All Vendors
data_enrichment

Intellizence

Signature-only detection. No behavioral threat indicators observed. Data enrichment vendors warrant monitoring for identity resolution and cross-domain sync patterns.

9 IOCs25 detections24 sites
0
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Intellizence discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

25 detections across 24 sites
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps

Pending Analysis

UNKNOWN
They Claim

Claims extraction pending

Observed Behavior

CDT analysis required — data enrichment vendors are high priority for behavioral analysis

Customer Impact

What This Means For You

No measurable behavioral risk from current detection data. Data enrichment vendors are high-priority for recon investigation due to potential cross-domain sync, cookie matching, and identity resolution behaviors not visible in signature-only detection.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use Intellizence

  • monitor for future scanner detections
  • review data sharing agreements

If You're Evaluating Intellizence

  • recon agent investigation — data enrichment vendors are high priority for behavioral analysis

Negotiation Leverage

  • Baseline detection only — behavioral analysis pending
  • Data enrichment vendors frequently operate identity resolution infrastructure that requires runtime analysis to detect
  • Request complete subprocessor list and data flow documentation
IOC Manifest

IOC Manifest

2 INDICATORS

Indicators of compromise across 2 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

No indicators in this category

Ecosystem

Ecosystem & Supply Chain

Intellizence operates in the B2B data enrichment market, providing contact and company intelligence. This category frequently overlaps with identity resolution and de-anonymization capabilities.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

9 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details