelligence orchestration
- Attack scenario simulation
- Open-source threat intelligence
- Cyber risk management
- Threat intelligence community
- Threat intelligence open standards
- Threat detection workflows
- Attack scenario planning
- Threat intelligence training
- Breach simulation
- Threat intelligence automation
- Software development
- Threat intelligence lifecycle
- Threat intelligence platform open standards
- Threat sharing platform
- Cyber risk assessment
- Threat detection and hunting
- Threat intelligence data sources
- Threat intelligence platform collaboration
- Threat intelligence dashboards
- Services
- Incident response automation
- Threat detection automation
- Open-source cybersecurity
- Threat intelligence correlation
- Threat landscape monitoring
- Threat data ingestion
- Threat intelligence analysis tools
- Threat intelligence analysis
- Cyber defense automation
- Threat intelligence management
- Threat intelligence platform training
- Security operations center
- Threat hunting tools
- Threat detection rules
- Threat landscape analysis
- XTM suite
- Threat intelligence sharing
- Risk management
- Information technology and services
- Threat intelligence workflows
- Threat intelligence structured data
- Threat indicator management
- Threat intelligence platform
- Threat intelligence platform deployment
- OpenBas
- Threat intelligence lifecycle management
- Threat intelligence interoperability
- Threat intelligence platform support
- Computer systems design and related services
- Threat sharing and collaboration
- Threat intelligence enrichment
- Threat intelligence automation tools
- Threat intelligence integration
- Cyber threat management
- Incident response
- Threat monitoring
- Adversary simulation
- SaaS solutions
- Enterprise support
- Threat hunting
- Cybersecurity training
- Community engagement
- Automated workflows
- Incident tracking
- Knowledge management
- Incident investigation
- Data visualization
- Continuous improvement
- Custom integrations
- Collaborative workspace
- Real-time alerts
- Threat landscape assessment
- User-friendly automations
- Information sharing
- Swift framework compliance
- Cybersecurity ecosystem integration
- Qualified alerts
- STIX 2.1 compliance
- Threat contextualization
- Analytical insights
- Scenario-based testing
- Vulnerability assessment
- Knowledge sharing
- Dynamic attack scenarios
- Information manipulation defense
- Structured data formats
- Training courses
- Expert certification
- Security posture improvement
- Collaborative learning
- Integrative knowledge graph
- Challenge-based learning
- Cyber incident documentation
- Security training modules
- Subscriber community
- Tailored learning paths
- Computer software
- Information technology & services
Technologies Used
- AI
- ANGEL LMS
- AWS SDK for JavaScript
- AWS Trusted Advisor
- Adobe Media Optimizer
- Amazon Web Services (AWS)
- Ansible
- Atlassian Cloud
- Azure Linux Virtual Machines
- Azure Virtual Machines
- Cedexis Radar
- Datadog
- Deel
- DigitalOcean
- DoubleClick
- DoubleClick Conversion
- Drone
- Elasticsearch
- GitHub
- GitHub Actions
- Global Relay
- Google Cloud Platform
- Google Dynamic Remarketing
- Google Font API
- Google Tag Manager
- Grafana
- GraphQL
- HELM
- Hubspot
- IBM ILOG CPLEX Optimization Studio
- Kajabi
- Kubernetes
- Linkedin Marketing Solutions
- Micro Focus Universal CMDB
- Microsoft Azure
- Microsoft Azure Monitor
- Microsoft Office 365
- Mobile Friendly
- Next.js
- Nginx
- OneTrust Tech Risk & Compliance
- OpenCTI
- Outlook
- PostgreSQL
- Prometheus
- Python
- RabbitMQ
- Rackspace MailGun
- React
- Redis
- Remote
- SQL
- Seismic
- Slack
- Spring
- Terraform
- TypeScript
- Vimeo
- YouTube