All Vendors
revenue_intelligence

Close

Sales CRM with embedded conversation intelligence and behavioral tracking capabilities that feed proprietary analytics.

14 IOCs1 detections1 sites
35
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Close discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

1 detection across 1 site
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps

pending

UNKNOWN
They Claim

Requires claims extraction via CDT

Observed Behavior

Live website analysis pending

Customer Impact

What This Means For You

Sales teams gain productivity through unified communication platform but organization accepts dependency on Close's proprietary engagement analytics. Buyer behavioral data becomes Close asset rather than company intelligence. Call recording and email tracking features create consent obligations that may not align with existing compliance programs.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use Close

  • Audit call recording consent workflows across deployed regions
  • Review data processing addendum for clarity on Close's rights to aggregate insights
  • Implement retention policies to minimize storage of prospect communication data

If You're Evaluating Close

  • API access to raw engagement data to reduce dependency on Close analytics
  • Alternative conversation intelligence tools that offer greater data portability
  • Self-hosted communication infrastructure to eliminate third-party intelligence layer

Negotiation Leverage

  • Request explicit contractual prohibition on using your prospect data for Close's machine learning or benchmarking products
  • Demand data export capabilities that include raw behavioral signals, not just Close's scored outputs
  • Negotiate clear data residency and cross-border transfer controls for prospect communication records
Runtime Detections

Runtime Detections

2 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

Impact: Fingerprints prospect engagement patterns across email, calls, and web interactions to build predictive engagement scores

BTI-C08Cross-Domain Sync

Identity stitching

Impact: Synchronizes prospect identity across communication channels and web sessions to unify behavioral profiles

IOC Manifest

IOC Manifest

5 INDICATORS

Indicators of compromise across 2 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

No indicators in this category

Ecosystem

Ecosystem & Supply Chain

Mid-market sales CRM competing against Salesforce and HubSpot with embedded communication tools. Part of growing conversation intelligence category where CRM becomes behavioral surveillance infrastructure.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

14 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details